Abstract
The query authentication schemes that we cover in this book make extensive use of cryptographic constructs. In this chapter, we give a working definition of those constructs; the reader is encouraged to refer to the original articles for details. We also provide recent timing measurements for the key constructs, to give the reader a sense of their relative costs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pang, H., Tan, KL. (2012). Cryptography Foundation. In: Query Answer Authentication. Synthesis Lectures on Data Management. Springer, Cham. https://doi.org/10.1007/978-3-031-01887-9_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-01887-9_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-00759-0
Online ISBN: 978-3-031-01887-9
eBook Packages: Synthesis Collection of Technology (R0)eBColl Synthesis Collection 4