{"id":"https://openalex.org/W2127155618","doi":"https://doi.org/10.1007/s00453-014-9968-3","title":"Authenticated Hash Tables Based on Cryptographic Accumulators","display_name":"Authenticated Hash Tables Based on Cryptographic Accumulators","publication_year":2015,"publication_date":"2015-01-08","ids":{"openalex":"https://openalex.org/W2127155618","doi":"https://doi.org/10.1007/s00453-014-9968-3","mag":"2127155618"},"language":"en","primary_location":{"id":"doi:10.1007/s00453-014-9968-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00453-014-9968-3","pdf_url":null,"source":{"id":"https://openalex.org/S89324355","display_name":"Algorithmica","issn_l":"0178-4617","issn":["0178-4617","1432-0541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithmica","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056111614","display_name":"Charalampos Papamanthou","orcid":"https://orcid.org/0000-0002-1905-9403"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Charalampos Papamanthou","raw_affiliation_strings":["Department of Electrical and Computer Engineering and Institute of Advanced Computer Studies (UMIACS), University of Maryland, College Park, MD, USA","Department of Electrical and Computer Engineering and Institute of Advanced Computer Studies (UMIACS), University of Maryland, College Park, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering and Institute of Advanced Computer Studies (UMIACS), University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering and Institute of Advanced Computer Studies (UMIACS), University of Maryland, College Park, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079716343","display_name":"Roberto Tamassia","orcid":"https://orcid.org/0000-0003-2445-6064"},"institutions":[{"id":"https://openalex.org/I27804330","display_name":"Brown University","ror":"https://ror.org/05gq02987","country_code":"US","type":"education","lineage":["https://openalex.org/I27804330"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roberto Tamassia","raw_affiliation_strings":["Department of Computer Science, Brown University, Providence, RI, USA","Dept of Computer Science, Brown University, Providence, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Brown University, Providence, RI, USA","institution_ids":["https://openalex.org/I27804330"]},{"raw_affiliation_string":"Dept of Computer Science, Brown University, Providence, USA","institution_ids":["https://openalex.org/I27804330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110069498","display_name":"Nikos Triandopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nikos Triandopoulos","raw_affiliation_strings":["RSA Laboratories and Department of Computer Science, Boston University, Boston, MA, USA","RSA Laboratories and Department of Computer Science, Boston University, Boston, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"RSA Laboratories and Department of Computer Science, Boston University, Boston, MA, USA","institution_ids":["https://openalex.org/I111088046"]},{"raw_affiliation_string":"RSA Laboratories and Department of Computer Science, Boston University, Boston, USA#TAB#","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056111614"],"corresponding_institution_ids":["https://openalex.org/I66946132"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":4.0034,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.94324334,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"74","issue":"2","first_page":"664","last_page":"712"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7535182237625122},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.747660756111145},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6759390830993652},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.572631299495697},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.530722975730896},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5298057794570923},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.5226735472679138},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.4879874587059021},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4799916446208954},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4690069854259491},{"id":"https://openalex.org/keywords/double-hashing","display_name":"Double hashing","score":0.4675786793231964},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.43926411867141724},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4349524974822998},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.4153580069541931},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.4128061532974243},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3068823218345642},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2754001021385193},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.25216764211654663},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2342292070388794},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22920331358909607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19216924905776978},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.172776460647583},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.12428939342498779}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7535182237625122},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.747660756111145},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6759390830993652},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.572631299495697},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.530722975730896},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5298057794570923},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.5226735472679138},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.4879874587059021},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4799916446208954},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4690069854259491},{"id":"https://openalex.org/C138111711","wikidata":"https://www.wikidata.org/wiki/Q478351","display_name":"Double hashing","level":4,"score":0.4675786793231964},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.43926411867141724},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4349524974822998},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.4153580069541931},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.4128061532974243},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3068823218345642},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2754001021385193},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25216764211654663},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2342292070388794},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22920331358909607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19216924905776978},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.172776460647583},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.12428939342498779}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s00453-014-9968-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00453-014-9968-3","pdf_url":null,"source":{"id":"https://openalex.org/S89324355","display_name":"Algorithmica","issn_l":"0178-4617","issn":["0178-4617","1432-0541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithmica","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.702.7446","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.7446","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ece.umd.edu/%7Ecpap/published/algorithmica15.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.41999998688697815,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W2137705","https://openalex.org/W54518257","https://openalex.org/W87886728","https://openalex.org/W127380945","https://openalex.org/W189940358","https://openalex.org/W1481823422","https://openalex.org/W1490341282","https://openalex.org/W1491152510","https://openalex.org/W1502328873","https://openalex.org/W1507039213","https://openalex.org/W1516571257","https://openalex.org/W1523705567","https://openalex.org/W1528195422","https://openalex.org/W1555017476","https://openalex.org/W1555353059","https://openalex.org/W1561931053","https://openalex.org/W1562394980","https://openalex.org/W1566345534","https://openalex.org/W1574603618","https://openalex.org/W1577072106","https://openalex.org/W1589205472","https://openalex.org/W1591954407","https://openalex.org/W1593549950","https://openalex.org/W1607786196","https://openalex.org/W1784881995","https://openalex.org/W1824938273","https://openalex.org/W1829921177","https://openalex.org/W1851031742","https://openalex.org/W1991638668","https://openalex.org/W1994135885","https://openalex.org/W2018746447","https://openalex.org/W2023189876","https://openalex.org/W2024577968","https://openalex.org/W2027703952","https://openalex.org/W2036870446","https://openalex.org/W2052207834","https://openalex.org/W2052267638","https://openalex.org/W2057636642","https://openalex.org/W2067700169","https://openalex.org/W2069667482","https://openalex.org/W2077229436","https://openalex.org/W2111712517","https://openalex.org/W2120265856","https://openalex.org/W2125040475","https://openalex.org/W2127809567","https://openalex.org/W2142072177","https://openalex.org/W2144777244","https://openalex.org/W2148473959","https://openalex.org/W2161915070","https://openalex.org/W2169660454","https://openalex.org/W2169731081","https://openalex.org/W2171337840","https://openalex.org/W2188126039","https://openalex.org/W2399443213","https://openalex.org/W3029270458","https://openalex.org/W3145128584","https://openalex.org/W4246219036","https://openalex.org/W4299827018"],"related_works":["https://openalex.org/W2154676777","https://openalex.org/W2982222368","https://openalex.org/W4252190074","https://openalex.org/W2069568684","https://openalex.org/W2017661020","https://openalex.org/W2103058157","https://openalex.org/W4210289650","https://openalex.org/W2144564205","https://openalex.org/W2145932317","https://openalex.org/W2509647301"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":6},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
