Range-based set reconciliation is a simple approach to efficiently computing the union of two sets over a network, based on recursively partitioning the sets and comparing fingerprints of the partitions to probabilistically detect whether a partition requires further work. Whereas prior presentations of this approach focus on specific fingerprinting schemes for specific use-cases, we give a more generic description and analysis in the broader context of set reconciliation. Precisely capturing the design space for fingerprinting schemes allows us to survey for cryptographically secure schemes. Furthermore, we reduce the time complexity of local computations by a logarithmic factor compared to previous publications. In investigating secure as...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data ...
We consider a set reconciliation setting in which two parties hold similar sets that they would like...
Set reconciliation is a fundamental problem in distributed databases, where two parties each holding...
We consider the problem of e±ciently reconciling two similar sets held by di®erent hosts. This probl...
We consider the problem of e#ciently reconciling two similar sets held by di#erent hosts while mini...
We present new, simple, efficient data structures for approximate reconciliation of set differences,...
As users migrate information to cloud storage, many distributed cloud-based services use multiple lo...
Efficient Protocols for Set Membership and Range Proofs The goal of this master thesis was to give a...
This work revisits set reconciliation, the problem of synchronizing two multisets of fixed-size valu...
The thesis examines two related combinatorial objects, namely fingerprinting codes and separating ha...
An integral component of modern computing is the ability to outsource data and computation to powerf...
In both open and private communication the participants face potential threats from a malicious enem...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...
Set reconciliation is the problem of efficiently computing the difference be-tween two sets of data ...
We consider a set reconciliation setting in which two parties hold similar sets that they would like...
Set reconciliation is a fundamental problem in distributed databases, where two parties each holding...
We consider the problem of e±ciently reconciling two similar sets held by di®erent hosts. This probl...
We consider the problem of e#ciently reconciling two similar sets held by di#erent hosts while mini...
We present new, simple, efficient data structures for approximate reconciliation of set differences,...
As users migrate information to cloud storage, many distributed cloud-based services use multiple lo...
Efficient Protocols for Set Membership and Range Proofs The goal of this master thesis was to give a...
This work revisits set reconciliation, the problem of synchronizing two multisets of fixed-size valu...
The thesis examines two related combinatorial objects, namely fingerprinting codes and separating ha...
An integral component of modern computing is the ability to outsource data and computation to powerf...
In both open and private communication the participants face potential threats from a malicious enem...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
Given the original set X where |X| = s, a sketch P is computed from X and made public. From another ...
AbstractIn this paper we exhibit several new classes of hash functions with certain desirable proper...