A comprehensive survey on blockchain-based decentralized storage networks
Blockchains are a new approach to creating distributed networks that were first introduced in
2008. It allows the formation of peer-to-peer networks based on consensus, forming chains …
2008. It allows the formation of peer-to-peer networks based on consensus, forming chains …
Aggregatable subvector commitments for stateless cryptocurrencies
An aggregatable subvector commitment (aSVC) scheme is a vector commitment (VC)
scheme that can aggregate multiple proofs into a single, small subvector proof. In this paper …
scheme that can aggregate multiple proofs into a single, small subvector proof. In this paper …
Pointproofs: Aggregating proofs for multiple vector commitments
Vector commitments enable a user to commit to a sequence of values and provably reveal
one or many values at specific posi-tions at a later time. In this work, we construct …
one or many values at specific posi-tions at a later time. In this work, we construct …
Enabling secure and efficient decentralized storage auditing with blockchain
As a promising alternative solution to cloud storage, decentralized storage networks (DSN)
are widely anticipated to develop continuously and reshape the storage market share in the …
are widely anticipated to develop continuously and reshape the storage market share in the …
KVaC: key-value commitments for blockchains and beyond
S Agrawal, S Raghuraman - … 2020: 26th International Conference on the …, 2020 - Springer
As blockchains grow in size, validating new transactions becomes more and more resource
intensive. To deal with this, there is a need to discover compact encodings of the (effective) …
intensive. To deal with this, there is a need to discover compact encodings of the (effective) …
Authenticated dictionaries with cross-incremental proof (dis) aggregation
Authenticated dictionaries (ADs) are a key building block of many cryptographic systems,
such as transparency logs, distributed &# 64257; le systems and cryptocurrencies. In this …
such as transparency logs, distributed &# 64257; le systems and cryptocurrencies. In this …
Litmus: Towards a practical database management system with verifiable acid properties and transaction correctness
Existing secure database management systems (DBMSs) focus on security and privacy of
data but overlook semantic properties, such as the correctness and ACID properties of …
data but overlook semantic properties, such as the correctness and ACID properties of …
Lightweight mutual authentication scheme enabled by stateless blockchain for UAV networks
The UAV network composed of resource‐constrained lightweight UAV swarms can
efficiently accomplish mission with time critical requirements in dynamic and complex …
efficiently accomplish mission with time critical requirements in dynamic and complex …
Efficient Secure Storage with Version Control and Key Rotation
Periodic key rotation is a widely used technique to enhance key compromise resilience.
Updatable encryption (UE) schemes provide an efficient approach to key rotation, ensuring …
Updatable encryption (UE) schemes provide an efficient approach to key rotation, ensuring …
[PDF][PDF] A Theory of Composition for Proofs of Knowledge
A Kothapalli - 2024 - andrew.cmu.edu
Abstract In 1985, Goldwasser, Micali, and Rackoff introduced a compelling new notion of a
proof, known as a proof of knowledge, in which a verifier interactively checks that a prover …
proof, known as a proof of knowledge, in which a verifier interactively checks that a prover …