Login / Signup
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy.
Daode Zhang
Jie Li
Bao Li
Xianhui Lu
Haiyang Xue
Dingding Jia
Yamin Liu
Published in:
Secur. Commun. Networks (2019)
Keyphrases
</>
hash functions
provably secure
encryption scheme
locality sensitive
identity based encryption
order preserving
similarity search
low cost
hamming distance
locality sensitive hashing
data mining
database
databases
data distribution
public key
binary codes