Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation
暂无分享,去创建一个
[1] Arnold Schönhage,et al. Schnelle Berechnung von Kettenbruchentwicklungen , 1971, Acta Informatica.
[2] Giulio Malavolta,et al. Subvector Commitments with Application to Succinct Arguments , 2019, CRYPTO.
[3] Srinivasan Raghuraman,et al. KVaC: Key-Value Commitments for Blockchains and Beyond , 2020, IACR Cryptol. ePrint Arch..
[4] Charalampos Papamanthou,et al. Edrax: A Cryptocurrency with Stateless Transaction Validation , 2018, IACR Cryptol. ePrint Arch..
[5] Adi Shamir,et al. On the Generation of Cryptographically Strong Pseudo-Random Sequences , 1981, ICALP.
[6] Dan S. Wallach,et al. Efficient Data Structures For Tamper-Evident Logging , 2009, USENIX Security Symposium.
[7] Lan Nguyen,et al. Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.
[8] Jan van Leeuwen,et al. Worst-Case Optimal Insertion and Deletion Methods for Decomposable Searching Problems , 1981, Inf. Process. Lett..
[9] Mark Ryan,et al. Enhanced Certificate Transparency and End-to-End Encrypted Mail , 2014, NDSS.
[10] Zhenfei Zhang,et al. Pointproofs: Aggregating Proofs for Multiple Vector Commitments , 2020, IACR Cryptol. ePrint Arch..
[11] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[12] Nickolai Zeldovich,et al. Aardvark: A Concurrent Authenticated Dictionary with Short Proofs , 2020, IACR Cryptol. ePrint Arch..
[13] Ariel J. Feldman,et al. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.
[14] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Elaine Shi,et al. Streaming Authenticated Data Structures , 2013, EUROCRYPT.
[17] Dan Boneh,et al. Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains , 2019, IACR Cryptol. ePrint Arch..
[18] Srdjan Capkun,et al. Verena: End-to-End Integrity Protection for Web Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[19] Ittai Abraham,et al. Aggregatable Subvector Commitments for Stateless Cryptocurrencies , 2020, IACR Cryptol. ePrint Arch..
[20] Ivan Damgård,et al. Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups , 2002, EUROCRYPT.
[21] Roberto Tamassia,et al. Authenticated Hash Tables Based on Cryptographic Accumulators , 2014, Algorithmica.
[22] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[23] Moti Yung,et al. Blind, Auditable Membership Proofs , 2000, Financial Cryptography.
[24] Srinivas Devadas,et al. Transparency Logs via Append-Only Authenticated Dictionaries , 2019, IACR Cryptol. ePrint Arch..
[25] Dario Fiore,et al. Vector Commitments and Their Applications , 2013, Public Key Cryptography.
[26] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .