Tightly-Secure Signatures from Chameleon Hash Functions.
Olivier BlazySaqib A. KakviEike KiltzJiaxin PanPublished in: Public Key Cryptography (2015)
Keyphrases
- hash functions
- stream cipher
- signature scheme
- provably secure
- block cipher
- authentication protocol
- digital signature
- encryption scheme
- binary codes
- similarity search
- standard model
- locality sensitive
- hashing algorithm
- order preserving
- secret key
- private key
- locality sensitive hashing
- hash table
- hamming distance
- minimal perfect hash functions
- nearest neighbor search
- similarity measure
- security analysis
- security mechanisms
- public key
- data distribution
- hamming space
- multi dimensional
- high dimensional
- database