Authenticated Hash Tables Based on Cryptographic Accumulators

Algorithmica(2015)

引用 35|浏览154
暂无评分
摘要
Suppose a client stores n elements in a hash table that is outsourced to an untrusted server. We address the problem of authenticating the hash table operations, where the goal is to design protocols capable of verifying the correctness of queries and updates performed by the server, thus ensuring the integrity of the remotely stored data across its entire update history. Solutions to this authentication problem allow the client to gain trust in the operations performed by a faulty or even malicious server that lies outside the administrative control of the client. We present two novel schemes that implement an authenticated hash table . An authenticated hash table exports the basic hash-table functionality for maintaining a dynamic set of elements, coupled with the ability to provide short cryptographic proofs that a given element is a member or not of the current set. By employing efficient algorithmic constructs and cryptographic accumulators as the core security primitive, our schemes provide constant proof size, constant verification time and sublinear query or update time, strictly improving upon previous approaches. Specifically, in our first scheme which is based on the RSA accumulator, the server is able to construct a (non-)membership proof in constant time and perform updates in O( n^ϵlog n) time for any fixed constant 0<ϵ <1 . A variation of this scheme achieves a different trade-off, offering constant update time and O(n^ϵ) query time. Our second scheme uses an accumulator based on bilinear pairings to achieve O(n^ϵ) update time at the server while keeping all other complexities constant. A variation of this scheme achieves O(n^ϵlog n) time for queries and constant update time. An experimental evaluation of both solutions shows their practicality.
更多
查看译文
关键词
Authenticated data structures,Cryptographic accumulators,Cloud computing security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要