Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications.
Xiangyu LiuShengli LiuDawu GuPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- multi user
- hash functions
- stream cipher
- block cipher
- authentication protocol
- encryption scheme
- virtual world
- virtual environment
- similarity search
- order preserving
- user interface
- multi granularity
- augmented reality
- locality sensitive
- hashing algorithm
- multiple users
- single user
- hamming distance
- data distribution
- locality sensitive hashing
- minimal perfect hash functions
- approximate similarity search
- standard model
- hamming space
- binary codes
- secret key
- data sets
- key management
- nearest neighbor search
- security requirements
- collaborative writing
- multiple access
- virtual reality
- human computer interaction
- multi dimensional
- nearest neighbor
- face recognition
- database