Open Access
Implementation of an Authenticated Dictionary
Reads0
Chats0
TLDR
The software architecture and implementation of an eficient data structure for dynamically maintaining an authenticated dictionary for certijicate revocation in public key infrastructure and the pubkcation of data collections on the Internet is presented.Abstract:
We present the software architecture and implementation of an eficient data structure for dynamically maintaining an authenticated dictionary. The building blocks of the data structure are skip lists and one-way commutative hash functions. We also present the results of a preliminary experiment on the performance of the data structure. Applications of our work include certijicate revocation in public key infrastructure and the pubkcation of data collections on the Internet.read more
Citations
More filters
Proceedings ArticleDOI
Flexible authentication of XML documents
Premkumar Devanbu,Michael Gertz,April Kwong,Charles U. Martel,Glen Nuckolls,Stuart G. Stubblebine +5 more
TL;DR: This work proposes a new approach to signing XML documents which allows untrusted servers to answer certain types of path queries and selection queries over XML documents without the need for trusted on-line signing keys.
Proceedings ArticleDOI
A flexible and scalable authentication scheme for JPEG2000 image codestreams
TL;DR: This paper presents a flexible and scalable authentication scheme for JPEG2000 images based on the Merkle hash tree and digital signature that allows users to verify the authenticity and integrity of different sub-images extracted from a single compressed codestream protected with a single digital signature.
A General Model for Authentic Data Publication
TL;DR: The security theorem for Search DAGS gives simple security proofs and efficient VOs for a broad range of known structures including binary trees, multi-dimensional range trees, and skip lists, and the approach also helps to provide a clean separation between the proof of security and efficiency.
Book ChapterDOI
Securing JPEG2000 code-streams
Robert H. Deng,Yongdong Wu,Di Ma +2 more
TL;DR: Part 8 of the standard, named JPSEC, is concerned with all the security aspects of JPEG2000 image code-streams, with emphasis presently on access control and authentication.
Journal ArticleDOI
FastAD: an authenticated directory for billions of objects
TL;DR: These contributions include defining on-disk, block-oriented data structures and algorithms for authenticated directories that exceed memory capacity and optimizations that reduce the I/O required to insert and access entries in the directory.
References
More filters
Book ChapterDOI
A Certified Digital Signature
TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Proceedings ArticleDOI
Protocols for Public Key Cryptosystems
TL;DR: Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
Journal ArticleDOI
Skip lists: a probabilistic alternative to balanced trees
TL;DR: Skip lists as mentioned in this paper are data structures that use probabilistic balancing rather than strictly enforced balancing, and the algorithms for insertion and deletion in skip lists are much simpler and significantly faster than equivalent algorithms for balanced trees.
Book
Network Security: Private Communication in a Public World
TL;DR: In this article, the authors present an overview of authentication protocols and their application in the context of network-layer protocols, including the use of hash functions and authentication protocols, as well as a discussion of security issues.
Journal ArticleDOI
Certificate revocation and certificate update
Moni Naor,Kobbi Nissim +1 more
TL;DR: In this article, the authors present a solution for the problem of certificate revocation, which represents certificate revocation lists by authenticated dictionaries that support efficient verification whether a certificate is in the list or not and efficient updates (adding/removing certificates from the list).