• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Efficient proxy signatures based on trapdoor hash functions.

Santosh ChandrasekharSaikat ChakrabartiMukesh SinghalKenneth L. Calvert
Published in: IET Inf. Secur. (2010)
Keyphrases
  • hash functions
  • hashing algorithm
  • computationally expensive
  • databases
  • lightweight
  • binary codes
  • machine learning
  • similarity search
  • order preserving
  • provably secure
  • locality sensitive
  • approximate similarity search