Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient verifiable data streaming

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Kee Sung-
dc.contributor.authorJeong, Ik Rae-
dc.date.accessioned2021-09-04T10:12:18Z-
dc.date.available2021-09-04T10:12:18Z-
dc.date.created2021-06-18-
dc.date.issued2015-12-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/91790-
dc.description.abstractIn 2012, D. Schroder and H. Schroder introduced verifiable data streaming (VDS) that enables a client to append, search, verify, and update the streamed data efficiently. After storing the data with a server, a client issues a query to receive a proof that the data of the client are still correctly stored. Anyone can check the validity of the proof publicly in VDS. However, the length of a secret of a client, the length of a proof, and the complexity of appending an element in the previous VDS schemes are O(log n), where n is the upper bound on the number of elements to be stored. In this paper, we suggest a more efficient VDS scheme. In our scheme, the length of a secret of a client is only O(1), and the length of a proof and the complexity of appending an element are O(log i), where i(<= n) is the index of an element. We also show that our scheme is secure under any collision-resistant hash functions and unforgeable signature schemes without random oracles. Copyright (C) 2015 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.subjectCOMPUTATION-
dc.subjectDELEGATION-
dc.titleEfficient verifiable data streaming-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.identifier.doi10.1002/sec.1317-
dc.identifier.scopusid2-s2.0-84959329572-
dc.identifier.wosid000367922500056-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.8, no.18, pp.4013 - 4018-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume8-
dc.citation.number18-
dc.citation.startPage4013-
dc.citation.endPage4018-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusCOMPUTATION-
dc.subject.keywordPlusDELEGATION-
dc.subject.keywordAuthordata streaming-
dc.subject.keywordAuthorpublic verifiability-
dc.subject.keywordAuthorcloud computing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE