SEARCH Articles Figures Tables Private Privatization Top-Down Tree Authentication with Small Amount of Private Storage