DocumentCode
2180334
Title
New classes and applications of hash functions
Author
Wegman, Mark N. ; Carter, Lawrence J.
fYear
1979
fDate
29-31 Oct. 1979
Firstpage
175
Lastpage
182
Abstract
In this paper we exhibit several new classes of hash functions with certain desirable properties, and introduce two novel applications for hashing which make use of these functions. One class of functions is small, yet is almost universal2. If the functions hash n-bit long names into m-bit indices, then specifying a member of the class requires only O((m + log2log2(n)) log2(n)) bits as compared to O(n) bits for earlier techniques. For long names, this is about a factor of m larger than the lower bound of m+log2n-log2m bits. An application of this class is a provably secure authentication techniques for sending messages over insecure lines. A second class of functions satisfies a much stronger property than universal2. We present the application of testing sets for equality. The authentication technique allows the receiver to be certain that a message is genuine. An ´enemy´ - even one with infinite computer resources - cannot forge or modify a message without detection. The set equality technique allows the the operations ´add member to set´, ´delete member from set´ and ´test two sets for equality´ to be performed in expected constant time and with less than a specified probability of error.
Keywords
Algorithms; Application software; Associative memory; Authentication; Computer errors; Digital signatures; Packaging; Performance evaluation; Public key cryptography; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Foundations of Computer Science, 1979., 20th Annual Symposium on
Conference_Location
San Juan, Puerto Rico
ISSN
0272-5428
Type
conf
DOI
10.1109/SFCS.1979.26
Filename
4568013
Link To Document