Hash-Function based PRFs: AMAC and its Multi-User Security.
Mihir BellareDaniel J. BernsteinStefano TessaroPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- multi user
- hash functions
- stream cipher
- encryption scheme
- provably secure
- virtual environment
- virtual world
- augmented reality
- multi granularity
- block cipher
- user interface
- similarity search
- single user
- locality sensitive hashing
- access control
- information security
- multiple users
- hashing algorithm
- hamming distance
- secret key
- security requirements
- network security
- hash table
- nearest neighbor search
- statistical databases
- security analysis
- nearest neighbor
- standard model
- high security
- multiple access
- integer wavelet transform
- signature scheme
- database
- query processing
- high dimensional
- pattern recognition
- face recognition
- databases