Batching techniques for accumulators with applications to IOPs and stateless blockchains

D Boneh, B Bünz, B Fisch - Advances in Cryptology–CRYPTO 2019: 39th …, 2019 - Springer
We present batching techniques for cryptographic accumulators and vector commitments in
groups of unknown order. Our techniques are tailored for distributed settings where no …

FalconDB: Blockchain-based collaborative database

Y Peng, M Du, F Li, R Cheng, D Song - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Nowadays an emerging class of applications are based oncollaboration over a shared
database among different entities. However, the existing solutions on shared database may …

Cryptographic accumulator and its application: A survey

Y Ren, X Liu, Q Wu, L Wang… - Security and …, 2022 - Wiley Online Library
Since the concept of cryptographic accumulators was first proposed in 1993, it has received
continuous attention from researchers. The application of the cryptographic accumulator is …

Accumulators with applications to anonymity-preserving revocation

F Baldimtsi, J Camenisch… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Membership revocation is essential for cryptographic applications, from traditional PKIs to
group signatures and anonymous credentials. Of the various solutions for the revocation …

Revisiting cryptographic accumulators, additional properties and relations to other primitives

D Derler, C Hanser, D Slamanig - Topics in Cryptology–-CT-RSA 2015 …, 2015 - Springer
Cryptographic accumulators allow to accumulate a finite set of values into a single succinct
accumulator. For every accumulated value, one can efficiently compute a witness, which …

KVaC: key-value commitments for blockchains and beyond

S Agrawal, S Raghuraman - … 2020: 26th International Conference on the …, 2020 - Springer
As blockchains grow in size, validating new transactions becomes more and more resource
intensive. To deal with this, there is a need to discover compact encodings of the (effective) …

[PDF][PDF] Fraud proofs: Maximising light client security and scaling blockchains with dishonest majorities

M Al-Bassam, A Sonnino, V Buterin - arXiv preprint arXiv …, 2018 - researchgate.net
Light clients, also known as Simple Payment Verification (SPV) clients, are nodes which only
download a small portion of the data in a blockchain, and use indirect means to verify that a …

Fraud and data availability proofs: Maximising light client security and scaling blockchains with dishonest majorities

M Al-Bassam, A Sonnino, V Buterin - arXiv preprint arXiv:1809.09044, 2018 - arxiv.org
Light clients, also known as Simple Payment Verification (SPV) clients, are nodes which only
download a small portion of the data in a blockchain, and use indirect means to verify that a …

Oblivious accumulators

F Baldimtsi, I Karantaidou, S Raghuraman - … International Conference on …, 2024 - Springer
A cryptographic accumulator is a succinct set commitment scheme with efficient (non-)
membership proofs that typically supports updates (additions and deletions) on the …

Efficient asynchronous accumulators for distributed PKI

L Reyzin, S Yakoubov - Security and Cryptography for Networks: 10th …, 2016 - Springer
Cryptographic accumulators are a tool for compact set representation and secure set
membership proofs. When an element is added to a set by means of an accumulator, a …