Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies

We improve the design and implementation of two-party and three-party authenticated dynamic dictionaries and apply these dictionaries to cryptocurrency ledgers.

[1]  Michael T. Goodrich,et al.  Authenticated Dictionaries for Fresh Attribute Credentials , 2003, iTrust.

[2]  William Pugh,et al.  Skip Lists: A Probabilistic Alternative to Balanced Trees , 1989, WADS.

[3]  Cecilia R. Aragon,et al.  Randomized search trees , 2005, Algorithmica.

[4]  Leonidas J. Guibas,et al.  A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).

[5]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[6]  Clifford A. Shaffer Data Structures and Algorithm Analysis in Java , 2011 .

[7]  Elaine Shi,et al.  On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.

[8]  Charalampos Papamanthou,et al.  New Directions in Authenticated Data Structures , 2011 .

[9]  Zachary H. Jones,et al.  Exploring the duality between skip lists and binary search trees , 2007, ACM-SE 45.

[10]  Michael T. Goodrich,et al.  On the Cost of Persistence and Authentication in Skip Lists , 2007, WEA.

[11]  Michael T. Goodrich,et al.  Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[12]  Alptekin Küpçü,et al.  Database Outsourcing with Hierarchical Authenticated Data Structures , 2013, ICISC.

[13]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[14]  Michael T. Goodrich,et al.  Athos: Efficient Authentication of Outsourced File Systems , 2008, ISC.

[15]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[16]  Anders Martoja Essay on Improving Authenticated Dynamic Dictionaries , with Applications to Cryptocurrencies , 2017 .

[17]  Ariel Gabizon,et al.  Cryptocurrencies Without Proof of Work , 2014, Financial Cryptography Workshops.

[18]  Samuel Neves,et al.  BLAKE2: Simpler, Smaller, Fast as MD5 , 2013, ACNS.

[19]  Dan S. Wallach,et al.  Authenticated Dictionaries: Real-World Costs and Trade-Offs , 2011, TSEC.

[20]  M. AdelsonVelskii,et al.  AN ALGORITHM FOR THE ORGANIZATION OF INFORMATION , 1963 .

[21]  M. V. Wilkes,et al.  The Art of Computer Programming, Volume 3, Sorting and Searching , 1974 .

[22]  Manuel Blum,et al.  Checking the correctness of memories , 2005, Algorithmica.

[23]  Phillip Rogaway,et al.  Formalizing Human Ignorance , 2006, VIETCRYPT.

[24]  Elaine Shi,et al.  Authenticated data structures, generically , 2014, POPL.

[25]  Moni Naor,et al.  Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.

[26]  Roberto Tamassia,et al.  Authenticated Hash Tables Based on Cryptographic Accumulators , 2014, Algorithmica.

[27]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[28]  Giuseppe Di Battista,et al.  Authenticated Relational Tables and Authenticated Skip Lists , 2007, DBSec.

[29]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[30]  Jianfeng Ma,et al.  Publicly verifiable databases with efficient insertion/deletion operations , 2017, J. Comput. Syst. Sci..

[31]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[32]  M. Goodrich,et al.  Efficient Authenticated Dictionaries with Skip Lists and Commutative Hashing , 2000 .

[33]  Roberto Tamassia,et al.  Efficient integrity checking of untrusted network storage , 2008, StorageSS '08.

[34]  Conrado Martínez,et al.  Randomized binary search trees , 1998, JACM.

[35]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[36]  Michael Gertz,et al.  A General Model for Authenticated Data Structures , 2004, Algorithmica.

[37]  Roberto Tamassia,et al.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures , 2007, ICICS.

[38]  Tanja Lange,et al.  High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.

[39]  Michael T. Goodrich,et al.  Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.

[40]  Dario Fiore,et al.  Vector Commitments and Their Applications , 2013, Public Key Cryptography.