Tuesday, August 28, 2007

Authenticated datastructure

Hello world, again !

I was reading through some papers about authenticated datastructure and found it very interesting. I wrote a small article about it here.

Interestingly, the most studied authenticated datastructure is Skip list, which is the inspiration behind the early structured P2P overlay (named Chord). There seems to be a connection between this interesting idea and P2P. At the moment, however, it is not yet clear to me how such datastructure could be used in P2P (or transformed into P2P environement). Any idea is more than welcome.