Techniques for Authenticating Quantile Digests
Abstract
We investigate two possible techniques to authenticate the q-digest data structure, along with a worst-case study of the computational complexity both in time and space of the proposed solutions, and considerations on the feasibility of the presented approaches in real-world scenarios. We conclude the discussion by presenting some considerations on the information complexity of the queries in the two proposed approaches, and by presenting some interesting ideas that could be the subject of future studies on the topic.
- Publication:
-
arXiv e-prints
- Pub Date:
- January 2024
- DOI:
- 10.48550/arXiv.2401.10118
- arXiv:
- arXiv:2401.10118
- Bibcode:
- 2024arXiv240110118S
- Keywords:
-
- Computer Science - Data Structures and Algorithms;
- Computer Science - Distributed;
- Parallel;
- and Cluster Computing;
- E.1
- E-Print:
- 14 pages, LaTeX