%0 Conference Proceedings %T Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases %+ Bosch [Pittsburgh] %A Yavuz, Attila, A. %Z Part 5: Data Outsourcing %< avec comité de lecture %( Lecture Notes in Computer Science %B 27th Data and Applications Security and Privacy (DBSec) %C Newark, NJ, United States %Y Lingyu Wang %Y Basit Shafiq %I Springer %3 Data and Applications Security and Privacy XXVII %V LNCS-7964 %P 179-194 %8 2013-07-15 %D 2013 %R 10.1007/978-3-642-39256-6_12 %K Applied cryptography %K outsourced databases %K immutable digital signatures %K distributed systems %K public key cryptography %Z Computer Science [cs]Conference papers %X Database outsourcing is a prominent trend that enables organizations to offload their data management overhead (e.g., query handling) to the external service providers. Immutable signatures are ideal tools to provide authentication and integrity for such applications with an important property called immutability. Signature immutability ensures that, no attacker can derive a valid signature for unposed queries from previous queries and their corresponding signatures. This prevents an attacker from creating his own de-facto services via such derived signatures. Unfortunately, existing immutable signatures are very computation and communication costly (e.g., highly interactive), which make them impractical for task-intensive and heterogeneous applications.In this paper, we developed two new schemes that we call Practical and Immutable Signature Bouquets (PISB ), which achieve efficient immutability for outsourced database systems. Both PISB  schemes are very simple, non-interactive, and computation/communication efficient. Our generic scheme can be constructed from any aggregate signature coupled with a standard signature. Hence, it can flexibly provide performance trade-offs for various types of applications. Our specific scheme is constructed from Condensed-RSA and Sequential Aggregate RSA. It has a very low verifier computational overhead and end-to-end delay with a small signature size. We showed that PISB  schemes are secure and also much more efficient than previous alternatives. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01490704/document %2 https://inria.hal.science/hal-01490704/file/978-3-642-39256-6_12_Chapter.pdf %L hal-01490704 %U https://inria.hal.science/hal-01490704 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-7964