Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications

06/20/2023
by   Kevin Yeo, et al.
0

Cuckoo hashing is a powerful primitive that enables storing items using small space with efficient querying. At a high level, cuckoo hashing maps n items into b entries storing at most ℓ items such that each item is placed into one of k randomly chosen entries. Additionally, there is an overflow stash that can store at most s items. Many cryptographic primitives rely upon cuckoo hashing to privately embed and query data where it is integral to ensure small failure probability when constructing cuckoo hashing tables as it directly relates to the privacy guarantees. As our main result, we present a more query-efficient cuckoo hashing construction using more hash functions. For construction failure probability ϵ, the query overhead of our scheme is O(1 + √(log(1/ϵ)/log n)). Our scheme has quadratically smaller query overhead than prior works for any target failure probability ϵ. We also prove lower bounds matching our construction. Our improvements come from a new understanding of the locality of cuckoo hashing failures for small sets of items. We also initiate the study of robust cuckoo hashing where the input set may be chosen with knowledge of the hash functions. We present a cuckoo hashing scheme using more hash functions with query overhead Õ(logλ) that is robust against poly(λ) adversaries. Furthermore, we present lower bounds showing that this construction is tight and that extending previous approaches of large stashes or entries cannot obtain robustness except with Ω(n) query overhead. As applications of our results, we obtain improved constructions for batch codes and PIR. In particular, we present the most efficient explicit batch code and blackbox reduction from single-query PIR to batch PIR.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/13/2023

Invertible Bloom Lookup Tables with Less Memory and Randomness

In this work we study Invertible Bloom Lookup Tables (IBLTs) with small ...
research
10/04/2022

SicHash – Small Irregular Cuckoo Tables for Perfect Hashing

A Perfect Hash Function (PHF) is a hash function that has no collisions ...
research
06/22/2019

Algorithms for Similarity Search and Pseudorandomness

We study the problem of approximate near neighbor (ANN) search and show ...
research
05/31/2020

Content-aware Neural Hashing for Cold-start Recommendation

Content-aware recommendation approaches are essential for providing mean...
research
09/11/2016

Sharing Hash Codes for Multiple Purposes

Locality sensitive hashing (LSH) is a powerful tool for sublinear-time a...
research
05/04/2021

Hardness-Preserving Reductions via Cuckoo Hashing

The focus of this work is hardness-preserving transformations of somewha...
research
03/08/2019

Understanding Sparse JL for Feature Hashing

Feature hashing and more general projection schemes are commonly used in...

Please sign up or login with your details

Forgot password? Click here to reset