Paper 2013/038
Verifiable Data Streaming
Dominique Schröder and Heike Schröder
Abstract
In a {verifiable data streaming} protocol, the client streams a long string to the server who stores it in its database. The stream is verifiable in the sense that the server can neither change the order of the elements nor manipulate them. The client may also retrieve data from the database and update them. The content of the database is publicly verifiable such that any party in possession of some value $s$ and a proof $\pi$ can check that $s$ is indeed in the database. We introduce the notion of verifiable data streaming and present an efficient instantiation that supports an exponential number of values based on general assumptions. Our main technique is an authentication tree in which the leaves are not fixed in advanced such that the user, knowing some trapdoor, can authenticate a new element on demand \emph{without} pre- or re-computing all other leaves. We call this data structure \emph{chameleon authentication tree} (CAT). We instantiate our scheme with primitives that are secure under the discrete logarithm assumption. The algebraic properties of this assumption allow us to obtain a very efficient verification algorithm. As a second application of CATs, we present a new transformation from any one-time to many-time signature scheme that is more efficient than previously known solutions.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. ACM CCS 2012
- Contact author(s)
- schroeder @ me com
- History
- 2013-01-29: received
- Short URL
- https://ia.cr/2013/038
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/038, author = {Dominique Schröder and Heike Schröder}, title = {Verifiable Data Streaming}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/038}, year = {2013}, url = {https://eprint.iacr.org/2013/038} }