Theory and practice of bloom filters for distributed systems

S Tarkoma, CE Rothenberg… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
Many network solutions and overlay networks utilize probabilistic techniques to reduce
information processing and networking costs. This survey article presents a number of …

Xor filters: Faster and smaller than bloom and cuckoo filters

TM Graf, D Lemire - Journal of Experimental Algorithmics (JEA), 2020 - dl.acm.org
The Bloom filter provides fast approximate set membership while using little memory.
Engineers often use these filters to avoid slow operations such as disk or network accesses …

Practical volume-hiding encrypted multi-maps with optimal overhead and beyond

J Wang, SF Sun, T Li, S Qi, X Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …

Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations

G Asharov, M Naor, G Segev, I Shahaf - … of the forty-eighth annual ACM …, 2016 - dl.acm.org
Searchable symmetric encryption (SSE) enables a client to store a database on an untrusted
server while supporting keyword search in a secure manner. Despite the rapidly increasing …

Hash, displace, and compress

D Belazzougui, FC Botelho, M Dietzfelbinger - European Symposium on …, 2009 - Springer
A hash function h, ie, a function from the set U of all keys to the range range [m]={0,..., m− 1}
is called a perfect hash function (PHF) for a subset S⊆ U of size n≤ m if h is 1-1 on S. The …

Tight thresholds for cuckoo hashing via XORSAT

M Dietzfelbinger, A Goerdt, M Mitzenmacher… - … and Programming: 37th …, 2010 - Springer
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …

Backyard cuckoo hashing: Constant worst-case operations with a succinct representation

Y Arbitman, M Naor, G Segev - 2010 IEEE 51st Annual …, 2010 - ieeexplore.ieee.org
The performance of a dynamic dictionary is measured mainly by its update time, lookup time,
and space consumption. In terms of update time and lookup time there are known …

Ribbon filter: practically smaller than Bloom and Xor

PC Dillinger, S Walzer - arXiv preprint arXiv:2103.02515, 2021 - arxiv.org
Filter data structures over-approximate a set of hashable keys, ie set membership queries
may incorrectly come out positive. A filter with false positive rate $ f\in (0, 1] $ is known to …

Probabilistic data structures in adversarial environments

D Clayton, C Patton, T Shrimpton - Proceedings of the 2019 ACM …, 2019 - dl.acm.org
Probabilistic data structures use space-efficient representations of data in order to
(approximately) respond to queries about the data. Traditionally, these structures are …

Binary fuse filters: Fast and smaller than xor filters

TM Graf, D Lemire - Journal of Experimental Algorithmics (JEA), 2022 - dl.acm.org
Bloom and cuckoo filters provide fast approximate set membership while using little memory.
Engineers use them to avoid expensive disk and network accesses. The recently introduced …