Strongly History Independent Hashing with Deletion
نویسندگان
چکیده
We present a strongly history independent (SHI) hash table that is fast, space efficient, and supports deletions. A hash table that supports deletions is SHI if it has a canonical memory representation up to randomness. That is, the string of random bits and current hash table contents (the set of (key, object) pairs in the hash table) uniquely determine its layout in memory, independently of the sequence of operations from initialization to the current state. Thus, the memory representation of a SHI hash table reveals exactly the information available through the hash table interface, and nothing more. Our construction also reveals a subtle connection between history independent hashing and the Gale-Shapley stable marriage algorithm [7], which may be of independent interest. Additionally, we give a general technique for converting data structures with canonical representations in a pure pointer machine model into RAM data structures of comparable performance and that are SHI with high probability. Thus we develop the last ingredient necessary to efficiently implement a host of SHI data structures on a RAM. This research is supported by NSF ITR grants CCR-0122581 (The Aladdin Center) and IIS-0121678.
منابع مشابه
Òøø¹ôö×××øøò Àà×øóöý Áòòòôòòòòø Øø Ëøöù Blockinøùöö×
Many data stru tures give away mu h more information than they were intended to. Whenever priva y is important, we need to be on erned that it might be possible to infer information from the memory representation of a data stru ture that is not available through its \legitimate" interfa e. Word pro essors that quietly maintain old versions of a do ument are merely the most egregious example of ...
متن کاملA Queueing Analysis of Hashing with Lazy Deletion
Hashing with lazy deletion is a simple method for maintaining a dynamic dictionary: items are inserted and sought as usual in a separate-chaining hash table; however, items that no longer need to be in the data structure remain until a later insertion operation stumbles on them and removes them from the table. Because hashing with lazy deletion does not delete items as soon as possible, it keep...
متن کاملHistory-Independent Cuckoo Hashing
Cuckoo hashing is an efficient and practical dynamic dictionary. It provides expected amortized constant update time, worst case constant lookup time, and good memory utilization. Various experiments demonstrated that cuckoo hashing is highly suitable for modern computer architectures and distributed settings, and offers significant improvements compared to other schemes. In this work we constr...
متن کاملImage authentication using LBP-based perceptual image hashing
Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...
متن کاملAn Overview of Cuckoo Hashing
Cuckoo Hashing is a technique for resolving collisions in hash tables that produces a dictionary with constant-time worst-case lookup and deletion operations as well as amortized constant-time insertion operations. First introduced by Pagh in 2001 [3] as an extension of a previous static dictionary data structure, Cuckoo Hashing was the first such hash table with practically small constant fact...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006