{"id":"https://openalex.org/W2020275826","doi":"https://doi.org/10.1145/2019599.2019602","title":"Authenticated Dictionaries","display_name":"Authenticated Dictionaries","publication_year":2011,"publication_date":"2011-09-01","ids":{"openalex":"https://openalex.org/W2020275826","doi":"https://doi.org/10.1145/2019599.2019602","mag":"2020275826"},"language":"en","primary_location":{"id":"doi:10.1145/2019599.2019602","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2019599.2019602","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019222255","display_name":"Scott A. Crosby","orcid":null},"institutions":[{"id":"https://openalex.org/I74775410","display_name":"Rice University","ror":"https://ror.org/008zs3103","country_code":"US","type":"education","lineage":["https://openalex.org/I74775410"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Scott A. Crosby","raw_affiliation_strings":["Rice University","**Rice University;"],"affiliations":[{"raw_affiliation_string":"Rice University","institution_ids":["https://openalex.org/I74775410"]},{"raw_affiliation_string":"**Rice University;","institution_ids":["https://openalex.org/I74775410"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035702159","display_name":"Dan S. Wallach","orcid":"https://orcid.org/0000-0002-6059-925X"},"institutions":[{"id":"https://openalex.org/I74775410","display_name":"Rice University","ror":"https://ror.org/008zs3103","country_code":"US","type":"education","lineage":["https://openalex.org/I74775410"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan S. Wallach","raw_affiliation_strings":["Rice University","**Rice University;"],"affiliations":[{"raw_affiliation_string":"Rice University","institution_ids":["https://openalex.org/I74775410"]},{"raw_affiliation_string":"**Rice University;","institution_ids":["https://openalex.org/I74775410"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5019222255"],"corresponding_institution_ids":["https://openalex.org/I74775410"],"apc_list":null,"apc_paid":null,"fwci":2.1379,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.88488295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"14","issue":"2","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9707000255584717,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.883350133895874},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.8754270076751709},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6101778745651245},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4902096390724182},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.4437630772590637},{"id":"https://openalex.org/keywords/accumulator","display_name":"Accumulator (cryptography)","score":0.43300625681877136},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4262653887271881},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4214729964733124},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.41868460178375244},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4059067666530609},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3214874565601349},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.23444190621376038},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19488877058029175},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13036736845970154},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10594207048416138}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.883350133895874},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.8754270076751709},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6101778745651245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4902096390724182},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4437630772590637},{"id":"https://openalex.org/C2078106","wikidata":"https://www.wikidata.org/wiki/Q14906620","display_name":"Accumulator (cryptography)","level":2,"score":0.43300625681877136},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4262653887271881},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4214729964733124},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.41868460178375244},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4059067666530609},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3214874565601349},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.23444190621376038},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19488877058029175},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13036736845970154},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10594207048416138},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2019599.2019602","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2019599.2019602","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G1152952786","display_name":null,"funder_award_id":"CNS-0524211","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W96788122","https://openalex.org/W100437318","https://openalex.org/W172574161","https://openalex.org/W181720406","https://openalex.org/W239964209","https://openalex.org/W824016652","https://openalex.org/W1493649316","https://openalex.org/W1502328873","https://openalex.org/W1502896015","https://openalex.org/W1505451213","https://openalex.org/W1517550320","https://openalex.org/W1523705567","https://openalex.org/W1528195422","https://openalex.org/W1541501107","https://openalex.org/W1551041907","https://openalex.org/W1562394980","https://openalex.org/W1566345534","https://openalex.org/W1569543440","https://openalex.org/W1589205472","https://openalex.org/W1601568537","https://openalex.org/W1604624799","https://openalex.org/W1607188293","https://openalex.org/W1784881995","https://openalex.org/W1852210622","https://openalex.org/W1967569591","https://openalex.org/W1989218322","https://openalex.org/W1998676013","https://openalex.org/W1998777945","https://openalex.org/W2008518944","https://openalex.org/W2011297770","https://openalex.org/W2021615496","https://openalex.org/W2084445812","https://openalex.org/W2086681205","https://openalex.org/W2087438165","https://openalex.org/W2105045857","https://openalex.org/W2111712517","https://openalex.org/W2114349788","https://openalex.org/W2123225606","https://openalex.org/W2125040475","https://openalex.org/W2127809567","https://openalex.org/W2131284883","https://openalex.org/W2146059291","https://openalex.org/W2398866592","https://openalex.org/W2621530037","https://openalex.org/W2738730744","https://openalex.org/W3162946536","https://openalex.org/W6675806528"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W4287264924","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W1979110442","https://openalex.org/W2156660460","https://openalex.org/W2362866566"],"abstract_inverted_index":{"Authenticated":[0],"dictionaries":[1,67],"are":[2,51,144,154,243,248,262],"a":[3,26,30,37,40,60,83,176],"widely":[4,20],"discussed":[5],"paradigm":[6],"to":[7,28,184],"enable":[8],"verifiable":[9],"integrity":[10],"for":[11,259],"data":[12,42,94],"storage":[13,227],"on":[14,91,99],"untrusted":[15],"servers,":[16],"such":[17],"as":[18,123,125],"today\u2019s":[19],"used":[21,203],"\u201ccloud":[22],"computing\u201d":[23],"resources,":[24],"allowing":[25],"server":[27],"provide":[29],"\u201cproof,\u201d":[31],"typically":[32],"in":[33,116,146,256],"the":[34,45,52,57,76,188,197,200,257],"form":[35],"of":[36,47,59,75,82,85,118,178,199],"slice":[38],"through":[39],"cryptographic":[41],"structure,":[43],"that":[44,56,140,221,240,246,253],"results":[46],"any":[48],"given":[49,133],"query":[50,61,158],"correct":[53],"answer,":[54],"including":[55],"absence":[58],"result":[62],"is":[63],"correct.":[64],"Persistent":[65],"authenticated":[66],"(PADs)":[68],"further":[69],"allow":[70],"queries":[71],"against":[72],"older":[73],"versions":[74],"structure.":[77],"This":[78],"research":[79],"presents":[80],"implementations":[81],"variety":[84],"different":[86],"PAD":[87,192],"algorithms,":[88],"some":[89],"based":[90,98],"Merkle":[92,141,161,190],"tree-style":[93],"structures":[95],"and":[96,105,121,168,214,233],"others":[97],"individually":[100],"signed":[101],"\u201ctuple\u201d":[102],"statements":[103],"(with":[104],"without":[106],"RSA":[107,219,241],"accumulators).":[108],"We":[109,138,251],"present":[110],"system":[111],"throughput":[112],"benchmarks,":[113],"indicating":[114],"costs":[115],"terms":[117],"time,":[119],"storage,":[120],"bandwidth":[122],"well":[124],"considering":[126],"how":[127],"much":[128],"money":[129],"would":[130],"be":[131],"required":[132],"standard":[134],"cloud":[135],"computing":[136],"costs.":[137],"conclude":[139],"tree":[142,162,191],"PADs":[143,153,261],"preferable":[145,155],"cases":[147],"with":[148,156,175],"frequent":[149],"updates,":[150],"while":[151],"tuple-based":[152],"higher":[157],"rates.":[159],"For":[160,208],"PADs,":[163,210],"red-black":[164,185],"trees":[165,186],"outperform":[166],"treaps":[167],"skiplists.":[169],"Applying":[170],"Sarnak-Tarjan\u2019s":[171],"versioned":[172],"node":[173],"strategy,":[174],"cache":[177],"old":[179],"hashes":[180],"at":[181],"every":[182],"node,":[183],"yields":[187],"fastest":[189],"implementation,":[193],"notably":[194],"using":[195,218],"half":[196],"memory":[198],"more":[201,263],"commonly":[202],"mutation-free":[204],"path":[205],"copying":[206],"strategy.":[207],"tuple":[209,260],"although":[211],"we":[212,238],"designed":[213],"implemented":[215],"an":[216],"algorithm":[217],"accumulators":[220,242],"offers":[222],"constant":[223,226,230],"update":[224],"size,":[225,232],"per":[228,236],"update,":[229,237],"proof":[231],"sublinear":[234],"computation":[235],"found":[239],"so":[244],"expensive":[245],"they":[247],"never":[249],"worthwhile.":[250],"find":[252],"other":[254],"optimizations":[255],"literature":[258],"cost-effective.":[264]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
