A bridging model for parallel computation
Communications of the ACM
Protecting data privacy in private information retrieval schemes
Journal of Computer and System Sciences - 30th annual ACM symposium on theory of computing
Communications of the ACM
Symmetrically Private Information Retrieval
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Practical Techniques for Searches on Encrypted Data
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Journal of Complexity - Special issue on coding and cryptography
Distributed Load Balancing in Heterogeneous Peer-to-Peer Networks for Web Computing Libraries
DS-RT '06 Proceedings of the 10th IEEE international symposium on Distributed Simulation and Real-Time Applications
A Distributed Implementation of the Certified Information Access Service
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
IWCSE '09 Proceedings of the 2009 Second International Workshop on Computer Science and Engineering - Volume 02
Distributed certified information access for mobile devices
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Non-interactive verifiable computing: outsourcing computation to untrusted workers
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
A web computing environment for parallel algorithms in java
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Load balancing strategies in a web computing environment
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Updatable zero-knowledge databases
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Mercurial commitments with applications to zero-knowledge sets
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Mercurial commitments: minimal assumptions and efficient constructions
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Zero-Knowledge Sets With Short Proofs
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Certified Information Access (CIA) primitive allows a user to obtain answers to database queries in a way that she can verify the correctness of the received information. The database owner answers a query by providing the information matching the query along with a proof that such information are consistent with the actual content of the database. Current solutions to this problem require a computationally intensive setup phase. We describe two secure distributed implementations of a CIA service. In the first one, the database owner distributes the evaluation of a computation intensive function (e.g., exponentiations) among a set of untrusted peers and locally reconstructs the result of such an evaluation. In the second one, we propose a protocol for securely outsourcing the whole computation of the data structures used in the implementations of the CIA primitive. In this case, the main issue to be considered is the need of guaranteeing on the one hand the confidentiality of the database contents and, on the other hand, the correctness and soundness of the answers obtained by the users. We argue that classical cryptographic primitives are not sufficient for our purposes and we introduce a new primitive, the Verifiable Deterministic Envelope, that may be of independent interest.