Publicly verifiable databases with efficient insertion/deletion operations

被引:18
|
作者
Miao, Meixia [1 ]
Wang, Jianfeng [1 ]
Ma, Jianfeng [1 ]
Susilo, Willy [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
[2] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Verifiable database; Vector commitment; Public verifiability; Outsourcing of storage; Bilinear pairings; SECURE;
D O I
10.1016/j.jcss.2016.07.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server and the client could later retrieve a database record and update it efficiently. Meanwhile, any tampering with the database by the server will be detected by the client. We argue that all existing VDB schemes can only support the updating operation called replacement. That is, the client can efficiently update a data record by assigning a new value. However, the proposed solutions are not applicable for other updating operations such as insertion and deletion. In this paper, we first propose a new VDB scheme that supports all updating operations of replacement, deletion, and insertion by incorporating the techniques of commitment binding and hierarchical commitment. Security evaluation shows that the proposed construction can achieve the desired security properties in the standard computational Diffie-Hellman assumption. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:49 / 58
页数:10
相关论文
共 50 条
  • [31] Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
    Azam Soleimanian
    Shahram Khazaei
    Designs, Codes and Cryptography, 2019, 87 : 123 - 147
  • [32] Efficient and Publicly Verifiable Outsourcing of Large-scale Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    Cai, Yunlu
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (04): : 1253 - 1261
  • [33] EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation
    Xu, Chang
    Rao, Hongzhou
    Zhu, Liehuang
    Zhang, Chuan
    Sharif, Kashif
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 7007 - 7022
  • [34] Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
    Soleimanian, Azam
    Khazaei, Shahram
    DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (01) : 123 - 147
  • [35] Secure and efficient publicly verifiable outsourcing of matrix multiplication in online mode
    Erfan, Fatemeh
    Mala, Hamid
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04): : 2835 - 2845
  • [36] Hybrid Publicly Verifiable Computation
    Alderman, James
    Janson, Christian
    Cid, Carlos
    Crampton, Jason
    TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 147 - 163
  • [37] Publicly verifiable authenticated encryption
    Wen, HA
    Lo, CM
    Hwang, T
    ELECTRONICS LETTERS, 2003, 39 (19) : 1382 - 1383
  • [38] Publicly verifiable secret sharing
    Stadler, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 190 - 199
  • [39] Publicly Verifiable Auctions with Privacy
    Germouty, Paul
    Larraia, Enrique
    Zhang, Wei
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2023 INTERNATIONAL WORKSHOPS, FC 2023, 2024, 13953 : 420 - 438
  • [40] Publicly verifiable authenticated encryption
    Ma, CS
    Chen, KF
    ELECTRONICS LETTERS, 2003, 39 (03) : 281 - 282