Efficient Consistency Proofs on a Committed Database

نویسندگان

  • Rafail Ostrovsky
  • Charles Rackoff
  • Adam Smith
چکیده

A consistent query protocol allows a database owner to publish a very short string c which commits her to a particular database D with special consistency property (i.e., given c, every allowable query has unique and well-defined answer with respect to D.) Moreover, when a user makes a query, any server hosting the database can answer the query, and provide a very short proof π that the answer is well-defined, unique, and consistent with c (and hence with D). One potential application of consistent query protocols is for guaranteeing the consistency of many replicated copies of D—the owner can publish c, and users can verify the consistency of a query to some copy of D by making sure π is consistent with c. This strong guarantee holds even for owners who try to cheat, while creating c. The task of consistent query protocols was originally proposed for membership queries by Micali and Rabin[18], and subsequently and independently, by Kilian [16]. In this setting a server can prove to a client whether or not a given key is present or not in a database, based only on a short public commitment c. We strengthen their results in several ways. For membership queries, we improve the communication complexity; more importantly, we provide protocols for more general types of queries and more general relational databases. For example, we consider databases in which entries have several keys and where we allow range queries (e.g. we allow a client to ask for all entries within a certain age range and a certain salary range). Towards this goal, we introduce query algorithms with certain inherent robustness properties— called data-robust algorithms—and show how this robustness can be achieved. In particular, we illustrate our general technique by constructing an efficient data-robust algorithm for proving consistency of orthogonal range queries (a particular case of a “join”query). The server’s proof convinces the client not only that all the matching entries provided are in D, but also that no others are present. Our guarantees hold even if the answer is the empty set. In the case of one-dimensional range queries we also show a new data-hiding technique—called explicit hashing—which allows us to a execute consistent query protocol π and at the same time protect the privacy of all other information in the database efficiently. In particular, we avoid the NP reductions required in a generic zero-knowledge proof. ∗Telcordia Technologies, Morristown, NJ, USA. †University of Toronto, Toronto, Ontario, Canada ‡MIT LCS, 200 Technology Square, NE43-446, Cambridge, MA 01239, USA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Consistency Proofs for Generalized Queries on a Committed Database

A consistent query protocol (CQP) allows a database owner to publish a very short string c which commits her and everybody else to a particular database D, so that any copy of the database can later be used to answer queries and give short proofs that the answers are consistent with the commitment c. Here commits means that there is at most one database D that anybody can find (in polynomial ti...

متن کامل

Efficient Proofs on Committed Graphs and NP - Statements

Digital signature schemes are a foundational building block enabling integrity and non-repudiation. We propose a graph signature scheme and corresponding proofs that allow a prover (1) to obtain a signature on a committed graph and (2) to subsequently prove to a verifier knowledge of such a graph signature. The graph signature scheme and proofs are a building block for certification systems tha...

متن کامل

Signatures and Efficient Proofs on Committed Graphs and NP-Statements

Digital signature schemes are a foundational building block enabling integrity and non-repudiation. We propose a graph signature scheme and corresponding proofs that allow a prover (1) to obtain a signature on a committed graph and (2) to subsequently prove to a verifier knowledge of such a graph signature. The graph signature scheme and proofs are a building block for certification systems tha...

متن کامل

Processing Read-Only Transactions in Hybrid Data Delivery Environments with Consistency and Currency Guarantees

Different isolation levels are required to ensure various degrees of data consistency and currency to read-only transactions. Current definitions of isolation levels like Conflict Serializability, Update Serializability or External Consistency/Update Consistency are not appropriate for processing read-only transactions since they lack any currency guarantees. To correct the problem, we propose ...

متن کامل

Bulletproofs: Efficient Range Proofs for Confidential Transactions

We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs are especially well suited for efficient range proofs on committed values: they enable proving that a committed value is in a range using only 2 log2pnq ` 9 group and field elements, where n is the b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003