Efficient authenticated data structures for graph connectivity and geometric search problems

From MaRDI portal
Publication:548654

DOI10.1007/S00453-009-9355-7zbMATH Open1218.68081arXiv0908.4116OpenAlexW2148473959MaRDI QIDQ548654FDOQ548654


Authors: Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos Edit this on Wikidata


Publication date: 30 June 2011

Published in: Algorithmica (Search for Journal in Brave)

Abstract: Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is being controlled by a remote untrusted host. We present efficient techniques for authenticating data structures that represent graphs and collections of geometric objects. We introduce the path hash accumulator, a new primitive based on cryptographic hashing for efficiently authenticating various properties of structured data represented as paths, including any decomposable query over sequences of elements. We show how to employ our primitive to authenticate queries about properties of paths in graphs and search queries on multi-catalogs. This allows the design of new, efficient authenticated data structures for fundamental problems on networks, such as path and connectivity queries over graphs, and complex queries on two-dimensional geometric objects, such as intersection and containment queries.


Full work available at URL: https://arxiv.org/abs/0908.4116




Recommendations




Cites Work


Cited In (3)

Uses Software





This page was built for publication: Efficient authenticated data structures for graph connectivity and geometric search problems

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q548654)