Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications.
Xiangyu LiuShengli LiuDawu GuPublished in: ACISP (2020)
Keyphrases
- multi user
- hash functions
- stream cipher
- block cipher
- authentication protocol
- encryption scheme
- virtual environment
- virtual world
- augmented reality
- similarity search
- user interface
- multiple users
- secret key
- locality sensitive hashing
- single user
- locality sensitive
- hashing algorithm
- multi granularity
- hamming distance
- nearest neighbor search
- security analysis
- data distribution
- order preserving
- standard model
- signature scheme
- databases
- hashing methods
- virtual reality
- collaborative writing
- lightweight
- training set
- similarity measure
- neural network