Tight Thresholds for Cuckoo Hashing via XORSAT (Extended Abstract)

نویسندگان

  • Martin Dietzfelbinger
  • Andreas Goerdt
  • Michael Mitzenmacher
  • Andrea Montanari
  • Rasmus Pagh
  • Michael Rink
چکیده

We settle the question of tight thresholds for o ine cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key. Each key has k ≥ 3 (distinct) associated buckets chosen uniformly at random and independently of the choices of other keys. A hash table can be constructed successfully if each key can be placed into one of its buckets. We seek thresholds ck such that, as n goes to in nity, if n/m ≤ c for some c < ck then a hash table can be constructed successfully with high probability, and if n/m ≥ c for some c > ck a hash table cannot be constructed successfully with high probability. Here we are considering the o ine version of the problem, where all keys and hash values are given, so the problem is equivalent to previous models of multiple-choice hashing. We nd the thresholds for all values of k > 2 by showing that they are in fact the same as the previously known thresholds for the random k-XORSAT problem. We then extend these results to the setting where keys can have di ering number of choices, and make a conjecture (based on experimental observations) that extends our result to cuckoo hash tables storing multiple keys in a bucket.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tight Thresholds for Cuckoo Hashing via XORSAT

Abstract. We settle the question of tight thresholds for offline cuckoo hashing. The problem can be stated as follows: we have n keys to be hashed into m buckets each capable of holding a single key. Each key has k ≥ 3 (distinct) associated buckets chosen uniformly at random and independently of the choices of other keys. A hash table can be constructed successfully if each key can be placed in...

متن کامل

A Security Proof of KCDSA using an extended Random Oracle Model

We describe a tight security reduction to the discrete logarithm problem for KCDSA under an extended Random Oracle Model. This is achieved by generalising the signature scheme and producing a security proof for the generalised scheme. We require the application of Randomized Hashing. We also introduce a Challenger to the Random Oracle Model, who is external to the Simulator and Adversary. The C...

متن کامل

Load Thresholds for Cuckoo Hashing with Overlapping Blocks

Dietzfelbinger and Weidling [DW07] proposed a natural variation of cuckoo hashing where each of cn objects is assigned k = 2 intervals of size ` in a linear (or cyclic) hash table of size n and both start points are chosen independently and uniformly at random. Each object must be placed into a table cell within its intervals, but each cell can only hold one object. Experiments suggested that t...

متن کامل

Maximum Bipartite Matching Size And Application to Cuckoo Hashing

Cuckoo hashing with a stash is a robust multiplechoice hashing scheme with high memory utilization that canbe used in many network device applications. Unfortunately, formemory loads beyond 0.5, little is known on its performance.In this paper, we analyze its average performance over suchloads. We tackle this problem by recasting the problem as ananalysis of the expected...

متن کامل

Cuckoo Hashing for Undergraduates

This lecture note presents and analyses two simple hashing algorithms: “Hashing with Chaining”, and “Cuckoo Hashing”. The analysis uses only very basic (and intuitively understandable) concepts of probability theory, and is meant to be accessible even for undergraduates taking their first algorithms course.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010