skip to main content
10.1145/2664168.2664177acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Streaming Authenticated Data Structures: Abstraction and Implementation

Published: 07 November 2014 Publication History

Abstract

In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n elements x1; x2; : : : ; xn and later, the verifier can delegate a computation (e.g., a range search query) to the untrusted prover over the stream. The prover returns the result of the computation and a cryptographic proof for its correctness. To verify the prover's result efficiently, the verifier keeps small local (logarithmic) state, which he updates while observing the stream. The challenge is to enable the verifier to update his local state with no interaction with the prover, while ensuring the prover can compute proofs efficiently.
Papamanthou et al. (EUROCRYPT 2013) introduced streaming authenticated data structures (SADS) to address the above problem. Yet their scheme is complex to describe and impractical to implement, mainly due to the use of Ajtai's lattice-based hash function. In this work we present an abstract SADS construction that can use any hash function satisfying properties that we formally define. This leads to a simpler exposition of the fundamental ideas of Papamanthou et al.'s work and to a practical implementation of a streaming authenticated data structure that employs the efficient SWIFFT hash function, which we show to comply with our abstraction. We implement both the EUROCRYPT 2013 construction and our new scheme and report major savings in prover time and public key size.

References

[1]
M. Artin. Algebra (Vol. 2.). Pearson, 2010.
[2]
D. Boneh and X. Boyen. Memory Delegation. On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. In CRYPTO, pp. 570--583, 2006.
[3]
K.-M. Chung, Y. T. Kalai, F.-H. Liu, and R. Raz. Memory Delegation. In CRYPTO, pp. 151--168, 2011.
[4]
G. Cormode, M. Mitzenmacher, and J. Thaler. Practical Verified Computation with Streaming Interactive Proofs. In ITCS, pp. 90--112, 2012.
[5]
G. Cormode, J. Thaler, and K. Yi. Verifying Computations with Streaming Interactive Proofs. In PVLDB, 5(1):25--36, 2011.
[6]
C. Estan, G. V. C. Estan, and G. Varghese. New Directions in Traffic Measurement and Accounting: Focusing on the Elephants, Ignoring the Mice. In ACM TOCS, 21(3):270--313, 2003.
[7]
R. Gennaro, C. Gentry, and B. Parno. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In CRYPTO, pp. 465--482, 2010.
[8]
V. Lybuashevsky and D. Micciancio. Generalized Compact Knapsacks Are Collision Resistant. In ICALP, pp. 144--155, 2006.
[9]
V. Lybuashevsky, D. Micciancio, C. Peikert, and A. Rosen. Swifft: A Modest Proposal for FFT Hashing. In FSE, pp. 54--72, 2008.
[10]
R. C. Merkle. A Certified Digital Signature. In CRYPTO, pp. 218--238, 1989.
[11]
D. Micciancio and O. Regev. Worst-case to Average-case Reductions Based on Gaussian Measures. In SICOMP, 37(1):267--302, 2007.
[12]
D. Micciancio and O. Regev. Lattice-based Cryptography. In PQCRPTO, pp. 147--191, 2009.
[13]
C. Papamanthou, E. Shi, R. Tamassia, and K. Yi. Streaming Authenticated Data Structures. In EUROCRYPT, pp. 353--370, 2013.
[14]
C. Papamanthou and R. Tamassia. Time and Space Efficient Algorithms for Two-party Authenticated Data Structures. In ICICS, pp. 1--15, 2007.
[15]
B. Parno, M. Raykova, and V. Vaikuntanathan. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption. In TCC, pp. 422--439, 2012.
[16]
D. Shröder, and H. Shröder. Verifiable Data Streaming. In CCS, pp. 953--964, 2012.
[17]
D. Wagner. A Generalized Birthday Problem. In CRYPTO, pp. 288--303, 2002.

Cited By

View all
  • (2025)Towards Efficient Verifiable Cloud Storage and Distribution for Large-Scale Data StreamingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2025.352664236:3(487-501)Online publication date: Mar-2025
  • (2024)AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image RetrievalIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3355223(1-15)Online publication date: 2024
  • (2024)A Maintainable Matrix Commitment Scheme with Constant-Size Public Parameters and Incremental Aggregation2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00030(172-185)Online publication date: 8-Jul-2024
  • Show More Cited By

Index Terms

  1. Streaming Authenticated Data Structures: Abstraction and Implementation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCSW '14: Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security
      November 2014
      160 pages
      ISBN:9781450332392
      DOI:10.1145/2664168
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. abstract sads
      2. gck hash function
      3. streaming authenticated data structures

      Qualifiers

      • Research-article

      Conference

      CCS'14
      Sponsor:

      Acceptance Rates

      CCSW '14 Paper Acceptance Rate 12 of 36 submissions, 33%;
      Overall Acceptance Rate 37 of 108 submissions, 34%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)14
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 15 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Towards Efficient Verifiable Cloud Storage and Distribution for Large-Scale Data StreamingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2025.352664236:3(487-501)Online publication date: Mar-2025
      • (2024)AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image RetrievalIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.3355223(1-15)Online publication date: 2024
      • (2024)A Maintainable Matrix Commitment Scheme with Constant-Size Public Parameters and Incremental Aggregation2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00030(172-185)Online publication date: 8-Jul-2024
      • (2022)MatproofsProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560591(2041-2054)Online publication date: 7-Nov-2022
      • (2022)Modelling a secure framework for data verification and integrity in cloud environmentInternational Journal of System Assurance Engineering and Management10.1007/s13198-022-01753-8Online publication date: 20-Aug-2022
      • (2021)Authenticated key-value stores with hardware enclavesProceedings of the 22nd International Middleware Conference: Industrial Track10.1145/3491084.3491425(1-8)Online publication date: 6-Dec-2021
      • (2021)Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation SystemsIEEE Transactions on Industrial Informatics10.1109/TII.2020.300801217:6(4279-4287)Online publication date: Jun-2021
      • (2020)An Adaptive Authenticated Data Structure With Privacy-Preserving for Big Data Stream in CloudIEEE Transactions on Information Forensics and Security10.1109/TIFS.2020.298687915(3295-3310)Online publication date: 2020
      • (2019)ConcurDB: Concurrent Query Authentication for Outsourced DatabasesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.2943557(1-1)Online publication date: 2019
      • (2018)VENUS: Verifiable range query in data streamingIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406898(160-165)Online publication date: Apr-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media