Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing

We present an efficient and practical technique for dynamically maintaining an authenticated dictionary. The main building blocks of our scheme are the skip list data structure and cryptographic associative hash functions. Applications of our work include certificate revocation in public key infrastructure and the the publication of data collections on the Internet.

[1]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[2]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[3]  William Pugh,et al.  Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.

[4]  J. Ian Munro,et al.  Deterministic skip lists , 1992, SODA '92.

[5]  Richard M. Karp,et al.  Mapping the genome: some combinatorial problems arising in molecular biology , 1993, STOC.

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[8]  S. Micali Eecient Certiicate Revocation , 1996 .

[9]  Alexander S. Szalay,et al.  The Science Archive for the Sloan Digital Sky Survey , 1996 .

[10]  Neal E. Young,et al.  Data collection for the Sloan Digital Sky Survey—a network-flow heuristic , 1996, SODA '96.

[11]  Paul C. Kocher On Certificate Revocation and Validation , 1998, Financial Cryptography.

[12]  Rafail Ostrovsky,et al.  Fast Digital Identity Revocation (Extended Abstract) , 1998, CRYPTO.

[13]  Michael T. Goodrich,et al.  Education forum: Web Enhanced Textbooks , 1998, SIGA.

[14]  Shohachiro Nakanishi,et al.  Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree , 1999, ISW.

[15]  Alexander S. Szalay,et al.  The Sloan Digital Sky Survey , 1999, Comput. Sci. Eng..

[16]  Peeter Laud,et al.  Accountable certificate management using undeniable attestations , 2000, CCS.

[17]  Peter Gemmell,et al.  Efficient and Fresh Cerification , 2000, Public Key Cryptography.

[18]  Carl A. Gunter,et al.  Generalized certificate revocation , 2000, POPL '00.

[19]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[20]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.