Conference Paper

Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.

Conference: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings
Source: DBLP

ABSTRACT Motivated by the challenging task of designing \secure" vote storage mechanisms, we deal with information storage mechanisms that operate in extremely hostile environments. In such environments, the majority of existing techniques for information storage and for security are susceptible to powerful adversarial attacks. In this setting, we propose a mechanism for storing a set of at most K elements from a large universe of size N on write-once memories in a manner that does not reveal the insertion order of the elements. We consider a standard model for write-once memories, in which the memory is initialized to the all 0's state, and the only operation allowed is ∞ipping bits from 0 to 1. Whereas previously known constructions were either ine-cient (required £(K2) memory), randomized, or employed cryptographic techniques which are unlikely to be available in hostile environments, we eliminate each of these undesirable properties. The total amount of memory used by the mechanism is linear in the number of stored elements and poly-logarithmic in the size of the universe of elements. In addition, we consider one of the classical distributed computing problems: con∞ict reso- lution in multiple-access channels. By establishing a tight connection with the basic building block of our mechanism, we construct the flrst deterministic and non-adaptive con∞ict resolution algorithm whose running time is optimal up to poly-logarithmic factors.

0 Followers
 · 
84 Views
  • [Show abstract] [Hide abstract]
    ABSTRACT: A (d,ℓ)-list disjunct matrix is a non-adaptive group testing primitive which, given a set of items with at most d “defectives,” outputs a superset of the defectives containing less than ℓ non-defective items. The primitive has found many applications as stand alone objects and as building blocks in the construction of other combinatorial objects. This paper studies error-tolerant list disjunct matrices which can correct up to e 0 false positive and e 1 false negative tests in sub-linear time. We then use list-disjunct matrices to prove new results in three different applications. Our major contributions are as follows. (1) We prove several (almost)-matching lower and upper bounds for the optimal number of tests, including the fact that Θ(dlog(n/d) + e 0 + de 1) tests is necessary and sufficient when ℓ = Θ(d). Similar results are also derived for the disjunct matrix case (i.e. ℓ = 1). (2) We present two methods that convert error-tolerant list disjunct matrices in a black-box manner into error-tolerant list disjunct matrices that are also efficiently decodable. The methods help us derive a family of (strongly) explicit constructions of list-disjunct matrices which are either optimal or near optimal, and which are also efficiently decodable. (3) We show how to use error-correcting efficiently decodable list-disjunct matrices in three different applications: (i) explicit constructions of d-disjunct matrices with t = O(d 2logn + rd) tests which are decodable in poly(t) time, where r is the maximum number of test errors. This result is optimal for r = Ω(dlogn), and even for r = 0 this result improves upon known results; (ii) (explicit) constructions of (near)-optimal, error-correcting, and efficiently decodable monotone encodings; and (iii) (explicit) constructions of (near)-optimal, error-correcting, and efficiently decodable multiple user tracing families.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Abstract Cuckoo hashing is an e‐cient and practical dynamic dictionary. It provides expected amor- tized constant update time, worst case constant lookup time, and good memory utilization. Various experiments demonstrated that cuckoo hashing is highly suitable for modern computer architectures and distributed settings, and ofiers signiflcant improvements compared to other schemes. In this work we construct a practical history-independent dynamic dictionary based on cuckoo hashing. In a history-independent data structure, the memory representation at any point in time yields no information on the speciflc sequence of insertions and deletions that led to its current content, other than the content itself. Such a property is signiflcant when preventing unintended leakage of information, and was also found useful in several algorithmic settings. Our construction enjoys most of the attractive properties of cuckoo hashing. In particular, no dynamic memory allocation is required, updates are performed in expected amortized constant time, and membership queries are performed in worst case constant time. Moreover, with high probability, the lookup procedure queries only two memory entries which are independent and can be queried in parallel. The approach underlying our construction is to enforce a canonical memory representation on cuckoo hashing. That is, up to the initial randomness, each set of elements has a unique memory,representation. Incumbent of the Judith Kleeman Professorial Chair, Department of Computer Science and Applied Mathematics,
    Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations; 01/2008
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irreversibly by precise local heating. We discuss the main issues of designing a tamper-evident storage device and file system using the properties of the medium.
    6th USENIX Conference on File and Storage Technologies, FAST 2008, February 26-29, 2008, San Jose, CA, USA; 01/2008
Show more

Preview

Download
0 Downloads
Available from