Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/380752.380844acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Anti-persistence: history independent data structures

Published: 06 July 2001 Publication History

Abstract

Many data structures give away much more information than they were intended to. Whenever privacy is important, we need to be concerned that it might be possible to infer information from the memory representation of a data structure that is not available through its “legitimate” interface. Word processors that quietly maintain old versions of a document are merely the most egregious example of a general problem.
We deal with data structures whose current memory representation does not reveal their history. We focus on dictionaries, where this means revealing nothing about the order of insertions or deletions. Our first algorithm is a hash table based on open addressing, allowing O(1) insertion and search. We also present a history independent dynamic perfect hash table that uses space linear in the number of elements inserted and has expected amortized insertion and deletion time O(1). To solve the dynamic perfect hashing problem we devise a general scheme for history independent memory allocation. For fixed-size records this is quite efficient, with insertion and deletion both linear in the size of the record. Our variable-size record scheme is efficient enough for dynamic perfect hashing but not for general use. The main open problem we leave is whether it is possible to implement a variable-size record scheme with low overhead.

References

[1]
O. Amble and D. Knuth. Ordered hash tables. The Computer Journal, 17(2):135-142, 1974. Reprinted in: D. E. Knuth, Selected Papers on Analysis of Algorithms, Center for the Study of Language and Information Lecture Notes, no. 102, Stanford, 2000.
[2]
A. Andersson and T. Ottmann. Faster uniquely represented dictionaries. In Proc. 32nd IEEE Symp. on Foundations of Computer Science, pages 642-649, 1991.
[3]
R. P. Brent. Reducing the retrieval time of scatter storage techniques. Comm. of the ACM, 16:105-109, 1973.
[4]
M. Dietzfelbinger and F. Meyer auf der Heide. A new universal class of hash functions and dynamic hashing in real time. In International Colloquium on Automata, Languages, and Programming (ICALP), pages 6-19, 1990.
[5]
M. Dietzfelbinger, A. R. Karlin, K. Mehlhorn, F. M. auf der Heide, H. Rohnert, and R. E. Tarjan. Dynamic perfect hashing: Upper and lower bounds. SIAM J. Comput., 23(4):738-761, 1994.
[6]
J. R. Driscoll, N. Sarnak, D. D. Sleator, and R. E. Tarjan. Making data structures persistent. Journal of Computer and System Sciences, 38(1):86-124, 1989.
[7]
M. L. Fredman, J. Komlos, and E. Szemeredi. Storing a sparse table with o (1) worst case access time. Journal of the ACM, 31:538-544, 1984.
[8]
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. Journal of the ACM, 43(3):431-473, 1996.
[9]
L. J. Guibas and E. Szemeredi. The analysis of double hashing. Journal of Computer and System Sciences, 16:226-274, 1978.
[10]
D. E. Knuth. Sorting and Searching, Volume 3 of The Art of Computer Programming. Addison-Wesley, Reading, Massachusetts, second edition, 1998. First edition 1973.
[11]
R. J. Lipton and J. F. Naughton. Clocked adversaries for hashing. Algorithmica, 9(3):239-252, 1993.
[12]
G. S. Lueker and M. Molodowitch. More analysis of double hashing. Combinatorica, 13(1):83-96, 1993.
[13]
D. Micciancio. Oblivious data structures: Applications to cryptography. InProc. 29th ACM Symp. on Theory of Computing, pages 456-464, 1997.
[14]
J. P. Schmidt and A. Siegel. On aspects of universality and performance for closed hashing. In Proc. 21st ACM Symp. on Theory of Computing, pages 355-366, 1989.
[15]
R. Seidel and C. Aragon. Randomized search trees. Algorithmica, 16:464-497, 1996.
[16]
A. Siegel. On universal classes of fast high performance hash functions, their time-space tradeoff, and their applications. In Proc. 30th IEEE Symp. on Foundations of Computer Science, pages 20-25, 1989.
[17]
A. Siegel and J. Schmidt. The analysis of closed hashing under limited randomness. In Proc. 22nd ACM Symp. on Theory of Computing, pages 224-234, 1990.
[18]
A. C. Yao. Uniform hashing is optimal. Journal of the ACM, 32(3):687-693, 1985.

Cited By

View all
  • (2024)History-Independent Concurrent ObjectsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662814(14-24)Online publication date: 17-Jun-2024
  • (2024)History-Independent Dynamic Partitioning: Operation-Order Privacy in Ordered Data StructuresProceedings of the ACM on Management of Data10.1145/36516092:2(1-27)Online publication date: 14-May-2024
  • (2024)Layered List LabelingProceedings of the ACM on Management of Data10.1145/36516022:2(1-19)Online publication date: 14-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '01: Proceedings of the thirty-third annual ACM symposium on Theory of computing
July 2001
755 pages
ISBN:1581133499
DOI:10.1145/380752
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 July 2001

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. algorithms
  2. anti-persistence
  3. data structures
  4. hash table
  5. history independence
  6. privacy
  7. security

Qualifiers

  • Article

Conference

STOC01
Sponsor:

Acceptance Rates

STOC '01 Paper Acceptance Rate 83 of 230 submissions, 36%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)History-Independent Concurrent ObjectsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662814(14-24)Online publication date: 17-Jun-2024
  • (2024)History-Independent Dynamic Partitioning: Operation-Order Privacy in Ordered Data StructuresProceedings of the ACM on Management of Data10.1145/36516092:2(1-27)Online publication date: 14-May-2024
  • (2024)Layered List LabelingProceedings of the ACM on Management of Data10.1145/36516022:2(1-19)Online publication date: 14-May-2024
  • (2024)Quantum Control Machine: The Limits of Control Flow in Quantum ProgrammingProceedings of the ACM on Programming Languages10.1145/36498118:OOPSLA1(1-28)Online publication date: 29-Apr-2024
  • (2024)A Nearly Quadratic Improvement for Memory ReallocationProceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3626183.3659965(125-135)Online publication date: 17-Jun-2024
  • (2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
  • (2023)ESM2-Tree: An maintenance efficient authentication data structure in blockchainProceedings of the 35th International Conference on Scientific and Statistical Database Management10.1145/3603719.3603721(1-12)Online publication date: 10-Jul-2023
  • (2023)Splice: Efficiently Removing a User's Data from In-memory Application StateProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623070(2989-3002)Online publication date: 15-Nov-2023
  • (2023)Control, Confidentiality, and the Right to be ForgottenProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616585(3358-3372)Online publication date: 15-Nov-2023
  • (2023)Tight Cell-Probe Lower Bounds for Dynamic Succinct Dictionaries2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS57990.2023.00112(1842-1862)Online publication date: 6-Nov-2023
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media