Supercharge Your Innovation With Domain-Expert AI Agents!

Merkle hash summation tree and verifiable database updating operation method using same

An operation method and database technology, applied in the field of verifiable databases, can solve the problem that the VDB scheme cannot support efficient all update operations and verification operations at the same time

Active Publication Date: 2017-06-27
XIDIAN UNIV
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a Merkle hash summation tree and its verifiable database update operation method, aiming to solve the problem that the existing VDB scheme cannot support efficient all update operations and verification operations at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Merkle hash summation tree and verifiable database updating operation method using same
  • Merkle hash summation tree and verifiable database updating operation method using same
  • Merkle hash summation tree and verifiable database updating operation method using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0045] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0046] The Merkle hash summation tree provided by the embodiment of the present invention

[0047] Such as figure 1 As shown, the construction method of the Merkle hash summation tree provided by the embodiment of the present invention includes the following steps:

[0048] (1) Select SHA-256 as a secure hash function (denoted as hash( )), given a database DB, there are eight records in total, respectively (x 1 ,v 1 ),(x 2 ,v 2 )...(x 8 ,v 8 );

[0049] (2) For each leaf node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Merkle hash summation tree and a verifiable database updating operation method using the same, and aims to solve the problem in all-operation verifiability of database updating so as to ensure the correctness and integrity of a database and high efficiency of operations. A new concept of the Merkle hash summation tree is proposed for realizing efficient and secure verification of large-scale data. Compared with a Merkle hash tree, when insertion / deletion operation is performed on the Merkle hash summation tree, all nodes of the tree do not need to be re-calculated, so that the calculation overhead of the updating operation is low. Based on the Merkle hash summation tree, the invention provides the verifiable database updating method, which realizes efficient verification of all the updating operations of the large-scale database.

Description

technical field [0001] The invention belongs to the technical field of verifiable databases, in particular to a Merkle hash summation tree and a verifiable database update operation method thereof. Background technique [0002]With the rapid development of cloud computing and big data, resource-constrained clients can outsource huge data to cloud servers, thereby reducing the client's overhead for maintaining local data. However, since the cloud server is not completely trustworthy, it may tamper with the database, so a key issue in outsourced storage is how to efficiently verify the correctness of the results returned by the cloud when the client searches. In recent years, many scholars have studied the problem of verifiable search on outsourced databases (Backes M, Fiore D, Reischuk R M.Verifiable delegation of computation on outsourced data[C].Proceedings of the 2013ACM SIGSAC conference on Computer&communications security.ACM, 2013:863-874.Camenisch J,Kohlweiss M,Sorien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30H04L9/32
CPCG06F16/2246G06F16/2255G06F16/23H04L9/3236H04L9/3247
Inventor 苗美霞马建峰管文浩张志为杨昌松
Owner XIDIAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More