Uc updatable databases and applications

2Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We define an ideal functionality $$\mathcal {F} _{\mathrm {UD}}$$ and a construction $$\mathrm {\Pi _{\mathrm {UD}}}$$ for an updatable database ($$\mathrm {UD}$$). $$\mathrm {UD}$$ is a two-party protocol between an updater and a reader. The updater sets the database and updates it at any time throughout the protocol execution. The reader computes zero-knowledge (ZK) proofs of knowledge of database entries. These proofs prove that a value is stored at a certain position in the database, without revealing the position or the value. (Non-)updatable databases are implicitly used as building block in priced oblivious transfer, privacy-preserving billing and other privacy-preserving protocols. Typically, in those protocols the updater signs each database entry, and the reader proves knowledge of a signature on a database entry. Updating the database requires a revocation mechanism to revoke signatures on outdated database entries. Our construction $$\mathrm {\Pi _{\mathrm {UD}}}$$ uses a non-hiding vector commitment (NHVC) scheme. The updater maps the database to a vector and commits to the database. This commitment can be updated efficiently at any time without needing a revocation mechanism. ZK proofs for reading a database entry have communication and amortized computation cost independent of the database size. Therefore, $$\mathrm {\Pi _{\mathrm {UD}}}$$ is suitable for large databases. We implement $$\mathrm {\Pi _{\mathrm {UD}}}$$ and our timings show that it is practical. In existing privacy-preserving protocols, a ZK proof of a database entry is intertwined with other tasks, e.g., proving further statements about the value read from the database or the position where it is stored. $$\mathcal {F} _{\mathrm {UD}}$$ allows us to improve modularity in protocol design by separating those tasks. We show how to use $$\mathcal {F} _{\mathrm {UD}}$$ as building block of a hybrid protocol along with other functionalities.

References Powered by Scopus

Universally composable security: A new paradigm for cryptographic protocols

2175Citations
N/AReaders
Get full text

Digital signature scheme secure against adaptive chosen-message attacks

1985Citations
N/AReaders
Get full text

Non-interactive and information-theoretic secure verifiable secret sharing

1634Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Unlinkable Updatable Databases and Oblivious Transfer with Access Control

3Citations
N/AReaders
Get full text

Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases

2Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Damodaran, A., & Rial, A. (2020). Uc updatable databases and applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12174 LNCS, pp. 66–87). Springer. https://doi.org/10.1007/978-3-030-51938-4_4

Readers over time

‘21‘22‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

71%

Researcher 2

29%

Readers' Discipline

Tooltip

Computer Science 6

86%

Physics and Astronomy 1

14%

Save time finding and organizing research with Mendeley

Sign up for free
0