Login / Signup

Authenticated Hash Tables Based on Cryptographic Accumulators.

Charalampos PapamanthouRoberto TamassiaNikos Triandopoulos
Published in: Algorithmica (2016)
Keyphrases
  • hash tables
  • hash functions
  • hash table
  • locality sensitive hashing
  • similarity search
  • hashing methods
  • hamming distance
  • secret key
  • data distribution
  • nearest neighbor search
  • encryption scheme
  • smart card
  • binary codes