Authentication of Data Structures for Graph

Abstract

Authenticated data structures provides cryptographic proofs where the answers are as accurate as the author intended, even if the data structure is maintained by a remote host. We have presented few techniques for authenticating data structures that represent graphs and geometric data’s. A model has been given to represent the source and functions of working authentication of data structures for graph and geometric searching. We have also mention answering queries at distributed directories. When a user queries a directory, it receives a cryptographic proof in answer, where the proof contains statement by the source. We have also shown how to efficiently authenticate data for fundamental problems, such as on geometric objects, etc. this allows the design of new, efficient authenticated data structures for fundamental problem on network, such as path and connectivity queries over graphs.

Authors and Affiliations

Anurag Sharma, Vikram Singh, Jaspal Yadav

Keywords

Related Articles

High Efficiency Intelligent Street Lighting System Using a Zigbee Network and GSM

The proposed street lighting system is highly energy efficient and automated. It uses ZigBee-based wireless devices due to which street lamp system becomes more efficient. ZigBee network is connected to GSM through comp...

Research on Online Institute Solution Using RDBMS

implementation of student performance monitoring system is the web application on which the teacher are allow to insert the marks of the students obtain in the college exams which are visible to students through their l...

Commonly used pesticides in agriculture of Warangal District-Telangana and their consequences on the growth of Vesicular and Arbuscular Mycorrhizal fungi with reference to the DNA and Protein Content

In this paper we described the hazardous affects of the four common pesticides Captain, Bavestin, Endosulfan, Dicofol on VAM growth with reference to DNA ratio and protein content. Initially, we isolated VAM spores from...

Overview and Recent Advancements in Composite Materials

A continuing trend in material development is the evolution of composite materials. The composite materials being very strong and stiff, yet light in weight provide high strength to weight and stiffness to weight ratios...

An overview of some modifications proposed in Perturbation & Observation Maximum power point Tracking

Solar energy is one of the most important form of renewable energy in the present time because of rapid depletion of non renewable sources of energy. Solar energy is clean, safe and abundant in nature. Photo voltaic or...

Download PDF file
  • EP ID EP19284
  • DOI -
  • Views 226
  • Downloads 4

How To Cite

Anurag Sharma, Vikram Singh, Jaspal Yadav (2014). Authentication of Data Structures for Graph. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(12), -. https://europub.co.uk/articles/-A-19284