Cuckoo Hashing In Cryptography Optimal Parameters Robustness And Applications
Yeo Kevin. Arxiv 2023
[Paper]
ARXIV
Graph
Independent
Cuckoo hashing is a powerful primitive that enables storing items using small
space with efficient querying. At a high level, cuckoo hashing maps items
into entries storing at most items such that each item is placed
into one of randomly chosen entries. Additionally, there is an overflow
stash that can store at most items. Many cryptographic primitives rely upon
cuckoo hashing to privately embed and query data where it is integral to ensure
small failure probability when constructing cuckoo hashing tables as it
directly relates to the privacy guarantees.
As our main result, we present a more query-efficient cuckoo hashing
construction using more hash functions. For construction failure probability
, the query overhead of our scheme is . Our scheme has quadratically smaller query
overhead than prior works for any target failure probability . We
also prove lower bounds matching our construction. Our improvements come from a
new understanding of the locality of cuckoo hashing failures for small sets of
items.
We also initiate the study of robust cuckoo hashing where the input set may
be chosen with knowledge of the hash functions. We present a cuckoo hashing
scheme using more hash functions with query overhead
that is robust against poly adversaries. Furthermore, we present
lower bounds showing that this construction is tight and that extending
previous approaches of large stashes or entries cannot obtain robustness except
with query overhead.
As applications of our results, we obtain improved constructions for batch
codes and PIR. In particular, we present the most efficient explicit batch code
and blackbox reduction from single-query PIR to batch PIR.
Similar Work