Trapdoor Hash Functions and Their Applications.
Nico DöttlingSanjam GargYuval IshaiGiulio MalavoltaTamer MourRafail OstrovskyPublished in: CRYPTO (3) (2019)
Keyphrases
- hash functions
- ciphertext
- similarity search
- hashing algorithm
- secret key
- locality sensitive
- encryption scheme
- approximate nearest neighbor search
- order preserving
- random projections
- hamming distance
- block cipher
- locality sensitive hashing
- data distribution
- hash table
- nearest neighbor search
- stream cipher
- hashing methods
- decision trees
- minimal perfect hash functions
- signature scheme
- metric space
- training samples
- management system
- data analysis
- data streams
- pattern recognition