Login / Signup
Deniable Ring Authentication Based on Projective Hash Functions.
Shengke Zeng
Yi Mu
Guomin Yang
Mingxing He
Published in:
ProvSec (2017)
Keyphrases
</>
authentication protocol
hash functions
similarity search
secret key
locality sensitive
order preserving
locality sensitive hashing
hamming distance
hashing algorithm
data distribution
hamming space
nearest neighbor search
data sets
encryption scheme
block cipher
lightweight
image retrieval