Does Fiat-Shamir Require a Cryptographic Hash Function?
Yilei ChenAlex LombardiFermi MaWilly QuachPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- hash functions
- secret key
- similarity search
- hashing algorithm
- chaotic map
- encryption scheme
- secret sharing scheme
- hash table
- data distribution
- locality sensitive hashing
- provably secure
- hamming distance
- nearest neighbor search
- binary codes
- integer wavelet transform
- stream cipher
- data sets
- database
- hash tables
- secret sharing
- neural network
- block cipher
- edit distance
- pattern recognition
- smart card