Verified Query Results from Hybrid Authentication Trees

We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a mo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Nuckolls, Glen
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 98
container_issue
container_start_page 84
container_title
container_volume
creator Nuckolls, Glen
description We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.
doi_str_mv 10.1007/11535706_7
format Book Chapter
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_17026792</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>17026792</sourcerecordid><originalsourceid>FETCH-LOGICAL-p254t-85c9cd1b7ddfa892f8c6db0be7fe7f71147391007bec5ef71b7a1cbdbf31c50c3</originalsourceid><addsrcrecordid>eNpFUE1Lw0AUXL_AWHvxF-QieInuy8tms8dS1AoFUap4W_ZTV9uk7KaH_ntTIvgYGJgZBuYRcgX0FijldwAMGae15EfkAllFEQRycUwyqAEKxEqcjEbZADYfpySjSMtC8ArPyTSlbzocAqeiygh_dzH44Gz-snNxn7-6tFv3Kfex2-SLvY7B5rNd_-XaPhjVh67NV9G5dEnOvFonN_3jCXl7uF_NF8Xy-fFpPlsW25JVfdEwI4wFza31qhGlb0xtNdWO-wEcoOIoDrO0M8wNguYKjLbaIxhGDU7I9di7VcmotY-qNSHJbQwbFfdyWFHWXJRD7mbMpcFqP12Uuut-kgQqD_Xy_2v4CxPmWk4</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Verified Query Results from Hybrid Authentication Trees</title><source>Springer Books</source><creator>Nuckolls, Glen</creator><contributor>Jajodia, Sushil ; Wijesekera, Duminda</contributor><creatorcontrib>Nuckolls, Glen ; Jajodia, Sushil ; Wijesekera, Duminda</creatorcontrib><description>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 354028138X</identifier><identifier>ISBN: 9783540281382</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540319379</identifier><identifier>EISBN: 9783540319375</identifier><identifier>DOI: 10.1007/11535706_7</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software</subject><ispartof>Data and Applications Security XIX, 2005, p.84-98</ispartof><rights>IFIP International Federation for Information Processing 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11535706_7$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11535706_7$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17026792$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Jajodia, Sushil</contributor><contributor>Wijesekera, Duminda</contributor><creatorcontrib>Nuckolls, Glen</creatorcontrib><title>Verified Query Results from Hybrid Authentication Trees</title><title>Data and Applications Security XIX</title><description>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>354028138X</isbn><isbn>9783540281382</isbn><isbn>3540319379</isbn><isbn>9783540319375</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2005</creationdate><recordtype>book_chapter</recordtype><recordid>eNpFUE1Lw0AUXL_AWHvxF-QieInuy8tms8dS1AoFUap4W_ZTV9uk7KaH_ntTIvgYGJgZBuYRcgX0FijldwAMGae15EfkAllFEQRycUwyqAEKxEqcjEbZADYfpySjSMtC8ArPyTSlbzocAqeiygh_dzH44Gz-snNxn7-6tFv3Kfex2-SLvY7B5rNd_-XaPhjVh67NV9G5dEnOvFonN_3jCXl7uF_NF8Xy-fFpPlsW25JVfdEwI4wFza31qhGlb0xtNdWO-wEcoOIoDrO0M8wNguYKjLbaIxhGDU7I9di7VcmotY-qNSHJbQwbFfdyWFHWXJRD7mbMpcFqP12Uuut-kgQqD_Xy_2v4CxPmWk4</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Nuckolls, Glen</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Verified Query Results from Hybrid Authentication Trees</title><author>Nuckolls, Glen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p254t-85c9cd1b7ddfa892f8c6db0be7fe7f71147391007bec5ef71b7a1cbdbf31c50c3</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Nuckolls, Glen</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nuckolls, Glen</au><au>Jajodia, Sushil</au><au>Wijesekera, Duminda</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Verified Query Results from Hybrid Authentication Trees</atitle><btitle>Data and Applications Security XIX</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2005</date><risdate>2005</risdate><spage>84</spage><epage>98</epage><pages>84-98</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>354028138X</isbn><isbn>9783540281382</isbn><eisbn>3540319379</eisbn><eisbn>9783540319375</eisbn><abstract>We address the problem of verifying the accuracy of query results provided by an untrusted third party Publisher on behalf of a trusted data Owner. We propose a flexible database verification structure, the Hybrid Authentication Tree (HAT), based on fast cryptographic hashing and careful use of a more expensive one-way accumulator. This eliminates the dependence on tree height of earlier Merkle tree based proposals and improves on the VB tree, a recent proposal to reduce proof sizes, by eliminating a trust assumption and reliance on signatures. An evaluation of the Hybrid Authentication Tree against the VB tree and Authentic Publication showing that a HAT provides the smallest proofs and faster verification than the VB tree. With moderate bandwidth limitations, the HATs low proof overhead reduces transfer time to significantly outweigh the faster verification time of Authentic Publication. A HAT supports two verification modes that can vary per query and per Client to match Client resources and applications. This flexibility allows the HAT to match the best performance of both hash based and accumulator based methods.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11535706_7</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Data and Applications Security XIX, 2005, p.84-98
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_17026792
source Springer Books
subjects Applied sciences
Computer science
control theory
systems
Exact sciences and technology
Memory and file management (including protection and security)
Memory organisation. Data processing
Software
title Verified Query Results from Hybrid Authentication Trees
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T08%3A27%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Verified%20Query%20Results%20from%20Hybrid%20Authentication%20Trees&rft.btitle=Data%20and%20Applications%20Security%20XIX&rft.au=Nuckolls,%20Glen&rft.date=2005&rft.spage=84&rft.epage=98&rft.pages=84-98&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=354028138X&rft.isbn_list=9783540281382&rft_id=info:doi/10.1007/11535706_7&rft_dat=%3Cpascalfrancis_sprin%3E17026792%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540319379&rft.eisbn_list=9783540319375&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true