Using Hash Functions as a Hedge against Chosen Ciphertext Attack.
Victor ShoupPublished in: EUROCRYPT (2000)
Keyphrases
- chosen ciphertext
- encryption scheme
- hash functions
- standard model
- secret key
- security analysis
- similarity search
- ciphertext
- locality sensitive
- secret sharing scheme
- signature scheme
- locality sensitive hashing
- hamming distance
- diffie hellman
- block cipher
- data distribution
- nearest neighbor search
- public key
- security model
- database
- data sharing
- database management systems
- private key
- image data
- neural network
- databases
- data sets