The Case of Adversarial Inputs for Secure Similarity Approximation Protocols.
Evgenios M. KornaropoulosPetros EfstathopoulosPublished in: EuroS&P (2019)
Keyphrases
- similarity measure
- cryptographic protocols
- searching in metric spaces
- key exchange
- security protocols
- multi agent
- application level
- approximation algorithms
- semantic similarity
- approximation error
- authentication protocol
- structural similarity
- key distribution
- communication protocols
- key agreement protocol
- key establishment
- similarity function