搜索结果: 1-10 共查到“Authenticated Data”相关记录10条 . 查询时间(0.046 秒)
Town Crier: An Authenticated Data Feed for Smart Contracts
applications SGX smart contracts
2016/2/22
Smart contracts are programs that execute autonomously
on blockchains. Many of their envisioned uses require
them to consume data from outside the blockchain. (For
example, a financial instrument m...
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
privacy zero-knowledge proof systems
2016/1/8
We study the problem of privacy-preserving proofs on authenticated data, where a party
receives data from a trusted source and is requested to prove computations over the data to third
parties in a ...
Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure
Authenticated Data Structure secure authenticated data structure
2016/1/5
We present Balloon, a forward-secure append-only persistent
authenticated data structure. Balloon is designed for an initially trusted
author that generates events to be stored in a data structure (...
Database Outsourcing with Hierarchical Authenticated Data Structures
Databases outsourcing Hierarchical authenticated data structures Authenticated join processing
2015/12/31
In an outsourced database scheme, the data owner delegates the data management tasks to a remote service
provider. At a later time, the remote service is supposed to answer any query on the database....
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on authenticated data via the notion of slightly homomorphic signat...
Computing on Authenticated Data for Adjustable Predicates
public-key cryptography Signatures homomorphic redactable predicate
2013/4/18
The notion of P-homomorphic signatures, introduced by Ahn et al. (TCC 2012), generalizes various approaches for public computations on authenticated data. For a given predicate P anyone can derive a s...
Computing on Authenticated Data
public-key cryptography / authentication homomorphic signatures quoting
2012/3/29
In tandem with recent progress on computing on encrypted data via fully homomorphic encryption, we present a framework for computing on *authenticated* data via the notion of slightly homomorphic sign...
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
Cryptography for Efficiency Authenticated Data Lattices Parallel Online Memory Checking
2011/3/11
In this work, we initially design a new authenticated data structure
for a dynamic table with n entries. We present the first dynamic authenticated
table that is update-optimal, using a lattice-base...
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking
authenticated data structures lattice-based cryptography memory checking
2012/3/29
In this work, we initially design a new authenticated data structure for a \emph{dynamic table} with $n$ entries. We present the first dynamic authenticated table that is \emph{update-optimal}, using ...
In tandem with recent progress on computing on encrypted data via fully homomorphic
encryption, we present a framework for computing on authenticated data via the notion of
slightly homomorphic sign...