Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies
暂无分享,去创建一个
Leonid Reyzin | Alexander Chepurnoy | Dmitry Meshkov | Sasha Ivanov | Leonid Reyzin | D. Meshkov | A. Chepurnoy | L. Reyzin | S. Ivanov
[1] Michael T. Goodrich,et al. Authenticated Dictionaries for Fresh Attribute Credentials , 2003, iTrust.
[2] William Pugh,et al. Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.
[3] Cecilia R. Aragon,et al. Randomized search trees , 2005, Algorithmica.
[4] Leonidas J. Guibas,et al. A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).
[5] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[6] Clifford A. Shaffer. Data Structures and Algorithm Analysis in Java , 2011 .
[7] Elaine Shi,et al. On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.
[8] Charalampos Papamanthou,et al. New Directions in Authenticated Data Structures , 2011 .
[9] Zachary H. Jones,et al. Exploring the duality between skip lists and binary search trees , 2007, ACM-SE 45.
[10] Michael T. Goodrich,et al. On the Cost of Persistence and Authentication in Skip Lists , 2007, WEA.
[11] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[12] Alptekin Küpçü,et al. Database Outsourcing with Hierarchical Authenticated Data Structures , 2013, ICISC.
[13] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[14] Michael T. Goodrich,et al. Athos: Efficient Authentication of Outsourced File Systems , 2008, ISC.
[15] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[16] Anders Martoja. Essay on Improving Authenticated Dynamic Dictionaries , with Applications to Cryptocurrencies , 2017 .
[17] Ariel Gabizon,et al. Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.
[18] Samuel Neves,et al. BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.
[19] Dan S. Wallach,et al. Authenticated Dictionaries: Real-World Costs and Trade-Offs , 2011, TSEC.
[20] M. AdelsonVelskii,et al. AN ALGORITHM FOR THE ORGANIZATION OF INFORMATION , 1963 .
[21] M. V. Wilkes,et al. The Art of Computer Programming, Volume 3, Sorting and Searching , 1974 .
[22] Manuel Blum,et al. Checking the correctness of memories , 2005, Algorithmica.
[23] Phillip Rogaway,et al. Formalizing Human Ignorance , 2006, VIETCRYPT.
[24] Elaine Shi,et al. Authenticated data structures, generically , 2014, POPL.
[25] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[26] Roberto Tamassia,et al. Authenticated Hash Tables Based on Cryptographic Accumulators , 2014, Algorithmica.
[27] Jianfeng Ma,et al. New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.
[28] Giuseppe Di Battista,et al. Authenticated Relational Tables and Authenticated Skip Lists , 2007, DBSec.
[29] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[30] Jianfeng Ma,et al. Publicly verifiable databases with efficient insertion/deletion operations , 2017, J. Comput. Syst. Sci..
[31] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[32] M. Goodrich,et al. Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .
[33] Roberto Tamassia,et al. Efficient integrity checking of untrusted network storage , 2008, StorageSS '08.
[34] Conrado Martínez,et al. Randomized binary search trees , 1998, JACM.
[35] Aggelos Kiayias,et al. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.
[36] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[37] Roberto Tamassia,et al. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.
[38] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[39] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[40] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.