New classes and applications of hash functions
- 1 October 1979
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 02725428,p. 175-182
- https://doi.org/10.1109/sfcs.1979.26
Abstract
In this paper we exhibit several new classes of hash functions with certain desirable properties, and introduce two novel applications for hashing which make use of these functions. One class of functions is small, yet is almost universal2. If the functions hash n-bit long names into m-bit indices, then specifying a member of the class requires only O((m + log2log2(n)) log2(n)) bits as compared to O(n) bits for earlier techniques. For long names, this is about a factor of m larger than the lower bound of m+log2n-log2m bits. An application of this class is a provably secure authentication techniques for sending messages over insecure lines. A second class of functions satisfies a much stronger property than universal2. We present the application of testing sets for equality. The authentication technique allows the receiver to be certain that a message is genuine. An 'enemy' - even one with infinite computer resources - cannot forge or modify a message without detection. The set equality technique allows the the operations 'add member to set', 'delete member from set' and 'test two sets for equality' to be performed in expected constant time and with less than a specified probability of error.Keywords
This publication has 6 references indexed in Scilit:
- Extendible hashing—a fast access method for dynamic filesACM Transactions on Database Systems, 1979
- Repeated use of codes which detect deception (Corresp.)IEEE Transactions on Information Theory, 1979
- Some complexity questions related to distributive computing(Preliminary Report)Published by Association for Computing Machinery (ACM) ,1979
- Exact and approximate membership testersPublished by Association for Computing Machinery (ACM) ,1978
- Universal classes of hash functions (Extended Abstract)Published by Association for Computing Machinery (ACM) ,1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976