{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T07:14:26Z","timestamp":1743146066682,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_8","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"140-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Append-Only Authenticated Data Sets Based on\u00a0RSA Accumulator"],"prefix":"10.1007","author":[{"given":"Qiang","family":"Tong","sequence":"first","affiliation":[]},{"given":"Long","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-36563-X_20","volume-title":"Topics in Cryptology \u2014 CT-RSA 2003","author":"MT Goodrich","year":"2003","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 295\u2013313. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36563-X_20"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-39658-1_2","volume-title":"Algorithms - ESA 2003","author":"R Tamassia","year":"2003","unstructured":"Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol. 2832, pp. 2\u20135. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39658-1_2"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1778-5","volume":"17","author":"FL Chen","year":"2018","unstructured":"Chen, F.L., Liu, W.F., Chen, S.G., et al.: Public-key quantum digital signature scheme with one-time pad private-key. Quantum Inf. Process. 17(1), 1\u201314 (2018)","journal-title":"Quantum Inf. Process."},{"key":"8_CR4","volume":"48","author":"Q Hu","year":"2019","unstructured":"Hu, Q., Asghar, M.R., Brownlee, N.: Checking certificate revocation efficiently using certificate revocation guard. J. Inf. Secur. Appl. 48, 102356 (2019)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-030-62974-8_18","volume-title":"Information Security","author":"A Garba","year":"2020","unstructured":"Garba, A., Bochem, A., Leiding, B.: BlockVoke\u2013fast, blockchain-based certificate revocation for PKIs and the web of trust. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds.) ISC 2020. LNCS, vol. 12472, pp. 315\u2013333. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62974-8_18"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1016\/j.future.2017.08.025","volume":"107","author":"B Qin","year":"2020","unstructured":"Qin, B., Huang, J., Wang, Q., et al.: Cecoin: a decentralized PKI mitigating MitM attacks. Futur. Gener. Comput. Syst. 107, 805\u2013815 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"8527010","DOI":"10.1155\/2018\/8527010","volume":"2018","author":"S Khan","year":"2018","unstructured":"Khan, S., Zhang, Z., Zhu, L., et al.: Accountable and transparent TLS certificate management: an alternate public-key infrastructure with verifiable trusted parties. Secur. Commun. Netw. 2018, 8527010 (2018)","journal-title":"Secur. Commun. Netw."},{"issue":"10","key":"8_CR8","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2659897","volume":"57","author":"B Laurie","year":"2014","unstructured":"Laurie, B.: Certificate transparency. Commun. ACM 57(10), 40\u201346 (2014)","journal-title":"Commun. ACM"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-319-70972-7_21","volume-title":"Financial Cryptography and Data Security","author":"L Reyzin","year":"2017","unstructured":"Reyzin, L., Meshkov, D., Chepurnoy, A., Ivanov, S.: Improving authenticated dynamic dictionaries, with applications to cryptocurrencies. In: Kiayias, A. (ed.) FC 2017. LNCS, vol. 10322, pp. 376\u2013392. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70972-7_21"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-030-26948-7_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2019","author":"D Boneh","year":"2019","unstructured":"Boneh, D., B\u00fcnz, B., Fisch, B.: Batching techniques for accumulators with applications to IOPs and stateless blockchains. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019. LNCS, vol. 11692, pp. 561\u2013586. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26948-7_20"},{"unstructured":"Leung, D., Gilad, Y., Gorbunov, S., et al.: Aardvark: a concurrent authenticated dictionary with short proofs. IACR Cryptology ePrint Archive 2020, 975 (2020)","key":"8_CR11"},{"unstructured":"Tomescu, A., Xia, Y., Newman, Z.: Authenticated dictionaries with cross-incremental proof (dis) aggregation. Cryptology ePrint Archive (2020)","key":"8_CR12"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-38348-9_22","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"C Papamanthou","year":"2013","unstructured":"Papamanthou, C., Shi, E., Tamassia, R., Yi, K.: Streaming authenticated data structures. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 353\u2013370. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_22"},{"doi-asserted-by":"crossref","unstructured":"Yu, C.M.: Poster: lightweight streaming authenticated data structures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1693\u20131695 (2015)","key":"8_CR14","DOI":"10.1145\/2810103.2810117"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.jnca.2018.01.014","volume":"107","author":"J Xu","year":"2018","unstructured":"Xu, J., Wei, L., Zhang, Y., et al.: Dynamic fully homomorphic encryption-based Merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107, 113\u2013124 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-319-07584-6_9","volume-title":"Symmetric Cryptographic Protocols","author":"M Ramkumar","year":"2014","unstructured":"Ramkumar, M.: Authenticated data structures. In: Ramkumar, M. (ed.) Symmetric Cryptographic Protocols, pp. 163\u2013193. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07584-6_9"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijcnc.2016.8401","volume":"8","author":"S Mohanty","year":"2016","unstructured":"Mohanty, S., Ramkumar, M., Adhikari, N.: OMT: a dynamic authenticated data structure for security kernels. Int. J. Comput. Netw. Commun. 8, 1\u201323 (2016)","journal-title":"Int. J. Comput. Netw. Commun."},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1145\/2578855.2535851","volume":"49","author":"A Miller","year":"2014","unstructured":"Miller, A., Hicks, M., Katz, J., et al.: Authenticated data structures, generically. ACM SIGPLAN Not. 49(1), 411\u2013423 (2014)","journal-title":"ACM SIGPLAN Not."},{"unstructured":"Brun, M., Traytel, D.: Formalization of Generic Authenticated Data Structures (2021)","key":"8_CR19"},{"key":"8_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-319-44618-9_16","volume-title":"Security and Cryptography for Networks","author":"L Reyzin","year":"2016","unstructured":"Reyzin, L., Yakoubov, S.: Efficient asynchronous accumulators for distributed PKI. In: Zikas, V., De Prisco, R. (eds.) SCN 2016. LNCS, vol. 9841, pp. 292\u2013309. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44618-9_16"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/978-3-319-96881-0_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"TK Frederiksen","year":"2018","unstructured":"Frederiksen, T.K., Lindell, Y., Osheter, V., Pinkas, B.: Fast distributed RSA key generation for\u00a0semi-honest and malicious adversaries. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 331\u2013361. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_12"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:11:33Z","timestamp":1729156293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}