Keyphrases
Black Box
100%
Non-interactive
88%
Subexponential
74%
Secure Computation
69%
Oblivious Transfer
60%
One-way Function
47%
Non-malleable Commitments
46%
Zero-knowledge
44%
Learning with Errors Problem
42%
Round Complexity
40%
Secure multi-party Computation
39%
Verifier
36%
Adversary
32%
Non-malleability
30%
Polynomial Hardness
28%
Publicly Verifiable
26%
Indistinguishability Obfuscation
24%
Plain Model
24%
Compiler
23%
Multi-party Computation
23%
Oracle
22%
Cryptographic Primitives
21%
Obfuscation
21%
Hardness Assumptions
21%
Random Strings
20%
Malicious Adversary
20%
Witness Indistinguishability
18%
Quasi-polynomial
18%
Post-quantum
18%
Two-party
17%
Encryption
17%
Prover
17%
String Model
16%
Differentially Private
16%
Private Protocol
16%
Extractor
16%
EPR Pair
16%
Cryptography
15%
Polynomial Time
15%
Black-box Construction
15%
Simulation-based Security
14%
Random Oracle
14%
Tight
14%
Hardness of Learning
14%
Simulation Techniques
14%
Multi-party Key Exchange
13%
Min-entropy
12%
Crypto
12%
Random Oracle Model
12%
Information Theory
12%
Computer Science
secure multiparty computation
91%
Obfuscation
71%
Cryptographic Primitive
64%
Learning with Errors
62%
Encryption Scheme
36%
Fully Homomorphic Encryption
35%
Polynomial Time
35%
Secure Protocol
31%
Hash Function
30%
random oracle model
29%
Malicious Adversary
27%
bilinear map
21%
Simulation Technique
20%
public-key encryption
18%
Security Attack
17%
Client Server
16%
Boolean Function
16%
Diffie-Hellman-Merkle key exchange
16%
public key
16%
Cryptography
16%
Communication Complexity
12%
Computational Power
12%
Knowledge Protocol
12%
Nondeterministic Computation
12%
Single Message
12%
Simulation Box
12%
Soundness
10%
Reference String
10%
Key Generation
8%
Decoding Algorithm
8%
ring signature
8%
Computational Complexity
8%
Security Parameter
8%
Quantum Computing
8%
Receiver Output
8%
Simple Application
8%
Cryptanalysis
8%
Power Consumption
8%
Proof System
8%
Software Implementation
8%
Existing Protocol
8%
Differential Privacy
8%
Quantum Channel
8%
Ciphertext
8%
Classical Information
8%
Simulation Time
8%
Verification Key
8%
Reverse Direction
8%
Broadcast Channel
8%
Data Encryption
8%