Verified Query Results from Hybrid Authentication Trees
We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a mo...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 98 |
---|---|
container_issue | |
container_start_page | 84 |
container_title | |
container_volume | |
creator | Nuckolls, Glen |
description | We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods. |
doi_str_mv | 10.1007/11535706_7 |
format | Book Chapter |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17026792</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17026792</sourcerecordid><originalsourceid>FETCH-LOGICAL-p254t-85c9cd1b7ddfa892f8c6db0be7fe7f71147391007bec5ef71b7a1cbdbf31c50c3</originalsourceid><addsrcrecordid>eNpFUE1Lw0AUXL_AWHvxF-QieInuy8tms8dS1AoFUap4W_ZTV9uk7KaH_ntTIvgYGJgZBuYRcgX0FijldwAMGae15EfkAllFEQRycUwyqAEKxEqcjEbZADYfpySjSMtC8ArPyTSlbzocAqeiygh_dzH44Gz-snNxn7-6tFv3Kfex2-SLvY7B5rNd_-XaPhjVh67NV9G5dEnOvFonN_3jCXl7uF_NF8Xy-fFpPlsW25JVfdEwI4wFza31qhGlb0xtNdWO-wEcoOIoDrO0M8wNguYKjLbaIxhGDU7I9di7VcmotY-qNSHJbQwbFfdyWFHWXJRD7mbMpcFqP12Uuut-kgQqD_Xy_2v4CxPmWk4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Verified Query Results from Hybrid Authentication Trees</title><source>Springer Books</source><creator>Nuckolls, Glen</creator><contributor>Jajodia, Sushil ; Wijesekera, Duminda</contributor><creatorcontrib>Nuckolls, Glen ; Jajodia, Sushil ; Wijesekera, Duminda</creatorcontrib><description>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 354028138X</identifier><identifier>ISBN: 9783540281382</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540319379</identifier><identifier>EISBN: 9783540319375</identifier><identifier>DOI: 10.1007/11535706_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software</subject><ispartof>Data and Applications Security XIX, 2005, p.84-98</ispartof><rights>IFIP International Federation for Information Processing 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11535706_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11535706_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17026792$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jajodia, Sushil</contributor><contributor>Wijesekera, Duminda</contributor><creatorcontrib>Nuckolls, Glen</creatorcontrib><title>Verified Query Results from Hybrid Authentication Trees</title><title>Data and Applications Security XIX</title><description>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>354028138X</isbn><isbn>9783540281382</isbn><isbn>3540319379</isbn><isbn>9783540319375</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2005</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFUE1Lw0AUXL_AWHvxF-QieInuy8tms8dS1AoFUap4W_ZTV9uk7KaH_ntTIvgYGJgZBuYRcgX0FijldwAMGae15EfkAllFEQRycUwyqAEKxEqcjEbZADYfpySjSMtC8ArPyTSlbzocAqeiygh_dzH44Gz-snNxn7-6tFv3Kfex2-SLvY7B5rNd_-XaPhjVh67NV9G5dEnOvFonN_3jCXl7uF_NF8Xy-fFpPlsW25JVfdEwI4wFza31qhGlb0xtNdWO-wEcoOIoDrO0M8wNguYKjLbaIxhGDU7I9di7VcmotY-qNSHJbQwbFfdyWFHWXJRD7mbMpcFqP12Uuut-kgQqD_Xy_2v4CxPmWk4</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Nuckolls, Glen</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Verified Query Results from Hybrid Authentication Trees</title><author>Nuckolls, Glen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p254t-85c9cd1b7ddfa892f8c6db0be7fe7f71147391007bec5ef71b7a1cbdbf31c50c3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nuckolls, Glen</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nuckolls, Glen</au><au>Jajodia, Sushil</au><au>Wijesekera, Duminda</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Verified Query Results from Hybrid Authentication Trees</atitle><btitle>Data and Applications Security XIX</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2005</date><risdate>2005</risdate><spage>84</spage><epage>98</epage><pages>84-98</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>354028138X</isbn><isbn>9783540281382</isbn><eisbn>3540319379</eisbn><eisbn>9783540319375</eisbn><abstract>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11535706_7</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Data and Applications Security XIX, 2005, p.84-98 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_17026792 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Exact sciences and technology Memory and file management (including protection and security) Memory organisation. Data processing Software |
title | Verified Query Results from Hybrid Authentication Trees |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T08%3A27%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Verified%20Query%20Results%20from%20Hybrid%20Authentication%20Trees&rft.btitle=Data%20and%20Applications%20Security%20XIX&rft.au=Nuckolls,%20Glen&rft.date=2005&rft.spage=84&rft.epage=98&rft.pages=84-98&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=354028138X&rft.isbn_list=9783540281382&rft_id=info:doi/10.1007/11535706_7&rft_dat=%3Cpascalfrancis_sprin%3E17026792%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540319379&rft.eisbn_list=9783540319375&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |