Abstract
Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We present techniques for authenticating data structures that represent graphs and collections of geometric objects. In our model, a data structure maintained by a trusted source is mirrored at distributed directories that answer queries and provide proof of correctness. Our work has applications to the authentication of network management systems and geographic information systems.
Research supported in part by DARPA Grant F30602-00-2-0509 and NSFGrant CCR-0098068.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379–393. Springer-Verlag, 2001. 297
S. Ar, M. Blum, B. Codenotti, and P. Gemmell. Checking approximate computations over the reals. In Proc. ACM Symp. on the Theory of Computing, pages 786–795, 1993. 295
S. W. Bent, D. D. Sleator, and R. E. Tarjan. Biased search trees. SIAM J. Comput., 14:545–568, 1985. 302, 310
M. Blum and S. Kannan. Designing programs that check their work. J. ACM, 42(1):269–291, Jan. 1995. 295
J. D. Bright and G. Sullivan. Checking mergeable priority queues. In Digest of the 24th Symposium on Fault-Tolerant Computing, pages 144–153. IEEE Computer Society Press, 1994. 295
J. D. Bright and G. Sullivan. On-line error monitoring for several data structures. In Digest of the 25th Symposium on Fault-Tolerant Computing, pages 392–401. IEEE Computer Society Press, 1995. 295
J. D. Bright, G. Sullivan, and G. M. Masson. Checking the integrity of trees. In Digest of the 25th Symposium on Fault-Tolerant Computing, pages 402–411. IEEE Computer Society Press, 1995. 295
A. Buldas, P. Laud, and H. Lipmaa. Accountable certificate management using undeniable attestations. In ACM Conference on Computer and Communications Security, pages 9–18. ACM Press, 2000. 297
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proc. CRYPTO, 2002. 297
B. Chazelle and L. J. Guibas. Fractional cascading: I. A data structuring technique. Algorithmica, 1(3):133–162, 1986. 297, 303
B. Chazelle and L. J. Guibas. Fractional cascading: II. Applications. Algorithmica, 1:163–191, 1986. 298, 306
R. F. Cohen and R. Tamassia. Combine and conquer. Algorithmica, 18:342–362, 1997. 299
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. Stubblebine. Flexible authentication of XML documents. In Proc. ACM Conference on Computer and Communications Security, 2001. 297
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic third-party data publication. In Fourteenth IFIP 11.3 Conference on Database Security, 2000. 297
O. Devillers, G. Liotta, F. P. Preparata, and R. Tamassia. Checking the convexity of polytopes and the planarity of subdivisions. Comput. Geom. Theory Appl., 11:187–208, 1998. 295
G. Di Battista and G. Liotta. Upward planarity checking: “Faces are more than polygons”. In S. H. Whitesides, editor, Graph Drawing (Proc. GD’ 98), volume 1547 of Lecture Notes Comput. Sci., pages 72–86. Springer-Verlag, 1998. 295
G. Di Battista and R. Tamassia. On-line maintenance of triconnected components with SPQR-trees. Algorithmica, 15:302–318, 1996. 312
D. Eppstein, G. F. Italiano, R. Tamassia, R. E. Tarjan, J. Westbrook, and M. Yung. Maintenance of a minimum spanning forest in a dynamic plane graph. J. Algorithms, 13(1):33–54, 1992. 311
U. Finkler and K. Mehlhorn. Checking priority queues. In Proc. 10th ACM-SIAM Symp. on Discrete Algorithms, pages S901–S902, 1999. 295
I. Gassko, P. S. Gemmell, and P. MacKenzie. Efficient and fresh certification. In Int. Workshop on Practice and Theory in Public Key Cryptography (PKC’ 2000), volume 1751 of LNCS, pages 342–353. Springer-Verlag, 2000. 297
M. T. Goodrich and R. Tamassia. Efficient authenticated dictionaries with skip lists and commutative hashing. Technical report, Johns Hopkins Information Security Institute, 2000. http://www.cs.brown.edu/cgc/stms/papers/hashskip.pdf. 296, 297, 311
M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In Proc. Int. Security Conference (ISC 2002), volume 2433 of LNCS, pages 372–388. Springer-Verlag, 2002. 297
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In Proc. 2001 DARPA Information Survivability Conference and Exposition, volume 2, pages 68–82, 2001. 297
V. King. A simpler minimum spanning tree verification algorithm. In Workshop on Algorithms and Data Structures, pages 440–448, 1995. 295
P. C. Kocher. On certificate revocation and validation. In Proc. Int. Conf. on Financial Cryptography, volume 1465 of LNCS. Springer-Verlag, 1998. 296
P. Maniatis and M. Baker. Enabling the Archival Storage of Signed Documents. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST 2002), Monterey, CA, USA, 2002. 297
P. Maniatis and M. Baker. Secure History Preservation Through Timeline Entanglement. In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, 2002. 297
C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, and S. Stubblebine. A general model for authentic data publication, 2001. http://www.cs.ucdavis.edu/~devanbu/files/model-paper.pdf. 296, 297, 298
K. Mehlhorn and S. Näher. LEDA: A Platform for Combinatorial and Geometric Computing. Cambridge University Press, Cambridge, UK, 2000. 295
K. Mehlhorn, S. Näher, M. Seel, R. Seidel, T. Schilz, S. Schirra, and C. Uhrig. Checking geometric programs or verification of geometric structures. Comput. Geom. Theory Appl., 12(1–2):85–103, 1999. 295
R. C. Merkle. Protocols for public key cryptosystems. In Proc. Symp. on Security and Privacy, pages 122–134. IEEE Computer Society Press, 1980. 296
R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO’ 89, volume 435 of LNCS, pages 218–238. Springer-Verlag, 1990. 296
M. Naor and K. Nissim. Certificate revocation and certificate update. In Proc. 7th USENIX Security Symposium, pages 217–228, Berkeley, 1998. 296, 297
F. P. Preparata and M. I. Shamos. Computational Geometry: An Introduction. Springer-Verlag, 3rd edition, Oct. 1990. 298
W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Commun. ACM, 33(6):668–676, 1990. 297
D. D. Sleator and R. E. Tarjan. A data structure for dynamic trees. J. Comput. Syst. Sci., 26(3):362–381, 1983. 301, 310
G. F. Sullivan and G. M. Masson. Certification trails for data structures. In Digest of the 21st Symposium on Fault-Tolerant Computing, pages 240–247. IEEE Computer Society Press, 1991. 295
G. F. Sullivan, D. S. Wilson, and G. M. Masson. Certification of computational results. IEEE Trans. Comput., 44(7):833–847, 1995. 295
J. Westbrook and R. E. Tarjan. Maintaining bridge-connected and biconnected components on-line. Algorithmica, 7:433–464, 1992. 311
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R. (2003). Authenticated Data Structures for Graph and Geometric Searching. In: Joye, M. (eds) Topics in Cryptology — CT-RSA 2003. CT-RSA 2003. Lecture Notes in Computer Science, vol 2612. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36563-X_20
Download citation
DOI: https://doi.org/10.1007/3-540-36563-X_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00847-7
Online ISBN: 978-3-540-36563-1
eBook Packages: Springer Book Archive