We study the verification of \emph{set operations} in the model of \emph{authenticated data structures}, namely the problem of cryptographically checking the correctness of outsourced set operations performed by an untrusted \emph{server} over a dynamic collection of sets that are owned (and updated) by a trusted \emph{source}. We present a new authenticated data structure scheme that allows any entity to \emph{publicly} verify the correctness of primitive sets operations such as \emph{intersection}, \emph{union}, \emph{subset} and \emph{set difference}. Based on a novel extension of the security properties of \emph{bilinear-map accumulators} as well as on a primitive called \emph{accumulation tree}, our authenticated data structure is th...
We consider a stream outsourcing setting, where a data owner egates the management of a set of disjo...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Authenticated data structures are a technique for outsourcing data storage and maintenance to an unt...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
An integral component of modern computing is the ability to outsource data and computation to powerf...
An increasing number of enterprizes outsource database functionality to third-party service provider...
Cloud computing has emerged as an important new computational and storage medium and is increasingly...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
This paper proposes an efficient protocol for verifiable delegation of computation over outsourced s...
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an ...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
This paper develops a cryptographic protocol for outsourcing arbitrary stateful computation among mu...
Abstract. In an outsourced database scheme, the data owner delegates the data management tasks to a ...
We consider the problem of streaming verifiable computation, where both a verifier and a prover obse...
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n el...
We consider a stream outsourcing setting, where a data owner egates the management of a set of disjo...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Authenticated data structures are a technique for outsourcing data storage and maintenance to an unt...
We study the design of protocols for set-operation verification, namely the problem of cryptographic...
An integral component of modern computing is the ability to outsource data and computation to powerf...
An increasing number of enterprizes outsource database functionality to third-party service provider...
Cloud computing has emerged as an important new computational and storage medium and is increasingly...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
This paper proposes an efficient protocol for verifiable delegation of computation over outsourced s...
An authenticated data structure (ADS) is a data structure whose operations can be carried out by an ...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
This paper develops a cryptographic protocol for outsourcing arbitrary stateful computation among mu...
Abstract. In an outsourced database scheme, the data owner delegates the data management tasks to a ...
We consider the problem of streaming verifiable computation, where both a verifier and a prover obse...
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n el...
We consider a stream outsourcing setting, where a data owner egates the management of a set of disjo...
We consider the problem of efficiently evaluating a secret polynomial at a given public point, when ...
Authenticated data structures are a technique for outsourcing data storage and maintenance to an unt...