skip to main content
10.1145/2746539.2746620acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

From Independence to Expansion and Back Again

Published:14 June 2015Publication History

ABSTRACT

We consider the following fundamental problems: Constructing k-independent hash functions with a space-time tradeoff close to Siegel's lower bound. Constructing representations of unbalanced expander graphs having small size and allowing fast computation of the neighbor function.

It is not hard to show that these problems are intimately connected in the sense that a good solution to one of them leads to a good solution to the other one. In this paper we exploit this connection to present efficient, recursive constructions of k-independent hash functions (and hence expanders with a small representation). While the previously most efficient construction (Thorup, FOCS 2013) needed time quasipolynomial in Siegel's lower bound, our time bound is just a logarithmic factor from the lower bound.

References

  1. A. Z. Broder, A. M. Frieze, and E. Upfal. Static and dynamic path selection on expander graphs: a random walk approach. Random Structures & Algorithms, 14(1):87--109, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Burhman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh. Are bitvectors optimal? SIAM J. Comput., 31(6):1723--1744, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Capalbo, O. Reingold, S. Vadhan, and A. Wigderson. Randomness conductors and constant-degree lossless expanders. In Proc. STOC '02, pages 659--668, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. L. Carter and M. N. Wegman. Universal classes of hash functions. In Proc. STOC '77, pages 106--112, 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. L. Carter and M. N. Wegman. New hash functions and their use in authentication and set equality. J. Comput. System Sci., 22(3):265--279, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  6. B. Chor, O. Goldreich, J. Hastad, J. Freidmann, S. Rudich, and R. Smolensky. The bit extration problem or t-resilient functions. In Proc. FOCS '85, pages 396--407, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. Christiani and R. Pagh. Generating k-independent variables in constant time. In Proc. FOCS '14, pages 196--205, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Dietz-felbinger and F. Meyer auf der Heide. A new universal class of hash functions and dynamic hashing in real time. In Proc. ICALP '90, pages 6--19. 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Dietzfelbinger. On randomness in hash functions (invited talk). In Proc. STACS '12, pages 25--28, 2012.Google ScholarGoogle Scholar
  10. M. Dietzfelbinger and P. Woelfel. Almost random graphs with simple hash functions. In Proc. STOC '03, pages 629--638, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. V. Guruswami, C. Umans, and S. Vadhan. Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes. J. ACM, 56(4):20:1--20:34, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Hagerup. Sorting and searching on the word RAM. In Proc. STACS '98, pages 366--398, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Indyk and A. Gilbert. Sparse recovery using sparse matrices. Proc. IEEE, 98(6):937--947, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  14. A. Joffe. On a set of almost deterministic k-independent random variables. Ann. Prob., 2(1):161--162, 1974.Google ScholarGoogle ScholarCross RefCross Ref
  15. K. S. Kedlaya and C. Umans. Fast modular composition in any characteristic. In Proc. FOCS '08, pages 146--155, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. W. Kernighan and D. M. Ritchie. The C Programming Language. Prentice Hall, Englewood Cliffs, New Jersey, second edition, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. K. G. Larsen. Higher cell probe lower bounds for evaluating polynomials. In Proc. FOCS '12, pages 293--301, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. B. Miltersen. Lower bounds for static dictionaries on RAMs with bit operations but no multiplications. In Proc. ICALP '96, pages 442--453, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Pagh and R. Pagh. Uniform hashing in constant time and optimal space. SIAM J. Comput., 38(1):85--96, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. F. Parvaresh and A. Vardy. Correcting errors beyond the Guruswami-Sudan radius in polynomial time. In Proc. FOCS '05, pages 285--294, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Patraşcu and M. Thorup. Dynamic integer sets with optimal rank, select, and predecessor search. In Proc. FOCS '14, pages 166--175, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Siegel. On universal classes of extremely random constant-time hash functions. SIAM J. Comput., 33(3):505--543, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Ta-Shma, C. Umans, and D. Zuckerman. Lossless condensers, unbalanced expanders, and extractors. Combinatorica, 27(2):213--240, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Thorup. Simple tabulation, fast expanders, double tabulation, and high independence. In Proc. FOCS '13, pages 90--99, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. From Independence to Expansion and Back Again

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in
                      • Published in

                        cover image ACM Conferences
                        STOC '15: Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
                        June 2015
                        916 pages
                        ISBN:9781450335362
                        DOI:10.1145/2746539

                        Copyright © 2015 ACM

                        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 14 June 2015

                        Permissions

                        Request permissions about this article.

                        Request Permissions

                        Check for updates

                        Qualifiers

                        • research-article

                        Acceptance Rates

                        STOC '15 Paper Acceptance Rate93of347submissions,27%Overall Acceptance Rate1,469of4,586submissions,32%

                        Upcoming Conference

                        STOC '24
                        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                        June 24 - 28, 2024
                        Vancouver , BC , Canada

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader