Cryptography for Efficiency : New Directions in Authenticated Data Structures

نویسندگان

  • Charalampos Papamanthou
  • Michael T. Goodrich
چکیده

of “Cryptography for Efficiency: New Directions in Authenticated Data Structures” by Charalampos Papamanthou, Ph.D., Brown University, May 2011. Cloud computing has emerged as an important new computational and storage medium and is increasingly being adopted both by companies and individuals as a means of reducing operational and maintenance costs. However, remotely-stored sensitive data may be lost or modified and third-party computations may not be performed correctly due to errors, opportunistic behavior, or malicious attacks. Thus, while the cloud is an attractive alternative to local trusted computational resources, users need integrity guarantees in order to fully adopt this new paradigm. Specifically, they need to be assured that uploaded data has not been altered and outsourced computations have been performed correctly. Tackling the above problems requires the design of protocols that, on the one hand, are provably secure and at the same time remain highly efficient, otherwise the main purpose of adopting cloud computing, namely efficiency and scalability, is defeated. It is therefore essential that expertise in cryptography and efficient algorithmics be combined to achieve these goals. This thesis studies techniques allowing the efficient verification of data integrity and computations correctness in such adversarial environments. Towards this end, several new authenticated data structures for fundamental algorithmics and computation problems, e.g., hash table queries and set operations, are proposed. The main novelty of this work lies in employing advanced cryptography such as lattices and bilinear maps, towards achieving high efficiency, departing from traditional hash-based primitives. As such, the proposed techniques lead to efficient solutions that introduce minimal asymptotic overhead and at the same time enable highly-desirable features such as optimal verification mechanisms and parallel authenticated data structures algorithms. The small asymptotic overhead does translate into significant practical savings, yielding efficient protocols and system prototypes. Cryptography for Efficiency: New Directions in Authenticated Data Structures by Charalampos Papamanthou B.Sc., Applied Informatics, University of Macedonia, 2003 M.Sc., Computer Science, University of Crete, 2005 M.Sc., Computer Science, Brown University, 2007 A dissertation submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Computer Science at Brown University Providence, Rhode Island May 2011 c © Copyright 2011 by Charalampos Papamanthou This dissertation by Charalampos Papamanthou is accepted in its present form by the Department of Computer Science as satisfying the dissertation requirement for the degree of Doctor of Philosophy. Date Roberto Tamassia, Director Recommended to the Graduate Council Date Michael T. Goodrich, Reader University of California, Irvine Date Anna Lysyanskaya, Reader Date Franco P. Preparata, Reader Approved by the Graduate Council Date Peter M. Weber Dean of the Graduate School iii

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking

In this work, we initially design a new authenticated data structure for a dynamic table with n entries. We present the first dynamic authenticated table that is update-optimal, using a lattice-based construction. In particular, the update complexity is O(1), improving in this way the “a priori” O(logn) update bounds of previous constructions, such as the Merkle tree. Moreover, the space comple...

متن کامل

A New Ring-Based SPHF and PAKE Protocol On Ideal Lattices

emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...

متن کامل

J-PAKE: Authenticated Key Exchange without PKI

Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. ...

متن کامل

On the Cost of Authenticated Data Structures

Authenticated data structures provide a model for data authentication, where answers to queries contain extra information that can produce a cryptographic proof about their validity. In this paper, we study the authentication cost that is associated with this model when authentication is performed through hierarchical cryptographic hashing. We introduce measures that precisely model the computa...

متن کامل

Optimal Authenticated Data Structures with Multilinear Forms

Cloud computing and cloud storage are becoming increasingly prevalent. In this paradigm, clients outsource their data and computations to third-party service providers. Data integrity in the cloud therefore becomes an important factor for the functionality of these web services. Authenticated data structures, implemented with various cryptographic primitives, have been widely studied as a means...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011