Privacy-preserving authentication of trees and graphs

@article{Kundu2013PrivacypreservingAO,
  title={Privacy-preserving authentication of trees and graphs},
  author={Ashish Kundu and Elisa Bertino},
  journal={International Journal of Information Security},
  year={2013},
  volume={12},
  pages={467-494}
}
Secure data sharing in third-party environments such as the cloud requires that both authenticity and confidentiality of the data be assured, especially when such structures encode sensitive information (such as in XML documents). Existing authentication schemes for trees and directed acyclic graphs (DAGs) are authenticity-preserving, but not confidentiality-preserving, and lead to leakage of sensitive information during authentication. In this paper, we propose a family of three leakage-free… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

A Trusted Healthcare Data Analytics Cloud Platform

2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) • 2018
View 2 Excerpts

Expositioning of cryptography techniques in IoT domain

2017 4th International Conference on Signal Processing, Computing and Control (ISPCC) • 2017
View 1 Excerpt

Still Wrong Use of Pairings in Cryptography

IACR Cryptology ePrint Archive • 2016
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 40 references

A Certified Digital Signature

CRYPTO • 1989
View 20 Excerpts
Highly Influenced

Aggregate and Verifiably Encrypted Signatures from Bilinear Maps

IACR Cryptology ePrint Archive • 2002
View 9 Excerpts
Highly Influenced

Authenticating query results in edge computing

Proceedings. 20th International Conference on Data Engineering • 2004
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…