Poster: Zero-Knowledge Authenticated Order Queries and Applications
نویسندگان
چکیده
Releasing verifiable partial information while maintaining privacy of the rest of the data is a requirement in many practical scenarios. In particular, maintaining an ordered list of elements in a trustworthy and privacy-preserving manner has a number of applications in management of network information and health care data. In this poster, we discuss our efficient, fully dynamic, secure and privacy-preserving mechanisms that allow querying of member and order information on the data stored in lists, trees, or posets of bounded dimension. I. DYNAMIC PRIVACY-PRESERVING AUTHENTICATED DATA STRUCTURE MODEL Motivated by networking and cloud computing applications, we introduce a formal model of a dynamic privacy-preserving authenticated data structure (DPPADS). It is a three party model where the owner outsources his data structure to a server who answers queries issued by a set of distributed clients. The owner can at any point update the data structure. The server answers queries in such a way that the clients (1) can verify the correctness of the answers but (2) do not learn anything about the data structure besides what can be inferred from the query answers. This poster is based on [1] (to appear in ACNS 2015) and [2].
منابع مشابه
Verifiable Member and Order Queries on a List in Zero-Knowledge
We introduce a formal model for order queries on lists in zero knowledge in the traditional authenticated data structure model. We call this model Privacy-Preserving Authenticated List (PPAL). In this model, the queries are performed on the list stored in the (untrusted) cloud where data integrity and privacy have to be maintained. To realize an efficient authenticated data structure, we first ...
متن کاملVerifiable Order Queries and Order Statistics on a List in Zero-Knowledge∗
Given a list L with n elements, an order query on L asks whether a given element x ∈ L precedes or follows another element y ∈ L . More generally, given a set of m elements from L , an order query asks for the set ordered according to the positions of the elements in L . We introduce two formal models for answering order queries on a list in a verifiable manner and in zero-knowledge. We also pr...
متن کاملAuthenticated Range \& Closest Point Queries in Zero-Knowledge
We present an efficient method for answering one-dimensional range and closest-point queries in a verifiable and privacy-preserving manner. We consider a model where a data owner outsources a dataset of key-value pairs to a server, who answers range and closest-point queries issued by a client and provides proofs of the answers. The client verifies the correctness of the answers while learning ...
متن کاملTrapdoor Smooth Projective Hash Functions
Katz and Vaikuntanathan recently improved smooth projective hash functions in order to build oneround password-authenticated key exchange protocols (PAKE). To achieve security in the UC framework they allowed the simulator to extract the hashing key, which required simulation-sound non-interactive zero-knowledge proofs that are unfortunately ine cient. We improve the way the latter extractabili...
متن کاملCPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015