Authenticated data structures for graph and geometric searching

  • Authors:
  • Michael T. Goodrich;Roberto Tamassia;Nikos Triandopoulos;Robert Cohen

  • Affiliations:
  • Dept. Computer Science, Univ. of California, Irvine;Dept. Computer Science, Brown University;Dept. Computer Science, Brown University;Dept. Computer Science, Univ. of Massachusetts, Boston

  • Venue:
  • CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

In Crypto '95, Micali and Sidney proposed a method for shared generation of a pseudo-random function f(ċ) among n players in such a way that for all the inputs x, any u players can compute f(x) while t or fewer players fail to do so, where 0 ≤ t u ≤ n. The idea behind the Micali-Sidney scheme is to generate and distribute secret seeds S = {s1, ..., sd} of a poly-random collection of functions, among the n players, each player gets a subset of S, in such a way that any u players together hold all the secret seeds in S while any t or fewer players will lack at least one element from S. The pseudo-random function is then computed as f(x) = ⊕i=1d fsi (x), where fsi (ċ)'s are poly-random functions. One question raised by Micali and Sidney is how to distribute the secret seeds satisfying the above condition such that the number of seeds, d, is as small as possible. In this paper, we continue the work of Micali and Sidney.We first provide a general framework for shared generation of pseudo-random function using cumulative maps. We demonstrate that the Micali-Sidney scheme is a special case of this general construction.We then derive an upper and a lower bound for d. Finally we give a simple, yet efficient, approximation greedy algorithm for generating the secret seeds S in which d is close to the optimum by a factor of at most u ln 2.