Verifiable Computation over Large Database with Incremental Updates

被引:235
作者
Chen, Xiaofeng [1 ,2 ]
Li, Jin [3 ]
Weng, Jian [4 ]
Ma, Jianfeng [1 ]
Lou, Wenjing [5 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[4] Jinan Univ, Dept Comp Sci, Tianhe 510632, Peoples R China
[5] Virginia Polytech Inst & State Univ, Dept Comp Sci, Falls Church, VA 22043 USA
基金
国家教育部博士点专项基金资助; 美国国家科学基金会; 中国国家自然科学基金;
关键词
Verifiable database; incremental cryptography; outsourcing computations; vector commitment; CLOUD;
D O I
10.1109/TC.2015.2512870
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and update a record by assigning a new value. Also, any attempt by the server to tamper with the data will be detected by the client. When the database undergoes frequent while small modifications, the client must re-compute and update the encrypted version (ciphertext) on the server at all times. For very large data, it is extremely expensive for the resources-constrained client to perform both operations from scratch. In this paper, we formalize the notion of verifiable database with incremental updates (Inc-VDB). Besides, we propose a general Inc-VDB framework by incorporating the primitive of vector commitment and the encrypt-then-incremental MAC mode of encryption. We also present a concrete Inc-VDB scheme based on the computational Diffie-Hellman (CDH) assumption. Furthermore, we prove that our construction can achieve the desired security properties.
引用
收藏
页码:3184 / 3195
页数:12
相关论文
共 53 条
[1]  
[Anonymous], P CRYPT TRACK RSA C
[2]  
[Anonymous], MITCSAILTR2011005
[3]  
[Anonymous], USENIX SECURITY
[4]  
[Anonymous], P 3 SIN FOR INT WORK
[5]   Comparing the pairing efficiency over composite-order and prime-order elliptic curves [J].
Guillevic, Aurore .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7954 LNCS :357-372
[6]  
[Anonymous], P A MEND WORKSH FDN
[7]  
[Anonymous], 2013, P 2013 ACM SIGSAC C
[8]  
[Anonymous], 2010, 2010 7 ANN IEEE COMM
[9]  
[Anonymous], 1991, DISTRIBUTED COMPUTIN
[10]  
[Anonymous], 2005, INT J INF SECUR, DOI DOI 10.1007/S10207-005-0070-3