Login / Signup
Tightly-Secure Signatures from Chameleon Hash Functions.
Olivier Blazy
Saqib A. Kakvi
Eike Kiltz
Jiaxin Pan
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
hash functions
stream cipher
signature scheme
provably secure
block cipher
digital signature
encryption scheme
binary codes
authentication protocol
standard model
similarity search
order preserving
locality sensitive
hashing algorithm
private key
secret key
locality sensitive hashing
hamming distance
key management
nearest neighbor search
hash table
minimal perfect hash functions
databases
security mechanisms
data distribution
public key
support vector
decision trees
hamming space
security protocols
security analysis
hashing methods
lightweight
management system
pattern recognition
machine learning
data mining