Controlling verification of key-value stores

user-5aceb7ef530c7001b97ba534(2019)

引用 8|浏览36
暂无评分
摘要
Deferred verification of the integrity of data operations over a set of data that is hosted at an untrusted module (UM) is controlled. The controlling includes generating a request for a data operation on the set of data. The request includes an authentication portion. The request is sent to the UM. A response to the request is received from the UM. The response includes cryptographic verification information attesting the integrity of the data operation with respect to prior data operations on the set of data. The response includes results from deferred verification at a trusted module (TM).
更多
查看译文
关键词
Authentication,Cryptography,Operating system,Computer science,Data operations
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要