Research on the Security Criteria of Hash Functions in the Blockchain.
Maoning WangMeijiao DuanJianming ZhuPublished in: BCC@AsiaCCS (2018)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- authentication protocol
- block cipher
- similarity search
- locality sensitive hashing
- locality sensitive
- hashing algorithm
- information security
- access control
- hamming distance
- hash table
- order preserving
- security issues
- pattern recognition
- security requirements
- hamming space
- binary codes
- security analysis
- secret key
- standard model
- nearest neighbor
- high dimensional
- high security
- data structure
- database systems
- neural network
- approximate similarity search
- data sets