Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Dispersing Hash Functions

View through CrossRef
A new hashing primitive is introduced: dispersing hash functions. A family<br />of hash functions F is dispersing if, for any set S of a certain size and random<br />h in F, the expected value of |S|−|h[S]| is not much larger than the expectancy<br />if h had been chosen at random from the set of all functions.<br />We give tight, up to a logarithmic factor, upper and lower bounds on the<br />size of dispersing families. Such families previously studied, for example <br />universal families, are significantly larger than the smallest dispersing families,<br />making them less suitable for derandomization. We present several applications<br /> of dispersing families to derandomization (fast element distinctness, set<br />inclusion, and static dictionary initialization). Also, a tight relationship <br />between dispersing families and extractors, which may be of independent interest,<br />is exhibited.<br />We also investigate the related issue of program size for hash functions<br />which are nearly perfect. In particular, we exhibit a dramatic increase in<br />program size for hash functions more dispersing than a random function.
Det Kgl. Bibliotek/Royal Danish Library
Title: Dispersing Hash Functions
Description:
A new hashing primitive is introduced: dispersing hash functions.
A family<br />of hash functions F is dispersing if, for any set S of a certain size and random<br />h in F, the expected value of |S|−|h[S]| is not much larger than the expectancy<br />if h had been chosen at random from the set of all functions.
<br />We give tight, up to a logarithmic factor, upper and lower bounds on the<br />size of dispersing families.
Such families previously studied, for example <br />universal families, are significantly larger than the smallest dispersing families,<br />making them less suitable for derandomization.
We present several applications<br /> of dispersing families to derandomization (fast element distinctness, set<br />inclusion, and static dictionary initialization).
Also, a tight relationship <br />between dispersing families and extractors, which may be of independent interest,<br />is exhibited.
<br />We also investigate the related issue of program size for hash functions<br />which are nearly perfect.
In particular, we exhibit a dramatic increase in<br />program size for hash functions more dispersing than a random function.

Related Results

Building a 256-bit hash function on a stronger MD variant
Building a 256-bit hash function on a stronger MD variant
AbstractCryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash func...
Tightly security code based two tier signature using chameleon hash functions
Tightly security code based two tier signature using chameleon hash functions
Abstract The advancement of quantum algorithms threatens traditional digital signatures, prompting the exploration of post-quantum solutions such as code-based signatures w...
Linked List Elimination from Hashing Methods
Linked List Elimination from Hashing Methods
Hashing has been used for decades in many fields such as encryption, password verification, and pattern search. Hash systems consist mainly of three components: the hash function, ...
Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, an...
Detection of seam carving‐based video retargeting using forensics hash
Detection of seam carving‐based video retargeting using forensics hash
AbstractSeam carving is a content‐aware multimedia retargeting technique to adaptively resize multimedia data for different display sizes. However, it can also be used to remove ob...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
Effect of Dispersing Agents on the Electrical and Mechanical Performance of GNPs Filled Epoxy Nanocomposite
Effect of Dispersing Agents on the Electrical and Mechanical Performance of GNPs Filled Epoxy Nanocomposite
In this work, graphene nanoplatelets (GNPs) filled epoxy nanocomposites with the addition of different dispersing agents were fabricated using a method combines mechanical mixing a...
Modification of Epoxy/Recovered Carbon Black (rcB): The Effect of Defoamer and Dispersing Agent
Modification of Epoxy/Recovered Carbon Black (rcB): The Effect of Defoamer and Dispersing Agent
This study focused on recovered carbon black (rCB), obtained from the pyrolysis of end-of-life (EOL) rubber tyres. The rCB was mixed with epoxy resin and diethyl toluene diamine (D...

Back to Top