Oblivious data structures: applications to cryptography

We introduce the notion of oblivious data structure, motivated by the use of data structuresin cryptography. Informally, an oblivious data structure yields no knowledge about the sequence of operations that have been applied to it other than the final result of the operations. In particular we define Oblivious Tree, a data structure very similar to 2-3 Tree, but with the additional property that the only information conveyed by an Oblivious Tree is the set of values stored at its leaves. This property is achieved through the use of randomization by the update algorithms. We use the Oblivious Tree data structure to solve the privacy problem for incremental digital signatures raised by Bellare, Goldreich and Goldwasser. An incremental signing algorithm is private if the digital signature it outputs does not give any information on the sequence of edit operations that have been applied to produce the final document. We show how the incremental signature scheme of Bellare, Goldreich and Goldwassercan be made achieve privacy using Oblivious Trees instead of 2-3 Trees.

[1]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[2]  Silvio Micali,et al.  A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..

[3]  Cecilia R. Aragon,et al.  Randomized search trees , 1989, 30th Annual Symposium on Foundations of Computer Science.

[4]  William Pugh,et al.  Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.

[5]  Martin Wirsing,et al.  Algebraic Specification , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[6]  A. Andersson,et al.  Faster uniquely represented dictionaries , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[7]  Birgit Pfitzmann,et al.  How To Break and Repair A "Provably Secure" Untraceable Payment System , 1991, CRYPTO.

[8]  Mihir Bellare,et al.  Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.

[9]  Mihir Bellare,et al.  Incremental cryptography and application to virus protection , 1995, STOC '95.