{"id":"https://openalex.org/W2951538235","doi":"https://doi.org/10.1145/3306193","title":"Bloom Filters in Adversarial Environments","display_name":"Bloom Filters in Adversarial Environments","publication_year":2019,"publication_date":"2019-06-07","ids":{"openalex":"https://openalex.org/W2951538235","doi":"https://doi.org/10.1145/3306193","mag":"2951538235"},"language":"en","primary_location":{"id":"doi:10.1145/3306193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3306193","pdf_url":null,"source":{"id":"https://openalex.org/S137348503","display_name":"ACM Transactions on Algorithms","issn_l":"1549-6325","issn":["1549-6325","1549-6333"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Algorithms","raw_type":"journal-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1412.8356","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002372704","display_name":"Moni Naor","orcid":"https://orcid.org/0000-0003-3381-0221"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Moni Naor","raw_affiliation_strings":["Weizmann Institute of Science, Rehovot, Israel","Weizmann institute of science;"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science, Rehovot, Israel","institution_ids":["https://openalex.org/I53964585"]},{"raw_affiliation_string":"Weizmann institute of science;","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048056525","display_name":"Eylon Yogev","orcid":"https://orcid.org/0000-0001-8599-2472"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yogev Eylon","raw_affiliation_strings":["Weizmann Institute of Science, Rehovot, Israel","Weizmann institute of science;"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science, Rehovot, Israel","institution_ids":["https://openalex.org/I53964585"]},{"raw_affiliation_string":"Weizmann institute of science;","institution_ids":["https://openalex.org/I53964585"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5002372704"],"corresponding_institution_ids":["https://openalex.org/I53964585"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07356851,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"3","first_page":"1","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9846000075340271,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.8053511381149292},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.6809929609298706},{"id":"https://openalex.org/keywords/bounded-function","display_name":"Bounded function","score":0.6706158518791199},{"id":"https://openalex.org/keywords/succinctness","display_name":"Succinctness","score":0.6289802193641663},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.557199239730835},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5309897065162659},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.4761131703853607},{"id":"https://openalex.org/keywords/binary-logarithm","display_name":"Binary logarithm","score":0.47459834814071655},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.4727046489715576},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4669664204120636},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.46325597167015076},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4405371844768524},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.39985787868499756},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3863656520843506}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.8053511381149292},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.6809929609298706},{"id":"https://openalex.org/C34388435","wikidata":"https://www.wikidata.org/wiki/Q2267362","display_name":"Bounded function","level":2,"score":0.6706158518791199},{"id":"https://openalex.org/C2776493592","wikidata":"https://www.wikidata.org/wiki/Q5158717","display_name":"Succinctness","level":2,"score":0.6289802193641663},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.557199239730835},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5309897065162659},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.4761131703853607},{"id":"https://openalex.org/C63553672","wikidata":"https://www.wikidata.org/wiki/Q581168","display_name":"Binary logarithm","level":2,"score":0.47459834814071655},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.4727046489715576},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4669664204120636},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.46325597167015076},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4405371844768524},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.39985787868499756},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3863656520843506},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.1145/3306193","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3306193","pdf_url":null,"source":{"id":"https://openalex.org/S137348503","display_name":"ACM Transactions on Algorithms","issn_l":"1549-6325","issn":["1549-6325","1549-6333"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:1412.8356","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1412.8356","pdf_url":"https://arxiv.org/pdf/1412.8356","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2951538235","is_oa":true,"landing_page_url":"https://arxiv.org/pdf/1412.8356","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"mag:3193799956","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2015/543.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.696.1081","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.696.1081","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.wisdom.weizmann.ac.il/%7Enaor/PAPERS/adversarial_bloom.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.736.2870","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.736.2870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://eprint.iacr.org/2015/543.pdf","raw_type":"text"},{"id":"doi:10.48550/arxiv.1412.8356","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1412.8356","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1412.8356","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1412.8356","pdf_url":"https://arxiv.org/pdf/1412.8356","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2951538235.pdf"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W106528892","https://openalex.org/W146232293","https://openalex.org/W1531269151","https://openalex.org/W1794707733","https://openalex.org/W1856342626","https://openalex.org/W1891810191","https://openalex.org/W1965185568","https://openalex.org/W1967373117","https://openalex.org/W1972464518","https://openalex.org/W1974751157","https://openalex.org/W1981029888","https://openalex.org/W1988355221","https://openalex.org/W1993284846","https://openalex.org/W1996453724","https://openalex.org/W2007550813","https://openalex.org/W2008159385","https://openalex.org/W2018423671","https://openalex.org/W2019363670","https://openalex.org/W2028169764","https://openalex.org/W2058097145","https://openalex.org/W2059271645","https://openalex.org/W2069074882","https://openalex.org/W2074524675","https://openalex.org/W2074633331","https://openalex.org/W2077300005","https://openalex.org/W2081533422","https://openalex.org/W2081869611","https://openalex.org/W2083100635","https://openalex.org/W2108423974","https://openalex.org/W2116435146","https://openalex.org/W2116967744","https://openalex.org/W2123845384","https://openalex.org/W2125763460","https://openalex.org/W2126540423","https://openalex.org/W2146183750","https://openalex.org/W2149356828","https://openalex.org/W2154127540","https://openalex.org/W2154952480","https://openalex.org/W2155841152","https://openalex.org/W2167071579","https://openalex.org/W2167736695","https://openalex.org/W2399200320","https://openalex.org/W2912601938","https://openalex.org/W2952057288","https://openalex.org/W4238893454","https://openalex.org/W4250261234"],"related_works":["https://openalex.org/W3193799956","https://openalex.org/W3166408207","https://openalex.org/W2950086258","https://openalex.org/W2031633693","https://openalex.org/W3029490717","https://openalex.org/W3126570451","https://openalex.org/W2304319676","https://openalex.org/W247605359","https://openalex.org/W2952049331","https://openalex.org/W2784889254","https://openalex.org/W2124183676","https://openalex.org/W1981281205","https://openalex.org/W2951086828","https://openalex.org/W3030794730","https://openalex.org/W934350761","https://openalex.org/W3091701562","https://openalex.org/W3199936449","https://openalex.org/W3195238378","https://openalex.org/W1520721073","https://openalex.org/W2142812941"],"abstract_inverted_index":{"Many":[0],"efficient":[1,160],"data":[2,39,46,81],"structures":[3,47],"use":[4],"randomness,":[5],"allowing":[6,124],"them":[7],"to":[8,67,74],"improve":[9],"upon":[10],"deterministic":[11],"ones.":[12],"Usually,":[13],"their":[14],"efficiency":[15],"and":[16,29,70,88,99,139,167,196,218,227],"correctness":[17],"are":[18,31,172],"analyzed":[19],"using":[20,112],"probabilistic":[21],"tools":[22],"under":[23,250],"the":[24,27,34,38,56,154,176,247],"assumption":[25],"that":[26,171,189,207,221],"inputs":[28,69],"queries":[30,71,179,226],"independent":[32],"of":[33,37,108,178,215,239],"internal":[35],"randomness":[36],"structure.":[40],"In":[41,153,241],"this":[42,62,97],"work,":[43],"we":[44,54,78,157,187,205],"consider":[45,79,158],"in":[48,96,164,175],"a":[49,80,85,90,105,116,210,251],"more":[50],"robust":[51],"model,":[52,156],"which":[53],"call":[55],"adversarial":[57,155],"model":[58,63,98],".":[59],"Roughly":[60],"speaking,":[61],"allows":[64],"an":[65],"adversary":[66],"choose":[68],"adaptively":[72],"according":[73],"previous":[75],"responses.":[76],"Specifically,":[77],"structure":[82],"known":[83],"as":[84],"\u201cBloom":[86],"filter\u201d":[87],"prove":[89],"tight":[91],"connection":[92],"between":[93],"Bloom":[94,102,192,211],"filters":[95,193],"cryptography.":[100],"A":[101],"filter":[103,212],"represents":[104],"set":[106],"S":[107,132,144],"elements":[109],"approximately":[110],"by":[111],"fewer":[113],"bits":[114,238],"than":[115],"precise":[117],"representation.":[118],"The":[119],"price":[120],"for":[121,125,140,213],"succinctness":[122],"is":[123,222,246],"some":[126],"errors:":[127],"For":[128,183,202],"any":[129,141],"x":[130,142],"\u2208":[131],",":[133],"it":[134,145],"should":[135,146],"always":[136],"answer":[137,147],"Yes,":[138],"\u2209":[143],"Yes":[148],"only":[149,173,197,229],"with":[150],"small":[151],"probability.":[152],"both":[159],"adversaries":[161,170],"(that":[162],"run":[163],"polynomial":[165],"time)":[166],"computationally":[168,184],"unbounded":[169,203],"bounded":[174,185],"number":[177],"they":[180],"can":[181],"make.":[182],"adversaries,":[186,204],"show":[188,206],"non-trivial":[190],"(memory-wise)":[191],"exist":[194],"if":[195,198],"one-way":[199],"functions":[200],"exist.":[201],"there":[208],"exists":[209],"sets":[214],"size":[216],"n":[217,232,243],"error":[219],"\u03b5":[220],"secure":[223],"against":[224],"t":[225,236],"uses":[228],"O":[230],"(":[231],"log":[233,244],"1/\u03b5":[234,245],"+":[235],")":[237],"memory.":[240],"comparison,":[242],"best":[248],"possible":[249],"non-adaptive":[252],"adversary.":[253]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
