Abstract | ||
---|---|---|
Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We present techniques for authenticating data structures that represent graphs and collections of geometric objects. In our model, a data structure maintained by a trusted source is mirrored at distributed directories that answer queries and provide proof of correctness. Our work has applications to the authentication of network management systems and geographic information systems. |
Year | DOI | Venue |
---|---|---|
2003 | 10.1007/3-540-36563-X_21 | CT-RSA |
Keywords | Field | DocType |
network management system,geometric object,authenticating data structure,answer query,geographic information system,remote host,present technique,authenticated data structure,fractal merkle tree representation,cryptographic proof,data structure,time complexity,hash function | Data structure,Geographic information system,Tree traversal,Authentication,Cryptography,Computer science,Correctness,Theoretical computer science,Merkle tree,Mathematical proof | Conference |
Volume | ISSN | ISBN |
2612 | 0302-9743 | 3-540-00847-0 |
Citations | PageRank | References |
38 | 3.15 | 36 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Markus Jakobsson | 1 | 4055 | 398.52 |
Tom Leighton | 2 | 4871 | 888.48 |
Silvio Micali | 3 | 11434 | 2581.31 |
Michael Szydlo | 4 | 921 | 117.35 |