The first data structure is a tamper-evident log for use when a log is created and stored on an untrusted machine.
The second set of data structures are intended for publishing or storing data on untrusted servers. A trusted author creates data, signs it, and sends it to an untrusted publisher. Clients fetch the data from the publisher along with authentication information to verify the results.
The third data structure, spliced signatures, contains new algorithms and an evaluation of existing techniques for high throughput cryptography with the same semantics as ordinary public key digital signature schemes, but higher performance.Scott Crosby