Homomorphic Authentication Based on Rank-Based Merkle Hash Tree.
Ping BaiWei ZhangXu An WangYudong LiuHaibin YangChun ShanPublished in: EIDWT (2018)
Keyphrases
- b tree
- tree structure
- privacy preserving
- hash table
- data structure
- biometric authentication
- user authentication
- tree structures
- hash functions
- security mechanisms
- neural network
- tree construction
- binary tree
- security analysis
- encryption scheme
- tree search
- data exchange
- face recognition
- authentication scheme
- data sets
- identity authentication