Publicly verifiable databases with efficient insertion/deletion operations

被引:18
|
作者
Miao, Meixia [1 ]
Wang, Jianfeng [1 ]
Ma, Jianfeng [1 ]
Susilo, Willy [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Verifiable database; Vector commitment; Public verifiability; Outsourcing of storage; Bilinear pairings; SECURE;
D O I
10.1016/j.jcss.2016.07.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server and the client could later retrieve a database record and update it efficiently. Meanwhile, any tampering with the database by the server will be detected by the client. We argue that all existing VDB schemes can only support the updating operation called replacement. That is, the client can efficiently update a data record by assigning a new value. However, the proposed solutions are not applicable for other updating operations such as insertion and deletion. In this paper, we first propose a new VDB scheme that supports all updating operations of replacement, deletion, and insertion by incorporating the techniques of commitment binding and hierarchical commitment. Security evaluation shows that the proposed construction can achieve the desired security properties in the standard computational Diffie-Hellman assumption. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:49 / 58
页数:10
相关论文
共 50 条
  • [21] Publicly Verifiable Database Model with Full Operations Based on Bilinear Map
    Wang Q.
    Zhou F.
    Xuan P.
    Wu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (03): : 521 - 532
  • [22] Secure and efficient publicly verifiable ridge regression outsourcing scheme
    Ruan, Ou
    Qin, Shanshan
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 703 - 709
  • [23] Blockchain-based publicly verifiable data deletion scheme for cloud storage
    Yang, Changsong
    Chen, Xiaofeng
    Xiang, Yang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 : 185 - 193
  • [24] Publicly verifiable ciphertexts
    Nieto, Juan
    Manulis, Mark
    Poettering, Bertram
    Rangasamy, Jothi
    Stebila, Douglas
    JOURNAL OF COMPUTER SECURITY, 2013, 21 (05) : 749 - 778
  • [25] Enabling Efficient Publicly Verifiable Outsourcing Computation for Matrix Multiplication
    Li, Hongwei
    Zhang, Shenmin
    Luan, Tom H.
    Ren, Hao
    Dai, Yuanshun
    Zhou, Liang
    25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 44 - 50
  • [26] An efficient publicly verifiable mix-net for long inputs
    Furukawa, Jun
    Sako, Kazue
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 113 - 127
  • [27] An efficient publicly verifiable mix-net for long inputs
    Furukawa, Jun
    Sako, Kazue
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2006, 4107 : 111 - 125
  • [28] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Fatemeh Erfan
    Hamid Mala
    Cluster Computing, 2020, 23 : 2835 - 2845
  • [29] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
    Peng, Kun
    Bao, Feng
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 118 - 132
  • [30] Efficient publicly verifiable secret sharing schemes with fast or delayed recovery
    Boudot, F
    Traoré, J
    INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 87 - 102