Secure computation of functionalities based on Hamming distance and its application to computing document similarity
From MaRDI portal
Publication:381129
DOI10.1504/IJACT.2013.053433zbMath1307.94086MaRDI QIDQ381129
Publication date: 15 November 2013
Published in: International Journal of Applied Cryptography (Search for Journal in Brave)
Hamming distancedocument similarityprotocol securityHDOToblivious transfer protocolssecure two-party computationSPIRsymmetric private information retrieval
Related Items (2)
Automata evaluation and text search protocols with simulation-based security ⋮ Two quantum protocols for secure Hamming distance computation
This page was built for publication: Secure computation of functionalities based on Hamming distance and its application to computing document similarity