Sciweavers

Share
ICICS
2007
Springer

Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures

10 years 3 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in database outsourcing, a client's database is stored and maintained by an untrusted server. Also, in simple storage systems, clients can store very large amounts of data but at the same time, they want to assure their integrity when they retrieve them. In this paper, we present a model and protocol for twoparty authentication of data structures. Namely, a client outsources its data structure and verifies that the answers to the queries have not been tampered with. We provide efficient algorithms to securely outsource a skip list with logarithmic time overhead at the server and client and logarithmic communication cost, thus providing an efficient authentication primitive for outsourced data, both structured (e.g., relational databases) and semi-structured (e.g., XML documents). In our technique, the clien...
Charalampos Papamanthou, Roberto Tamassia
Added 16 Aug 2010
Updated 16 Aug 2010
Type Conference
Year 2007
Where ICICS
Authors Charalampos Papamanthou, Roberto Tamassia
Comments (0)
books