Authors
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
Publication date
2008/10/27
Book
Proceedings of the 15th ACM conference on Computer and communications security
Pages
437-448
Description
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so that the client can save space or achieve load balancing. Authenticating the hash table functionality, i.e., verifying the correctness of queries answered by the server and ensuring the integrity of the stored data, is crucial because the server, lying outside the administrative control of the client, can be malicious.
We design efficient and secure protocols for optimally authenticating membership queries on hash tables: for any fixed constants 0 < ε < 1 and κ > 1/ε, the server can provide a proof of integrity of the answer to a (non-)membership query in constant time, requiring O(nε/logκε--1 n) time to treat updates, yet keeping the communication and verification costs constant. This is the first construction for authenticating a hash table with constant …
Total citations
2008200920102011201220132014201520162017201820192020202120222023202425111612151518101310775341
Scholar articles
C Papamanthou, R Tamassia, N Triandopoulos - Proceedings of the 15th ACM conference on Computer …, 2008