On the Cost of Authenticated Data Structures

نویسندگان

  • Roberto Tamassia
  • Nikos Triandopoulos
چکیده

Authenticated data structures provide a model for data authentication, where answers to queries contain extra information that can produce a cryptographic proof about their validity. In this paper, we study the authentication cost that is associated with this model when authentication is performed through hierarchical cryptographic hashing. We introduce measures that precisely model the computational overhead that is introduced due to authentication. We study the theoretical limitations of the model for authenticated structures that solve the dictionary problem of size n and prove (i) an intrinsic equivalence between authentication through hashing and searching by comparison, (ii) a Ω(log n) lower bound for the authentication cost and (iii) the optimality of tree structures. In view of the logarithmic lower bound, we (i) analyze and study the performance of existing authenticated structures with O(log n) authentication cost and (ii) describe a new authentication scheme based on skip-lists that achieves a performance very close to the theoretically optimal. Through the relation between authentication cost and number of comparisons, we finally get a new skip list version achieving expected performance that is very close to the theoretically optimal with respect to the logarithmic constant. Namely, a search operation takes on average 1.25 log 2 n + O(1) comparisons, which must be compared with the 1.5 log 2 n + O(1) previous best scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Authenticated Data Structures with Multilinear Forms

Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients outsource their data and computations to third-party service providers. Data integrity in the cloud therefore becomes an important factor for the functionality of these web services. Authenticated data structures, implemented with various cryptographic primitives, have been widely studied as a means...

متن کامل

CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking

Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

On the Cost of Persistence and Authentication in Skip Lists

We present an extensive experimental study of authenticated data structures for dictionaries and maps implemented with skip lists. We consider realizations of these data structures that allow us to study the performance overhead of authentication and persistence. We explore various design decisions and analyze the impact of garbage collection and virtual memory paging, as well. Our empirical st...

متن کامل

Authenticated Data Structures

Authenticated data structures are a model of computation where untrusted responders answer queries on a data structure on behalf of a trusted source and provide a proof of the validity of the answer to the user. We present a survey of techniques for designing authenticated data structures and overview their computational efficiency. We also discuss implementation issues and practical applications.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003