scispace - formally typeset
Open Access

Implementation of an Authenticated Dictionary

Reads0
Chats0
TLDR
The software architecture and implementation of an eficient data structure for dynamically maintaining an authenticated dictionary for certijicate revocation in public key infrastructure and the pubkcation of data collections on the Internet is presented.
Abstract
We present the software architecture and implementation of an eficient data structure for dynamically maintaining an authenticated dictionary. The building blocks of the data structure are skip lists and one-way commutative hash functions. We also present the results of a preliminary experiment on the performance of the data structure. Applications of our work include certijicate revocation in public key infrastructure and the pubkcation of data collections on the Internet.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Flexible authentication of XML documents

TL;DR: This work proposes a new approach to signing XML documents which allows untrusted servers to answer certain types of path queries and selection queries over XML documents without the need for trusted on-line signing keys.
Proceedings ArticleDOI

A flexible and scalable authentication scheme for JPEG2000 image codestreams

TL;DR: This paper presents a flexible and scalable authentication scheme for JPEG2000 images based on the Merkle hash tree and digital signature that allows users to verify the authenticity and integrity of different sub-images extracted from a single compressed codestream protected with a single digital signature.

A General Model for Authentic Data Publication

TL;DR: The security theorem for Search DAGS gives simple security proofs and efficient VOs for a broad range of known structures including binary trees, multi-dimensional range trees, and skip lists, and the approach also helps to provide a clean separation between the proof of security and efficiency.
Book ChapterDOI

Securing JPEG2000 code-streams

TL;DR: Part 8 of the standard, named JPSEC, is concerned with all the security aspects of JPEG2000 image code-streams, with emphasis presently on access control and authentication.
Journal ArticleDOI

FastAD: an authenticated directory for billions of objects

TL;DR: These contributions include defining on-disk, block-oriented data structures and algorithms for authenticated directories that exceed memory capacity and optimizations that reduce the I/O required to insert and access entries in the directory.
References
More filters
Book ChapterDOI

A Certified Digital Signature

TL;DR: A practical digital signature system based on a conventionalryption function which is as secure as the conventional encryption function is described, without the several years delay required for certification of an untested system.
Proceedings ArticleDOI

Protocols for Public Key Cryptosystems

TL;DR: Several protocols for public key distribution and for digital signatures are briefly compared with each other and with the conventional alternative.
Journal ArticleDOI

Skip lists: a probabilistic alternative to balanced trees

TL;DR: Skip lists as mentioned in this paper are data structures that use probabilistic balancing rather than strictly enforced balancing, and the algorithms for insertion and deletion in skip lists are much simpler and significantly faster than equivalent algorithms for balanced trees.
Book

Network Security: Private Communication in a Public World

TL;DR: In this article, the authors present an overview of authentication protocols and their application in the context of network-layer protocols, including the use of hash functions and authentication protocols, as well as a discussion of security issues.
Journal ArticleDOI

Certificate revocation and certificate update

TL;DR: In this article, the authors present a solution for the problem of certificate revocation, which represents certificate revocation lists by authenticated dictionaries that support efficient verification whether a certificate is in the list or not and efficient updates (adding/removing certificates from the list).
Related Papers (5)