A comprehensive survey on blockchain-based decentralized storage networks

MI Khalid, I Ehsan, AK Al-Ani, J Iqbal, S Hussain… - IEEE …, 2023 - ieeexplore.ieee.org
Blockchains are a new approach to creating distributed networks that were first introduced in
2008. It allows the formation of peer-to-peer networks based on consensus, forming chains …

Aggregatable subvector commitments for stateless cryptocurrencies

A Tomescu, I Abraham, V Buterin, J Drake… - … Conference on Security …, 2020 - Springer
An aggregatable subvector commitment (aSVC) scheme is a vector commitment (VC)
scheme that can aggregate multiple proofs into a single, small subvector proof. In this paper …

Pointproofs: Aggregating proofs for multiple vector commitments

S Gorbunov, L Reyzin, H Wee, Z Zhang - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Vector commitments enable a user to commit to a sequence of values and provably reveal
one or many values at specific posi-tions at a later time. In this work, we construct …

Enabling secure and efficient decentralized storage auditing with blockchain

Y Du, H Duan, A Zhou, C Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a promising alternative solution to cloud storage, decentralized storage networks (DSN)
are widely anticipated to develop continuously and reshape the storage market share in the …

KVaC: key-value commitments for blockchains and beyond

S Agrawal, S Raghuraman - … 2020: 26th International Conference on the …, 2020 - Springer
As blockchains grow in size, validating new transactions becomes more and more resource
intensive. To deal with this, there is a need to discover compact encodings of the (effective) …

Authenticated dictionaries with cross-incremental proof (dis) aggregation

A Tomescu, Y Xia, Z Newman - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Authenticated dictionaries (ADs) are a key building block of many cryptographic systems,
such as transparency logs, distributed &# 64257; le systems and cryptocurrencies. In this …

Litmus: Towards a practical database management system with verifiable acid properties and transaction correctness

Y Xia, X Yu, M Butrovich, A Pavlo… - Proceedings of the 2022 …, 2022 - dl.acm.org
Existing secure database management systems (DBMSs) focus on security and privacy of
data but overlook semantic properties, such as the correctness and ACID properties of …

Lightweight mutual authentication scheme enabled by stateless blockchain for UAV networks

L Kong, B Chen, F Hu, J Zhang - Security and Communication …, 2022 - Wiley Online Library
The UAV network composed of resource‐constrained lightweight UAV swarms can
efficiently accomplish mission with time critical requirements in dynamic and complex …

Efficient Secure Storage with Version Control and Key Rotation

L Chen, H Guo, YN Li, Q Tang - … Conference on the Theory and Application …, 2023 - Springer
Periodic key rotation is a widely used technique to enhance key compromise resilience.
Updatable encryption (UE) schemes provide an efficient approach to key rotation, ensuring …

[PDF][PDF] A Theory of Composition for Proofs of Knowledge

A Kothapalli - 2024 - andrew.cmu.edu
Abstract In 1985, Goldwasser, Micali, and Rackoff introduced a compelling new notion of a
proof, known as a proof of knowledge, in which a verifier interactively checks that a prover …