Certification and Authentication of Data Structures

نویسندگان

  • Roberto Tamassia
  • Nikos Triandopoulos
چکیده

We study query authentication schemes, algorithmic and cryptographic constructions that provideefficient and secure protocols for verifying the results of queries over structured data in untrusted oradversarial data distribution environments. We formally define the problem in a new data query and au-thentication setting that involves general query types answered in the RAM model of computation, andput forward a new approach for designing secure query authentication schemes that, through the newconcept of query certification, aims to authenticate the validity of the answer, rather than the entire pro-cess that generates the answer. Our main results state that this new authentication framework achievesgenerality, namely any query type admits a secure query authentication scheme, and also supports animportant type of modularity, namely the authentication of general queries based on the evaluation ofrelations over the data elements is reduced to the authentication of set-membership queries. Thus, in ad-dition to general possibility results under general assumptions and characterization results using existingcryptographic techniques, we contribute a clear separation between algorithmics and cryptography indata-authentication protocol design, and sufficient conditions for achieving super-efficient answer veri-fication in time asymptotically less than the time needed to answer the query.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

I. Introduction

− Data certification and digital signature are a new area of interest and many standards have emerged. Indeed, these technologies offer identification, authentication and nonrepudiation capabilities during Internet transactions (emails and e-commerce). However, it appears that both certification and digital signature do not completely answer enterprise data authentication and secured data stora...

متن کامل

The Sb & ? Lrt Diskette

(i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certificat...

متن کامل

A flexible, large-scale authentication policy for WLAN roaming users using IPSec and public key certification

With the growing deployment of WLAN hotspots there is a real need of a large-scale, easyto-use authentication policy for enabling hot-spot providers to allow access to the Internet to authorized users. This paper presents an authentication schema based on asymmetric cryptography and public key certification. These mechanisms are used to establish IPSec tunnels between WLAN supplicants and gatew...

متن کامل

Certification and Authentication Services for Securing MANET Routing Protocols

In this paper, we describe a new authentication service for securing mobile ad hoc network (MANET) routing protocols. A MANET authentication extension (MAE) is appended to each routing protocol message. Our design includes a self-organized certification service, adapted from [6] with the following improvements: appropriated initialization, correcting vulnerabilities in the original design; loca...

متن کامل

Reviewing MANETs & Configurations of Certification Authority (CA) for node Authentication

A Mobile Ad hoc Network (MANET) is a temporary network of wireless mobile devices deployed without the aid of any pre-existing infrastructure or centralized administration. But this fascinating technology is studded with a number of serious challenges that need to be well catered before its successful deployment. These challenges include security issues related to key management, routing, node ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010