The Locality of Memory Checking

被引:3
|
作者
Wang, Weijie [1 ]
Lu, Yujie [1 ]
Papamanthou, Charalampos [1 ]
Zhang, Fan [1 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
基金
美国国家科学基金会;
关键词
Memory checking; foundations of cryptography;
D O I
10.1145/3576915.3623195
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Motivated by the extended deployment of authenticated data structures (e.g., Merkle Patricia Tries) for verifying massive amounts of data in blockchain systems, we begin a systematic study of the I/O efficiency of such systems. We first explore the fundamental limitations of memory checking, a previously-proposed abstraction for verifiable storage, in terms of its locality-a complexity measure that we introduce for the first time and is defined as the number of non-contiguous memory regions a checker must query to verifiably answer a read or a write query. Our central result is an Omega( log n/log log n) lower bound for the locality of any memory checker. Then we turn our attention to (dense and sparse) Merkle trees, one of the most celebrated memory checkers, and provide stronger lower bounds for their locality. For example, we show that any dense Merkle tree layout will have average locality at least 1/3 log n. Furthermore, if we allow node duplication, we show that if any write operation has at most polylog complexity, then the read locality cannot be less than log n/log log n. Our lower bounds help us construct two new locality-optimized authenticated data structures (DupTree and PrefixTree) which we implement and evaluate on random operations and real workloads, and which are shown to outperform traditional Merkle trees, especially as the number of leaves increases.
引用
收藏
页码:1820 / 1834
页数:15
相关论文
共 50 条
  • [1] Checking-in on the memory deficit and meta-memory deficit theories of compulsive checking
    Cuttler, Carrie
    Graf, Peter
    CANADIAN JOURNAL OF EXPERIMENTAL PSYCHOLOGY-REVUE CANADIENNE DE PSYCHOLOGIE EXPERIMENTALE, 2010, 64 (04): : 288 - 288
  • [2] Checking-in on the memory deficit and meta-memory deficit theories of compulsive checking
    Cuttler, Carrie
    Graf, Peter
    CLINICAL PSYCHOLOGY REVIEW, 2009, 29 (05) : 393 - 409
  • [3] Violation of locality and self-checking source: a brief account
    Mayers, D
    Tourenne, C
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 3, 2001, : 269 - 276
  • [4] Practical Memory Checking with Dr. Memory
    Bruening, Derek
    Zhao, Qin
    2011 9TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO), 2011, : 213 - 223
  • [5] The Complexity of Online Memory Checking
    Naor, Moni
    Rothblum, Guy N.
    JOURNAL OF THE ACM, 2009, 56 (01)
  • [6] Checking memory safety with blast
    Beyer, D
    Henzinger, TA
    Jhala, R
    Majumdar, R
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2005, 3442 : 2 - 18
  • [7] Quantum Online Memory Checking
    van Dam, Win
    Yuan, Qingqing
    THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY, 2009, 5905 : 10 - 19
  • [8] The complexity of online memory checking
    Naor, M
    Rothblum, GN
    46TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2005, : 573 - 582
  • [9] Memory Checking for Parallel RAMs
    Mathialagan, Surya
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT II, 2023, 14370 : 436 - 464
  • [10] IMPROVING THE CACHE LOCALITY OF MEMORY ALLOCATION
    GRUNWALD, D
    ZORN, B
    HENDERSON, R
    SIGPLAN NOTICES, 1993, 28 (06): : 177 - 186