Show simple item record

Trust-Preserving Set Operations

dc.contributor.authorMorselli, Ruggeroen_US
dc.contributor.authorBhattacharjee, Bobbyen_US
dc.contributor.authorKatz, Jonathanen_US
dc.contributor.authorKeleher, Peteen_US
dc.description.abstractWe describe a method of performing trust-preserving set operations by untrusted parties. Our motivation for this is the problem of securely reusing content-based search results in peer-to-peer networks. We model search results and indexes as data sets. Such sets have value for answering a new query only if they are \emph{trusted}. In the absence of any system-wide security mechanism, a data set is trusted by a node $a$ only if it was generated by some node trusted by $a$. Our main contributions are a formal definition of the problem, and an efficient scheme that solves this problem by allowing untrusted peers to perform set operations on trusted data sets, and to produce unforgeable proofs of correctness. This is accomplished by requiring trusted nodes to sign appropriately-defined \emph{digests} of generated sets; each such digest consists of an RSA accumulator and a Bloom filter. The scheme is general, and can be applied to other applications as well. We give an analysis that demonstrates the low overhead of the scheme and we include experimental data which confirm the analysis. (UMIACS-TR-2003-68)en_US
dc.format.extent196654 bytes
dc.relation.ispartofseriesUM Computer Science Department; CS-TR-4499en_US
dc.relation.ispartofseriesUMIACS; UMIACS-TR-2003-68en_US
dc.titleTrust-Preserving Set Operationsen_US
dc.typeTechnical Reporten_US
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_US
dc.relation.isAvailableAtUniversity of Maryland (College Park, Md.)en_US
dc.relation.isAvailableAtTech Reports in Computer Science and Engineeringen_US
dc.relation.isAvailableAtUMIACS Technical Reportsen_US

Files in this item


This item appears in the following Collection(s)

Show simple item record