Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash
碩士 === 國立臺灣師範大學 === 資訊工程學系 === 102 === A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. These proofs are based on attestations, which are signed messages that bind the users...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/15597140692406506956 |
id |
ndltd-TW-102NTNU5392022 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-102NTNU53920222016-07-02T04:20:53Z http://ndltd.ncl.edu.tw/handle/15597140692406506956 Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash 以多鏈結雜湊於證明違約中達成有效率的證據收集 Yu-Wei Lin 林裕偉 碩士 國立臺灣師範大學 資訊工程學系 102 A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. These proofs are based on attestations, which are signed messages that bind the users to the requests they make and the service provider to maintaining the data in a certain state. Users and the service provider exchange attestations for every request. These attestations are chain hashed so that the client device of the user only has to store the last attestation it received, which contains the last chain hash. The service provider keeps all the attestations, so that they can be used when auditing (or proving) is required. While the C&;L scheme can achieve epoch-based POV without the need for client devices to broadcast the latest attestation or keep all the attestations, it cannot support concurrent accesses even though these operations access different files because all the server-side attestations need to be combined into a single chain. We solve this problem by employing multiple chains of hash to provide concurrent file accesses in a single account. Gwan-Hwan Hwang 黃冠寰 2014 學位論文 ; thesis 32 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣師範大學 === 資訊工程學系 === 102 === A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. These proofs are based on attestations, which are signed messages that bind the users to the requests they make and the service provider to maintaining the data in a certain state. Users and the service provider exchange attestations for every request. These attestations are chain hashed so that the client device of the user only has to store the last attestation it received, which contains the last chain hash. The service provider keeps all the attestations, so that they can be used when auditing (or proving) is required.
While the C&;L scheme can achieve epoch-based POV without the need for client devices to broadcast the latest attestation or keep all the attestations, it cannot support concurrent accesses even though these operations access different files because all the server-side attestations need to be combined into a single chain. We solve this problem by employing multiple chains of hash to provide concurrent file accesses in a single account.
|
author2 |
Gwan-Hwan Hwang |
author_facet |
Gwan-Hwan Hwang Yu-Wei Lin 林裕偉 |
author |
Yu-Wei Lin 林裕偉 |
spellingShingle |
Yu-Wei Lin 林裕偉 Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
author_sort |
Yu-Wei Lin |
title |
Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
title_short |
Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
title_full |
Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
title_fullStr |
Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
title_full_unstemmed |
Efficient Attestation Collection in Proof of Violation with Multiple Chains of Hash |
title_sort |
efficient attestation collection in proof of violation with multiple chains of hash |
publishDate |
2014 |
url |
http://ndltd.ncl.edu.tw/handle/15597140692406506956 |
work_keys_str_mv |
AT yuweilin efficientattestationcollectioninproofofviolationwithmultiplechainsofhash AT línyùwěi efficientattestationcollectioninproofofviolationwithmultiplechainsofhash AT yuweilin yǐduōliànjiézácòuyúzhèngmíngwéiyuēzhōngdáchéngyǒuxiàolǜdezhèngjùshōují AT línyùwěi yǐduōliànjiézácòuyúzhèngmíngwéiyuēzhōngdáchéngyǒuxiàolǜdezhèngjùshōují |
_version_ |
1718332404730429440 |