Affiliation:
1. Weizmann Institute of Science, Rehovot, Israel
Abstract
Many efficient data structures use randomness, allowing them to improve upon deterministic ones. Usually, their efficiency and correctness are analyzed using probabilistic tools under the assumption that the inputs and queries are
independent
of the internal randomness of the data structure. In this work, we consider data structures in a more robust model, which we call the
adversarial model
. Roughly speaking, this model allows an adversary to choose inputs and queries
adaptively
according to previous responses. Specifically, we consider a data structure known as a “Bloom filter” and prove a tight connection between Bloom filters in this model and cryptography.
A Bloom filter represents a set
S
of elements approximately by using fewer bits than a precise representation. The price for succinctness is allowing for some errors: For any
x ∈ S
, it should always answer Yes, and for any
x ∉ S
it should answer Yes only with small probability.
In the adversarial model, we consider both efficient adversaries (that run in polynomial time) and computationally unbounded adversaries that are only bounded in the number of queries they can make. For computationally bounded adversaries, we show that non-trivial (memory-wise) Bloom filters exist if and only if one-way functions exist. For unbounded adversaries, we show that there exists a Bloom filter for sets of size
n
and error
ε
that is secure against
t
queries and uses only
O
(
n
log 1/ε +
t
) bits of memory. In comparison,
n
log 1/ε is the best possible under a non-adaptive adversary.
Funder
I-CORE Program of the Planning and Budgeting Committee, the Israel Science Foundation, BSF, and the Israeli Ministry of Science and Technology
Publisher
Association for Computing Machinery (ACM)
Subject
Mathematics (miscellaneous)
Reference50 articles.
1. Austin Appleby. 2011. Murmurhash3 64-bit Finalizer. Technical Report. Version 19/02/15. Retrieved from https://code.google. com/p/smhasher/wiki/MurmurHash3. Austin Appleby. 2011. Murmurhash3 64-bit Finalizer. Technical Report. Version 19/02/15. Retrieved from https://code.google. com/p/smhasher/wiki/MurmurHash3.
2. Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation
3. BLAKE2: Simpler, Smaller, Fast as MD5
4. Explicit and Efficient Hash Families Suffice for Cuckoo Hashing with a Stash
5. Don't thrash
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献