{"id":"https://openalex.org/W2786047317","doi":"https://doi.org/10.1109/pccc.2017.8280476","title":"Efficient tamper-evident logging of distributed systems via concurrent authenticated tree","display_name":"Efficient tamper-evident logging of distributed systems via concurrent authenticated tree","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2786047317","doi":"https://doi.org/10.1109/pccc.2017.8280476","mag":"2786047317"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2017.8280476","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2017.8280476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045992033","display_name":"Fangxiao Ning","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fangxiao Ning","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008201587","display_name":"Wen Yu","orcid":"https://orcid.org/0000-0002-9540-7924"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Wen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106405285","display_name":"Gang Shi","orcid":"https://orcid.org/0009-0006-7152-9210"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Shi","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101525319","display_name":"Dan Meng","orcid":"https://orcid.org/0000-0003-1980-9283"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Meng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5045992033"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.6216,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7423173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"35","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8552045822143555},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.8195524215698242},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5963865518569946},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5732232928276062},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5238737463951111},{"id":"https://openalex.org/keywords/hash-tree","display_name":"Hash tree","score":0.5218724012374878},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4435702860355377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3203713893890381},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.3171401619911194},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.24154320359230042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8552045822143555},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.8195524215698242},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5963865518569946},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5732232928276062},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5238737463951111},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.5218724012374878},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4435702860355377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3203713893890381},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3171401619911194},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.24154320359230042},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pccc.2017.8280476","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2017.8280476","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.4300000071525574,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W141761747","https://openalex.org/W188726702","https://openalex.org/W562242262","https://openalex.org/W1600255172","https://openalex.org/W1660562555","https://openalex.org/W1983949504","https://openalex.org/W1987593503","https://openalex.org/W1997787524","https://openalex.org/W1999458275","https://openalex.org/W2039157918","https://openalex.org/W2048459004","https://openalex.org/W2116998101","https://openalex.org/W2123110810","https://openalex.org/W2129876196","https://openalex.org/W2153522563","https://openalex.org/W2155690458","https://openalex.org/W2164425130","https://openalex.org/W2183816381","https://openalex.org/W2252980215","https://openalex.org/W2399650993","https://openalex.org/W2601206855","https://openalex.org/W2612534859","https://openalex.org/W2950085508","https://openalex.org/W4233819588","https://openalex.org/W6605793882","https://openalex.org/W6607528890","https://openalex.org/W6712677956","https://openalex.org/W6763693232"],"related_works":["https://openalex.org/W4387259453","https://openalex.org/W2144564205","https://openalex.org/W2154676777","https://openalex.org/W4252190074","https://openalex.org/W2768195082","https://openalex.org/W53898159","https://openalex.org/W2145932317","https://openalex.org/W2982222368","https://openalex.org/W2952942094","https://openalex.org/W4210289650"],"abstract_inverted_index":{"Secure":[0],"logging":[1,88,110],"as":[2],"an":[3,26],"indispensable":[4],"part":[5],"of":[6,44,50,64,81,146,154,174,182,199,260],"any":[7],"secure":[8,86],"system":[9,33],"in":[10,29,52,111,185,285],"practice":[11],"is":[12,34,106,157,167,266,289],"well-understood":[13],"by":[14],"both":[15],"academia":[16],"and":[17,41,178,229,252,263,273],"industry.":[18],"However,":[19],"providing":[20],"security":[21,54],"for":[22,98,109,235],"audit":[23,87],"logs":[24],"on":[25,75,249],"untrusted":[27],"machine":[28],"a":[30,36,151,159,168,195,215,243,286],"large":[31],"distributed":[32,101,188],"still":[35],"challenging":[37],"task.":[38],"The":[39,143,207,277],"emergence":[40],"wide":[42],"availability":[43],"log":[45,66,121,135,175,225,251],"management":[46],"tools":[47],"prompted":[48],"plenty":[49],"work":[51],"the":[53,65,76,163,172,179,186,204,231,261,270,294],"community":[55],"that":[56,94,210,280],"allows":[57,224],"clients":[58],"or":[59,78,114],"auditors":[60],"to":[61,71,118,138,161,233,238,268],"verify":[62,274],"integrity":[63,183],"data.":[67],"Most":[68],"recent":[69],"solutions":[70],"this":[72,191],"problem":[73],"focus":[74],"space-efficiency":[77],"public":[79],"verifiability":[80],"forward":[82],"security.":[83],"Unfortunately,":[84],"existing":[85,205,264],"schemes":[89],"have":[90],"significant":[91],"performance":[92,198,208],"limitations":[93,128],"make":[95],"them":[96],"impractical":[97],"realtime":[99],"large-scale":[100,134,187],"applications:":[102],"Existing":[103],"cryptographic":[104],"hashing":[105,247],"computationally":[107],"expensive":[108],"task":[112],"intensive":[113],"resource-constrained":[115],"systems":[116],"especially":[117],"prove":[119],"individual":[120],"events,":[122],"while":[123],"Merkle-tree":[124,147],"approach":[125,149],"has":[126],"fundamental":[127],"when":[129],"face":[130],"with":[131,203],"highly":[132],"concurrent,":[133],"streams":[136,176],"due":[137],"its":[139],"serially":[140],"appending":[141,228],"feature.":[142],"verification":[144,184],"step":[145],"based":[148,248],"requiring":[150],"logarithmic":[152],"number":[153],"hash":[155],"computations":[156],"becoming":[158],"bottleneck":[160],"improve":[162],"overall":[164],"performance.":[165],"There":[166],"huge":[169],"gap":[170],"between":[171],"flux":[173],"collected":[177],"computational":[180],"efficiency":[181],"systems.":[189],"In":[190],"work,":[192],"we":[193,211],"develop":[194],"novel":[196,216],"scheme,":[197],"which":[200,223],"favorably":[201],"compares":[202],"solutions.":[206],"guarantees":[209],"achieve":[212],"stem":[213],"from":[214],"data":[217],"structure":[218],"called":[219],"concurrent":[220,287],"authenticated":[221],"tree,":[222],"events":[226],"concurrently":[227],"removes":[230],"need":[232],"wait":[234],"append":[236],"operations":[237],"complete":[239],"sequentially.":[240],"We":[241],"implement":[242],"prototype":[244],"using":[245],"chameleon":[246],"discrete":[250],"Merkle":[253],"history":[254],"tree.":[255],"A":[256],"comprehensive":[257],"experimental":[258],"evaluation":[259],"proposed":[262,282],"approaches":[265],"used":[267],"validate":[269],"analytical":[271],"models":[272],"our":[275,281],"claims.":[276],"results":[278],"demonstrate":[279],"scheme":[283],"verifying":[284],"way":[288],"significantly":[290],"more":[291],"efficient":[292],"than":[293],"previous":[295],"tree-based":[296],"approach.":[297]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
