Cryptology ePrint Archive: Report 2010/128

Update-Optimal Authenticated Structures Based on Lattices

Charalampos Papamanthou and Roberto Tamassia

Abstract: We study the problem of authenticating a \emph{dynamic table} with $n$ entries in the authenticated data structures model, which is related to memory checking. We present the first dynamic authenticated table that is \emph{update-optimal}, using a \emph{lattice-based} construction. In particular, the update time is $O(1)$, improving in this way the ``a priori'' $O(\log n)$ update bounds for previous constructions, such as the Merkle tree. Moreover, the space used by our data structure is $O(n)$ and logarithmic bounds hold for the other complexity measures, such as \emph{proof size}. To achieve this result, we exploit the \emph{linearity} of lattice-based hash functions and show how the security of lattice-based digests can be guaranteed under updates. This is the first construction achieving constant update bounds without causing other time complexities to increase beyond logarithmic. All previous solutions enjoying constant update complexity have $\Omega(n^\epsilon)$ proof or query bounds. As an application of our lattice-based authenticated table, we provide the first construction of an authenticated Bloom filter, an update-intensive data structure that falls into our model.

Category / Keywords: authenticated data structures, lattice-based cryptography

Date: received 7 Mar 2010, last revised 8 Jul 2010, withdrawn 1 Mar 2011

Contact author: cpap at cs brown edu

Available format(s): (-- withdrawn --)

Version: 20110301:202015 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]