منابع مشابه
Highly Auditable Distributed Systems
Auditability is a key requirement for providing scalability and availability to distributed systems. Auditability allows us to identify latent concurrency bugs, dependencies among events, and performance bottlenecks. Our work focuses on providing auditability by combining two key concepts: time and causality. In particular, we prescribe hybrid logical clocks (HLC) which offer the functionality ...
متن کاملBlind, Auditable Membership Proofs
Auditability is an important property in nancial systems and architectures Here we de ne the primitive of blind auditable mem bership proof BAMP which combines public auditability with privacy i e user anonymity In particular one can use it as an auditable alter native to a blind signature component in unconditionally anonymous payment systems and in other systems requiring anonymity We show th...
متن کاملAuditable Versioned Data Storage Outsourcing
Auditability is crucial for data outsourcing, facilitating accountability and identifying data loss or corruption incidents in a timely manner, reducing in turn the risks from such losses. In recent years, in synch with the growing trend of outsourcing, a lot of progress has been made in designing probabilistic (for efficiency) provable data possession (PDP) schemes. However, even the recent an...
متن کاملAuditable Metering with Lightweight Security
In this work we suggest a new mechanism for metering the popularity of web-sites: The compact metering scheme. Our approach does not rely on client authentication or on a third party. Instead, we suggest the notion of a timing function, a computation that can be performed incrementally, whose output is compact, and whose result can be used to eeciently verify the eeort spent with high degree of...
متن کاملCiphertext-Auditable Identity-Based Encryption
Ciphertext-auditability of public key encryption scheme means that the ciphertext should been verified by anyone whether it was actually created by the public key. It also should satisfy two additional requirements: 1) no adversary can create a valid-looking ciphertext and then it can pass the verification process together with a public key and a plaintext; 2) the plaintext cannot be revealed f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings
سال: 2019
ISSN: 2504-3900
DOI: 10.3390/proceedings2019033017