CHRONOS: an authenticated dictionary based on skip lists for timestamping systems

Skip Lists were first used as data structures for their simple implementation and optimal update and search time. Goodrich [7][8] was the first to propose an authenticated dictionary based on skip lists. More recently, Maniatis and Baker [10][11][12] have proposed an authenticated append only dictionary based on perfect skip lists. In this paper, we propose an authenticated append only dictionary which offers better performances than the previous proposals. Moreover this dictionary allows comparing the relative order of elements. Such a dictionary could be used for timestamping purposes.

[1]  Peeter Laud,et al.  Accountable certificate management using undeniable attestations , 2000, CCS.

[2]  Stuart Haber,et al.  Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .

[3]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[4]  Mary Baker,et al.  Authenticated Append-only Skip Lists , 2003, ArXiv.

[5]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[6]  Mary Baker,et al.  Historic integrity in distributed systems , 2003 .

[7]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[8]  Michael T. Goodrich,et al.  Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.

[9]  Paul C. Kocher On Certificate Revocation and Validation , 1998, Financial Cryptography.

[10]  William Pugh,et al.  Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.

[11]  Ahto Buldas,et al.  Optimally Efficient Accountable Time-Stamping , 2000, Public Key Cryptography.

[12]  Michael T. Goodrich,et al.  Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[13]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[14]  Mary Baker,et al.  Secure History Preservation Through Timeline Entanglement , 2002, USENIX Security Symposium.

[15]  M. Goodrich,et al.  Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .

[16]  Jan Willemson,et al.  Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.