Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys.
Dario CatalanoDario FioreLuca NizzardoPublished in: CRYPTO (2) (2015)
Keyphrases
- hash functions
- privacy preserving
- encryption scheme
- signature scheme
- binary codes
- similarity search
- public private
- locality sensitive hashing
- locality sensitive
- order preserving
- data distribution
- hamming distance
- minimal perfect hash functions
- hashing algorithm
- secret key
- hash table
- block cipher
- stream cipher
- hashing methods
- nearest neighbor search
- public key
- standard model
- training data
- public organizations
- data exchange
- brute force