(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy.
Yanyan LiuDaode ZhangYi DengBao LiPublished in: Cybersecur. (2019)
Keyphrases
- hash functions
- encryption scheme
- identity based encryption
- provably secure
- secret key
- ciphertext
- standard model
- security analysis
- similarity search
- signature scheme
- order preserving
- key management
- diffie hellman
- locality sensitive
- stream cipher
- cca secure
- block cipher
- locality sensitive hashing
- low cost
- security model
- hashing algorithm
- neural network
- private key
- public key
- hamming distance
- signcryption scheme
- data distribution
- pattern recognition
- face recognition