Property-preserving hash functions for hamming distance from standard assumptions

N Fleischhacker, KG Larsen, M Simkin - … on the Theory and Applications of …, 2022 - Springer
Property-preserving hash functions allow for compressing long inputs x 0 and x 1 into short
hashes h (x 0) and h (x 1) in a manner that allows for computing a predicate P (x 0, x 1) …

Nearly optimal property preserving hashing

J Holmgren, M Liu, LK Tyner, D Wichs - Annual International Cryptology …, 2022 - Springer
Property-preserving hashing (PPH) consists of a family of compressing hash functions h
such that, for any two inputs x, y, we can correctly identify whether some property P (x, y) …

Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocols

SP Cohen, M Naor - Annual International Cryptology Conference, 2022 - Springer
We study communication complexity in computational settings where bad inputs may exist,
but they should be hard to find for any computationally bounded adversary. We define a …

Biometric-based two-factor authentication scheme under database leakage

M Jiang, S Liu, S Han, D Gu - Theoretical Computer Science, 2024 - Elsevier
Abstract A Two-Factor Authentication (2FA) scheme can authenticate a client if the client is
able to provide the possession factor (like biometric feature, smart card) and the knowledge …

Property-Preserving Hash Functions and Combinatorial Group Testing

K Minematsu - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Property-preserving hash (PPH) function is a class of hash functions that allows an
evaluation of the property of inputs from their hash values. Boyle et al. at ITCS 2019 recently …

Robust Property-Preserving Hash Meets Homomorphism

K Liu, X Li, T Takagi - International Conference on Information Security, 2023 - Springer
Boyle et al. introduced the Property-Preserving Hash (PPH) concept in 2019, spawning a
series of subsequent research endeavors over the following two years. A PPH function …

On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash

M Liang, SG Choi, D Dachman-Soled, L Liu… - IACR Communications …, 2025 - cic.iacr.org
The min-hash sketch is a well-known technique for low-communication approximation of the
Jaccard index between two input sets. Moreover, there is a folklore belief that min-hash …

On the Leakage of Fuzzy Matchers

A Durbet, K Thiry-Atighehchi… - Available at SSRN …, 2023 - papers.ssrn.com
In a biometric authentication and identification system, the matcher needs to compare an old
and a fresh template to decide if it is a match or not. Beyond the binary output (yes' orno') …