Cryptographic Accumulators : Definitions , Constructions and Applications

  title={Cryptographic Accumulators : Definitions , Constructions and Applications},
  author={Nelly Fazio and Antonio Nicolosi and R Courant},
After their first appearance in the cryptographic community ten years ago, cryptographic accumulators have received a discontinuous attention from the researchers of the field. Although occasionally studied, there has been no systematic effort to organize the knowledge of the subject, abstracting away from the unnecessary details of specific proposals, so as to provide a reliable starting point for further investigation. The goal of this paper is to present a complete picture of the topic… CONTINUE READING
Highly Cited
This paper has 22 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 16 extracted citations

On the Impossibility of Batch Update for Cryptographic Accumulators

IACR Cryptology ePrint Archive • 2009
View 5 Excerpts
Highly Influenced

Performances of cryptographic accumulators

39th Annual IEEE Conference on Local Computer Networks • 2014
View 1 Excerpt

XOR network coding pollution prevention without homomorphic functions

2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) • 2014
View 1 Excerpt


Publications referenced by this paper.
Showing 1-10 of 14 references

Commutativity in cryptography

K. Nyberg
Proc. of the 1st Int. Workshop on Functional Analysis at Trier University, de Gruiter, W. • 1996
View 6 Excerpts
Highly Influenced

The random oracle methodology, revisited

View 4 Excerpts
Highly Influenced

Random Oracles are Practical: A Paradigm for Designing Efficient Protocols

ACM Conference on Computer and Communications Security • 1993
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…