Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
نویسندگان
چکیده
We improve the design and implementation of two-party and three-party authenticated dynamic dictionaries and apply these dictionaries to cryptocurrency ledgers. A public ledger (blockchain) in a cryptocurrency needs to be easily verifiable. However, maintaining a data structure of all account balances, in order to verify whether a transaction is valid, can be quite burdensome: a verifier who does not have the large amount of RAM required for the data structure will perform slowly because of the need to continually access secondary storage. We demonstrate experimentally that authenticated dynamic dictionaries can considerably reduce verifier load. On the other hand, per-transaction proofs generated by authenticated dictionaries increase the size of the blockchain, which motivates us to find a solution with most compact proofs. Our improvements to the design of authenticated dictionaries reduce proof size and speed up verification by 1.4–2.5 times, making them better suited for the cryptocurrency application. We further show that proofs for multiple transactions in a single block can compressed together, reducing their total length by approximately an additional factor of 2. We simulate blockchain verification, and show that our verifier can be about 20 times faster than a disk-bound verifier under a realistic transaction load.
منابع مشابه
Persistent Authenticated Dictionaries and Their Applications
We introduce the notion of persistent authenticated dictionaries, that is, dictionaries where the user can make queries of the type “was element e in set S at time t?” and get authenticated answers. Applications include credential and certificate validation checking in the past (as in digital signatures for electronic contracts), digital receipts, and electronic tickets. We present two data str...
متن کاملEfficient Authenticated Dictionaries with Skip Lists and Commutative Hashing∗
We present an efficient and practical technique for dynamically maintaining an authenticated dictionary. The main building blocks of our scheme are the skip list data structure and cryptographic associative hash functions. Applications of our work include certificate revocation in public key infrastructure and the the publication of data collections on the Internet.
متن کاملMedical Students’ Perception of Using Electronic Learning Tools in an ESP Program
Given the burgeoning interest in the use of technology and electronic tools for educational purposes among students, this study set out with the purpose of investigating medical students’ perception of using e-learning tools and applications in an English for Specific Purposes (ESP) program at an Iranian medical university. The study also aimed to discover the extent to which the students...
متن کاملAuthentication of Embedded Data in HTML Documents through the Use of Prooflets
iv Preface In this thesis, I describe an efficient approach for securely authenticating dynamic content embedded in a web page. This technology, which I call prooflets, consists of an extension of the HTML tag library and of a service for publishing and distributing authenticated data. Prooflets leverage emerging authentication methods, such as authenticated dictionaries and XML digital signatu...
متن کاملAn Efficient Dynamic and Distributed Cryptographic Accumulator
We show how to use the RSA one-way accumulator to realize an efficient and dynamic authenti cated dictionary, where untrusted directories provide cryptographically verifiable answers to member ship queries on a set maintained by a trusted source. Our accumulator-based scheme for authenticated dictionaries supports efficient incremental updates of the underlying set by insertions and deletions...
متن کامل