Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
نویسندگان
چکیده
Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At high level, cuckoo maps n into b entries at most $$\ell $$ such each item placed one of k randomly chosen entries. Additionally, there an overflow stash can store s items. Many cryptographic primitives rely upon to privately embed and query data where it integral ensure failure probability when constructing tables as directly relates the privacy guarantees. As our main result, we present more query-efficient construction hash functions. For $$\epsilon , overhead scheme $$O(1 + \sqrt{\log (1/\epsilon )/\log n})$$ . Our has quadratically smaller than prior works for any target We also prove lower bounds matching construction. improvements come from new understanding locality failures sets initiate study robust input set may be knowledge functions $$\tilde{O}(\log \lambda )$$ against $$\textsf{poly}(\lambda adversaries. Furthermore, showing this tight extending previous approaches large stashes or cannot obtain robustness except $$\varOmega (n)$$ overhead. applications results, improved constructions batch codes PIR. In particular, explicit code blackbox reduction single-query PIR
منابع مشابه
Cuckoo Hashing
We present a simple and e cient dictionary with worst case constant lookup time, equaling the theoretical performance of the classic dynamic perfect hashing scheme of Dietzfelbinger et al. (Dynamic perfect hashing: Upper and lower bounds. SIAM J. Comput., 23(4):738 761, 1994). The space usage is similar to that of binary search trees, i.e., three words per key on average. The practicality of th...
متن کاملCuckoo Hashing with Pages
Although cuckoo hashing has significant applications in both theoretical and practical settings, a relevant downside is that it requires lookups to multiple locations. In many settings, where lookups are expensive, cuckoo hashing becomes a less compelling alternative. One such standard setting is when memory is arranged in large pages, and a major cost is the number of page accesses. We propose...
متن کاملHistory-Independent Cuckoo Hashing
Cuckoo hashing is an efficient and practical dynamic dictionary. It provides expected amortized constant update time, worst case constant lookup time, and good memory utilization. Various experiments demonstrated that cuckoo hashing is highly suitable for modern computer architectures and distributed settings, and offers significant improvements compared to other schemes. In this work we constr...
متن کاملCuckoo hashing: Further analysis
We consider cuckoo hashing as proposed by Pagh and Rodler in 2001. We show that the expected construction time of the hash table is O(n) as long as the two open addressing tables are each of size at least (1 + ǫ)n, where ǫ > 0 and n is the number of data points. Slightly improved bounds are obtained for various probabilities and constraints. The analysis rests on simple properties of branching ...
متن کاملCuckoo Hashing for Undergraduates
This lecture note presents and analyses two simple hashing algorithms: “Hashing with Chaining”, and “Cuckoo Hashing”. The analysis uses only very basic (and intuitively understandable) concepts of probability theory, and is meant to be accessible even for undergraduates taking their first algorithms course.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-38551-3_7