Motivated by a practical scenario in blockchains in which a client, who possesses a transaction, wishes to privately verify that the transaction actually belongs to a block, we investigate the problem of private retrieval of Merkle proofs (i.e. proofs of inclusion/membership) in a Merkle tree. In this setting, one or more servers store the nodes of a binary tree (a Merkle tree), while a client wants to retrieve the set of nodes along a root-to-leaf path (i.e. a Merkle proof, after appropriate node swapping operations), without letting the servers know which path is being retrieved. We propose a method that partitions the Merkle tree to enable parallel private retrieval of the Merkle proofs. The partitioning step is based on a novel tree col...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
In cryptographic decentralized storage systems, files are split into chunks and distributed across a...
Motivated by a practical scenario in blockchains in which a client, who possesses a transaction, wis...
A Merkle tree is a data structure employed within Blockchain technology to securely verify informati...
AbstractIn this paper we describe optimal trade-offs between time and space complexity of Merkle tre...
Merkle trees are ubiquitous in blockchains and other distributed ledger technologies (DLTs). They gu...
Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Cryptology eprint Archive 2007/433International audienceProof-of-work schemes are economic measures ...
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently maintainable and...
In cryptographic decentralized storage systems, files are split into chunks and distributed across a...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
Merkle grids are a new data organization that replicates the functionality of Merkle trees while red...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
In cryptographic decentralized storage systems, files are split into chunks and distributed across a...
Motivated by a practical scenario in blockchains in which a client, who possesses a transaction, wis...
A Merkle tree is a data structure employed within Blockchain technology to securely verify informati...
AbstractIn this paper we describe optimal trade-offs between time and space complexity of Merkle tre...
Merkle trees are ubiquitous in blockchains and other distributed ledger technologies (DLTs). They gu...
Light nodes in blockchain systems are known to be vulnerable to data availability (DA) attacks where...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Cryptology eprint Archive 2007/433International audienceProof-of-work schemes are economic measures ...
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently maintainable and...
In cryptographic decentralized storage systems, files are split into chunks and distributed across a...
A secure, tamper proof execution environment is critical for trustworthy network computing. Newly ...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
Merkle grids are a new data organization that replicates the functionality of Merkle trees while red...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
A secure, tamperproof execution environment is critical for trustworthy network computing. Newly eme...
In cryptographic decentralized storage systems, files are split into chunks and distributed across a...