{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T13:57:12Z","timestamp":1764079032748},"reference-count":32,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2009,8]]},"abstract":"<jats:p>\n            Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurrency constraints that slow down data updates. We introduce a protocol, built upon signature aggregation, for checking the authenticity, completeness and freshness of query answers. The protocol offers the important property of allowing new data to be disseminated\n            <jats:italic>immediately<\/jats:italic>\n            , while ensuring that outdated values beyond a pre-set age can be detected. We also propose an efficient verification technique for ad-hoc equijoins, for which no practical solution existed. In addition, for servers that need to process heavy query workloads, we introduce a mechanism that significantly reduces the proof construction time by caching just a small number of strategically chosen aggregate signatures. The efficiency and efficacy of our proposed mechanisms are confirmed through extensive experiments.\n          <\/jats:p>","DOI":"10.14778\/1687627.1687718","type":"journal-article","created":{"date-parts":[[2014,6,24]],"date-time":"2014-06-24T12:17:57Z","timestamp":1403612277000},"page":"802-813","source":"Crossref","is-referenced-by-count":78,"title":["Scalable verification for outsourced dynamic databases"],"prefix":"10.14778","volume":"2","author":[{"given":"HweeHwa","family":"Pang","sequence":"first","affiliation":[{"name":"Singapore Management University"}]},{"given":"Jilian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]},{"given":"Kyriakos","family":"Mouratidis","sequence":"additional","affiliation":[{"name":"Singapore Management University"}]}],"member":"320","published-online":{"date-parts":[[2009,8]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"MIRACL\n  : Multiprecision Integer and Rational Arithmetic C\/C++ Library. http:\/\/www.shamus.ie.  MIRACL: Multiprecision Integer and Rational Arithmetic C\/C++ Library. http:\/\/www.shamus.ie."},{"key":"e_1_2_1_2_1","unstructured":"OpenSSL Project. http:\/\/www.openssl.org.  OpenSSL Project. http:\/\/www.openssl.org."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139175319"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.63"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_2_1_6_1","volume-title":"A Survey of Two Signature Aggregation Techniques. CryptoBytes, 6(2)","author":"Boneh D.","year":"2003","unstructured":"D. Boneh , C. Gentry , B. Lynn , and H. Shacham . A Survey of Two Signature Aggregation Techniques. CryptoBytes, 6(2) , 2003 . D. Boneh, C. Gentry, B. Lynn, and H. Shacham. A Survey of Two Signature Aggregation Techniques. CryptoBytes, 6(2), 2003."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717005"},{"key":"e_1_2_1_8_1","volume-title":"Standards for Efficient Cryptography","year":"2000","unstructured":"Certicom. SEC2 : Recommended Elliptic Curve Domain Parameters, Version 1.0 . Standards for Efficient Cryptography , September 2000 . http:\/\/www.secg.org\/download\/aid-386\/sec2_final.pdf. Certicom. SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Standards for Efficient Cryptography, September 2000. http:\/\/www.secg.org\/download\/aid-386\/sec2_final.pdf."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_5"},{"key":"e_1_2_1_10_1","volume-title":"Journal of Computer Security","author":"Cheng W.","year":"2008","unstructured":"W. Cheng and K.-L. Tan . Query Assurance Verification for Outsourced Multi-dimensional Databases . Journal of Computer Security , 2008 . W. Cheng and K.-L. Tan. Query Assurance Verification for Outsourced Multi-dimensional Databases. Journal of Computer Security, 2008."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/356770.356776"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876663"},{"key":"e_1_2_1_13_1","unstructured":"Fact Sheet NSA Suite B Cryptography. National Security Agency. http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm.  Fact Sheet NSA Suite B Cryptography. National Security Agency . http:\/\/www.nsa.gov\/ia\/industry\/crypto_suite_b.cfm."},{"key":"e_1_2_1_14_1","first-page":"169","article-title":"Novel Compression of Sparse Bit-Strings -- Preliminary Report. Combinatorial Algorithms on Words","volume":"12","author":"Frenkel A. S.","year":"1985","unstructured":"A. S. Frenkel and S. T. Klein . Novel Compression of Sparse Bit-Strings -- Preliminary Report. Combinatorial Algorithms on Words , NATO ASI Series F , 12 : 169 -- 183 , 1985 . A. S. Frenkel and S. T. Klein. Novel Compression of Sparse Bit-Strings -- Preliminary Report. Combinatorial Algorithms on Words, NATO ASI Series F, 12:169--183, 1985.","journal-title":"NATO ASI Series F"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791688.1791726"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0052-4"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_32"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-003-1076-8"},{"key":"e_1_2_1_21_1","first-page":"218","volume-title":"Crypto","author":"Merkle R. C.","year":"1989","unstructured":"R. C. Merkle . A Certified Digital Signature . In Crypto , pages 218 -- 238 , 1989 . R. C. Merkle. A Certified Digital Signature. In Crypto, pages 218--238, 1989."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0108-z"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1149976.1149977"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11733836_30"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_7"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066204"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/977401.978163"},{"key":"e_1_2_1_28_1","first-page":"135","volume-title":"VLDB","author":"Papadopoulos S.","year":"2007","unstructured":"S. Papadopoulos , Y. Yang , and D. Papadias . CADS: Continuous Authentication on Data Streams . In VLDB , pages 135 -- 146 , 2007 . S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, pages 135--146, 2007."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/331624.331631"},{"key":"e_1_2_1_31_1","unstructured":"SHA. Secure Hashing Algorithm. NIST. FIPS 180--2 2001.  SHA. Secure Hashing Algorithm . NIST. FIPS 180--2 2001."},{"key":"e_1_2_1_32_1","unstructured":"The Case for Elliptic Curve Cryptography. National Security Agency. http:\/\/www.nsa.gov\/ia\/industry\/crypto_elliptic_curve.cfm.  The Case for Elliptic Curve Cryptography. National Security Agency . http:\/\/www.nsa.gov\/ia\/industry\/crypto_elliptic_curve.cfm."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/1687627.1687718","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:32:18Z","timestamp":1672227138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/1687627.1687718"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["10.14778\/1687627.1687718"],"URL":"https:\/\/doi.org\/10.14778\/1687627.1687718","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2009,8]]}}}