Publicly verifiable databases with efficient insertion/deletion operations

被引:18
|
作者
Miao, Meixia [1 ]
Wang, Jianfeng [1 ]
Ma, Jianfeng [1 ]
Susilo, Willy [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Verifiable database; Vector commitment; Public verifiability; Outsourcing of storage; Bilinear pairings; SECURE;
D O I
10.1016/j.jcss.2016.07.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server and the client could later retrieve a database record and update it efficiently. Meanwhile, any tampering with the database by the server will be detected by the client. We argue that all existing VDB schemes can only support the updating operation called replacement. That is, the client can efficiently update a data record by assigning a new value. However, the proposed solutions are not applicable for other updating operations such as insertion and deletion. In this paper, we first propose a new VDB scheme that supports all updating operations of replacement, deletion, and insertion by incorporating the techniques of commitment binding and hierarchical commitment. Security evaluation shows that the proposed construction can achieve the desired security properties in the standard computational Diffie-Hellman assumption. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:49 / 58
页数:10
相关论文
共 50 条
  • [1] Efficient verifiable databases with additional insertion and deletion operations in cloud computing
    Wang, Qiang
    Zhou, Fucai
    Xu, Jian
    Xu, Zifeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 553 - 567
  • [2] Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions
    Miao, Meixia
    Ma, Jianfeng
    Huang, Xinyi
    Wang, Qian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (02) : 511 - 520
  • [3] Publicly Verifiable Databases With All Efficient Updating Operations
    Chen, Xiaofeng
    Li, Hui
    Li, Jin
    Wang, Qian
    Huang, Xinyi
    Susilo, Willy
    Xiang, Yang
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2021, 33 (12) : 3729 - 3740
  • [4] New Publicly Verifiable Databases Supporting Insertion Operation
    Miao, Meixia
    Wang, Jianfeng
    Ma, Jianfeng
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 640 - 642
  • [5] New Publicly Verifiable Databases with Efficient Updates
    Chen, Xiaofeng
    Li, Jin
    Huang, Xinyi
    Ma, Jianfeng
    Lou, Wenjing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 546 - 556
  • [6] New Publicly Verifiable Cloud Data Deletion Scheme with Efficient Tracking
    Yang, Changsong
    Tao, Xiaoling
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 359 - 372
  • [7] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [8] New publicly verifiable data deletion supporting efficient tracking for cloud storage
    Yang, Changsong
    Tao, Xiaoling
    Chen, Qiyu
    Yang, Changsong (csyang02@163.com); Tao, Xiaoling (txl@guet.deu.cn), 1600, Femto Technique Co., Ltd. (22): : 885 - 896
  • [9] Publicly Verifiable Deletion from Minimal Assumptions
    Kitagawa, Fuyuki
    Nishimaki, Ryo
    Yamakawa, Takashi
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 228 - 245
  • [10] Weakening Assumptions for Publicly-Verifiable Deletion
    Bartusek, James
    Khurana, Dakshita
    Malavolta, Giulio
    Poremba, Alexander
    Walter, Michael
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 183 - 197