Tightly-Secure Signatures from Chameleon Hash Functions.
Olivier BlazySaqib A. KakviEike KiltzJiaxin PanPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- hash functions
- stream cipher
- signature scheme
- provably secure
- block cipher
- digital signature
- encryption scheme
- binary codes
- authentication protocol
- standard model
- similarity search
- order preserving
- locality sensitive
- hashing algorithm
- private key
- secret key
- locality sensitive hashing
- hamming distance
- key management
- nearest neighbor search
- hash table
- minimal perfect hash functions
- databases
- security mechanisms
- data distribution
- public key
- support vector
- decision trees
- hamming space
- security protocols
- security analysis
- hashing methods
- lightweight
- management system
- pattern recognition
- machine learning
- data mining