A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Streaming Authenticated Data Structures
2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security - CCSW '14
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n elements x1, x2, . . . , xn and later, the verifier can delegate a computation (e.g., a range search query) to the untrusted prover over the stream. The prover returns the result of the computation and a cryptographic proof for its correctness. To verify the prover's result efficiently, the verifier keeps small local (logarithmic) state, which he updates while observing the stream. The challenge is
doi:10.1145/2664168.2664177
dblp:conf/ccs/QianZCP14
fatcat:flgy3uvlmrg4rlx7fbuygztf4e