...
首页> 外文期刊>Algorithmica >Authenticated Hash Tables Based on Cryptographic Accumulators
【24h】

Authenticated Hash Tables Based on Cryptographic Accumulators

机译:基于密码累加器的经过身份验证的哈希表

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Suppose a client stores elements in a hash table that is outsourced to an untrusted server. We address the problem of authenticating the hash table operations, where the goal is to design protocols capable of verifying the correctness of queries and updates performed by the server, thus ensuring the integrity of the remotely stored data across its entire update history. Solutions to this authentication problem allow the client to gain trust in the operations performed by a faulty or even malicious server that lies outside the administrative control of the client. We present two novel schemes that implement an authenticated hash table. An authenticated hash table exports the basic hash-table functionality for maintaining a dynamic set of elements, coupled with the ability to provide short cryptographic proofs that a given element is a member or not of the current set. By employing efficient algorithmic constructs and cryptographic accumulators as the core security primitive, our schemes provide constant proof size, constant verification time and sublinear query or update time, strictly improving upon previous approaches. Specifically, in our first scheme which is based on the RSA accumulator, the server is able to construct a (non-)membership proof in constant time and perform updates in time for any fixed constant . A variation of this scheme achieves a different trade-off, offering constant update time and query time. Our second scheme uses an accumulator based on bilinear pairings to achieve update time at the server while keeping all other complexities constant. A variation of this scheme achieves time for queries and constant update time. An experimental evaluation of both solutions shows their practicality.
机译:假设客户端将元素存储在哈希表中,该哈希表已外包给不受信任的服务器。我们解决了验证哈希表操作的问题,目标是设计能够验证服务器执行的查询和更新的正确性的协议,从而确保远程存储数据在其整个更新历史中的完整性。此身份验证问题的解决方案使客户端可以信任位于客户端管理控制之外的故障服务器甚至恶意服务器所执行的操作。我们提出了两种实现身份验证哈希表的新颖方案。经过身份验证的哈希表可导出基本哈希表功能,以维护元素的动态集合,并具有提供简短的密码证明(即给定元素是否为当前集合的成员)的功能。通过采用高效的算法构造和密码累加器作为核心安全性原语,我们的方案可提供恒定的证明大小,恒定的验证时间以及亚线性查询或更新时间,从而对以前的方法进行了严格的改进。具体来说,在我们的第一个基于RSA累加器的方案中,服务器能够在恒定时间内构造(非)成员资格证明,并针对任何固定常数及时执行更新。此方案的变体实现了不同的权衡,提供了恒定的更新时间和查询时间。我们的第二种方案使用基于双线性配对的累加器在服务器上实现更新时间,同时保持所有其他复杂性不变。此方案的变体实现了查询时间和恒定的更新时间。对这两种解决方案的实验评估表明了它们的实用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号