Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications

نویسندگان

چکیده

Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At high level, cuckoo maps n into b entries at most $$\ell $$ such each item placed one of k randomly chosen entries. Additionally, there an overflow stash can store s items. Many cryptographic primitives rely upon to privately embed and query data where it integral ensure failure probability when constructing tables as directly relates the privacy guarantees. As our main result, we present more query-efficient construction hash functions. For $$\epsilon , overhead scheme $$O(1 + \sqrt{\log (1/\epsilon )/\log n})$$ . Our has quadratically smaller than prior works for any target We also prove lower bounds matching construction. improvements come from new understanding locality failures sets initiate study robust input set may be knowledge functions $$\tilde{O}(\log \lambda )$$ against $$\textsf{poly}(\lambda adversaries. Furthermore, showing this tight extending previous approaches large stashes or cannot obtain robustness except $$\varOmega (n)$$ overhead. applications results, improved constructions batch codes PIR. In particular, explicit code blackbox reduction single-query PIR

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cuckoo Hashing

We present a simple and e cient dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. (Dynamic perfect hashing: Upper and lower bounds. SIAM J. Comput., 23(4):738 761, 1994). The space usage is similar to that of binary search trees, i.e., three words per key on average. The practicality of th...

متن کامل

Cuckoo Hashing with Pages

Although cuckoo hashing has significant applications in both theoretical and practical settings, a relevant downside is that it requires lookups to multiple locations. In many settings, where lookups are expensive, cuckoo hashing becomes a less compelling alternative. One such standard setting is when memory is arranged in large pages, and a major cost is the number of page accesses. We propose...

متن کامل

History-Independent Cuckoo Hashing

Cuckoo hashing is an efficient and practical dynamic dictionary. It provides expected amortized constant update time, worst case constant lookup time, and good memory utilization. Various experiments demonstrated that cuckoo hashing is highly suitable for modern computer architectures and distributed settings, and offers significant improvements compared to other schemes. In this work we constr...

متن کامل

Cuckoo hashing: Further analysis

We consider cuckoo hashing as proposed by Pagh and Rodler in 2001. We show that the expected construction time of the hash table is O(n) as long as the two open addressing tables are each of size at least (1 + ǫ)n, where ǫ > 0 and n is the number of data points. Slightly improved bounds are obtained for various probabilities and constraints. The analysis rests on simple properties of branching ...

متن کامل

Cuckoo Hashing for Undergraduates

This lecture note presents and analyses two simple hashing algorithms: “Hashing with Chaining”, and “Cuckoo Hashing”. The analysis uses only very basic (and intuitively understandable) concepts of probability theory, and is meant to be accessible even for undergraduates taking their first algorithms course.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-38551-3_7