Fractal Merkle tree representation and traversal

  • Authors:
  • Markus Jakobsson;Tom Leighton;Silvio Micali;Michael Szydlo

  • Affiliations:
  • RSA Laboratories, Bedford, MA;MIT Laboratory for Computer Science, Cambridge, MA and Akamai Technologies, Cambridge, MA;Akamai Technologies, Cambridge, MA;RSA Laboratories, Bedford, MA

  • Venue:
  • CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We present techniques for authenticating data structures that represent graphs and collections of geometric objects. In our model, a data structure maintained by a trusted source is mirrored at distributed directories that answer queries and provide proof of correctness. Our work has applications to the authentication of network management systems and geographic information systems.