Back to Search
Start Over
Performances of Cryptographic Accumulators
- Source :
- HAL, The 39th IEEE Conference on Local Computer Networks (LCN), The 39th IEEE Conference on Local Computer Networks (LCN), Sep 2014, Edmonton, Canada, LCN
-
Abstract
- International audience; Cryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de Mare in 1993. Despite this popularity, there is currently no performance evaluation of the different existing de- signs. Symmetric and asymmetric accumulators are used likewise without any particular argument to support either of the design. We aim to es- tablish the speed of each design and their application's domains in terms of their size and the size of the values.
- Subjects :
- 021110 strategic, defence & security studies
Cryptographic primitive
Computer science
business.industry
Distributed computing
0211 other engineering and technologies
Value (computer science)
[SCCO.COMP]Cognitive science/Computer science
Cryptography
02 engineering and technology
Bloom filter
Space (commercial competition)
Data structure
Set (abstract data type)
[SCCO.COMP] Cognitive science/Computer science
Cryptographic accumulators
0202 electrical engineering, electronic engineering, information engineering
Performance Analysis
020201 artificial intelligence & image processing
Hydraulic accumulator
business
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- HAL, The 39th IEEE Conference on Local Computer Networks (LCN), The 39th IEEE Conference on Local Computer Networks (LCN), Sep 2014, Edmonton, Canada, LCN
- Accession number :
- edsair.doi.dedup.....d5677926cc1078a0ba67b9187ec29174