2008
DOI: 10.1137/060658400
|View full text |Cite
|
Sign up to set email alerts
|

Uniform Hashing in Constant Time and Optimal Space

Abstract: Many algorithms and data structures employing hashing have been analyzed under the uniform hashing assumption, i.e., the assumption that hash functions behave like truly random functions. Starting with the discovery of universal hash functions, many researchers have studied to what extent this theoretical ideal can be realized by hash functions that do not take up too much space and can be evaluated quickly. In this paper we present an almost ideal solution to this problem: A hash function h : U → V that, on a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
132
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 71 publications
(132 citation statements)
references
References 21 publications
0
132
0
Order By: Relevance
“…The Hash Function Family G. Pagh and Pagh [PP08] and Dietzfelbinger and Woelfel [DW03] (see also Aumuller et al [ADW14]) showed how to construct a family G of hash functions g : U → V so that on any set of k inputs it behaves like a truly random function with high probability (1 − 1/poly(k)). Furthermore, g can be evaluated in constant time (in the RAM model), and its description can be stored using (1 + α)k log |V | + O(k) bits (where here α is an arbitrarily small constant).…”
Section: Computationally Unbounded Adversarymentioning
confidence: 99%
See 1 more Smart Citation
“…The Hash Function Family G. Pagh and Pagh [PP08] and Dietzfelbinger and Woelfel [DW03] (see also Aumuller et al [ADW14]) showed how to construct a family G of hash functions g : U → V so that on any set of k inputs it behaves like a truly random function with high probability (1 − 1/poly(k)). Furthermore, g can be evaluated in constant time (in the RAM model), and its description can be stored using (1 + α)k log |V | + O(k) bits (where here α is an arbitrarily small constant).…”
Section: Computationally Unbounded Adversarymentioning
confidence: 99%
“…Since each element is compared only with two cells, this lets us improve the analysis of the reduction which reduce the size of V to O 1 ε (instead of n ε ). To initialize the hash function g, instead of using a universal hash function we use a very high independence function (which in turn is also constructed based on cuckoo hashing) based on the work of Pagh and Pagh [PP08] and Dietzfelbinger and Woelfel [DW03]. They showed how to construct a family G of hash functions so that on any given set of k inputs it behaves like a truly random function with high probability.…”
Section: Computationally Unbounded Adversariesmentioning
confidence: 99%
“…Pagh and Pagh [42] showed that when the families H and G are of "high enough" independence, that is, roughly (c · log |S|)-wise independent, then the family PP(H, G, Π) is O(|S| −c )-indistinguishable from random by a |S|-query, non-adaptive distinguisher, where Π is the set of all functions from S to R. Note that the security of the resulting family goes well beyond the birthday attack barrier: it is indistinguishable from random by an attacker making |S| |S| queries. Aumüller et al [4] (building on the work of Dietzfelbinger and Woelfel [15]) strengthen the result of [42] by using more sophisticated hash functions H and G (rather than the O(log |S|)-wise independent that [42] used).…”
Section: Cuckoo Hashing and Many-wise Independent Hash Functionmentioning
confidence: 99%
“…Pagh and Pagh [42] showed that when the families H and G are of "high enough" independence, that is, roughly (c · log |S|)-wise independent, then the family PP(H, G, Π) is O(|S| −c )-indistinguishable from random by a |S|-query, non-adaptive distinguisher, where Π is the set of all functions from S to R. Note that the security of the resulting family goes well beyond the birthday attack barrier: it is indistinguishable from random by an attacker making |S| |S| queries. Aumüller et al [4] (building on the work of Dietzfelbinger and Woelfel [15]) strengthen the result of [42] by using more sophisticated hash functions H and G (rather than the O(log |S|)-wise independent that [42] used). Specifically, for a given s ≥ 0, Aumüller et al [4] constructed a function family ADW s (H, G, Π) that is O(|S| −(s+1) )-indistinguishable from random by a |S|-query, non-adaptive distinguisher, where Π is the set of all functions from S to R. 2 The idea to use more sophisticated hash functions, in the sense that they require less combinatorial work, already appeared in previous works, e.g., the work of Arbitman et al [2, §5.4].…”
Section: Cuckoo Hashing and Many-wise Independent Hash Functionmentioning
confidence: 99%
See 1 more Smart Citation