Keyphrases
Adversary
32%
Black Box
100%
Black-box Construction
15%
Compiler
23%
Crypto
12%
Cryptographic Primitives
21%
Cryptography
15%
Differentially Private
16%
Encryption
17%
EPR Pair
16%
Extractor
16%
Hardness Assumptions
21%
Hardness of Learning
14%
Indistinguishability Obfuscation
24%
Information Theory
12%
Learning with Errors Problem
42%
Malicious Adversary
20%
Min-entropy
12%
Multi-party Computation
23%
Multi-party Key Exchange
13%
Non-interactive
88%
Non-malleability
30%
Non-malleable Commitments
46%
Obfuscation
21%
Oblivious Transfer
60%
One-way Function
47%
Oracle
22%
Plain Model
24%
Polynomial Hardness
28%
Polynomial Time
15%
Post-quantum
18%
Private Protocol
16%
Prover
17%
Publicly Verifiable
26%
Quasi-polynomial
18%
Random Oracle
14%
Random Oracle Model
12%
Random Strings
20%
Round Complexity
40%
Secure Computation
69%
Secure multi-party Computation
39%
Simulation Techniques
14%
Simulation-based Security
14%
String Model
16%
Subexponential
74%
Tight
14%
Two-party
17%
Verifier
36%
Witness Indistinguishability
18%
Zero-knowledge
44%
Computer Science
bilinear map
21%
Boolean Function
16%
Broadcast Channel
8%
Ciphertext
8%
Classical Information
8%
Client Server
16%
Communication Complexity
12%
Computational Complexity
8%
Computational Power
12%
Cryptanalysis
8%
Cryptographic Primitive
64%
Cryptography
16%
Data Encryption
8%
Decoding Algorithm
8%
Differential Privacy
8%
Diffie-Hellman-Merkle key exchange
16%
Encryption Scheme
36%
Existing Protocol
8%
Fully Homomorphic Encryption
35%
Hash Function
30%
Key Generation
8%
Knowledge Protocol
12%
Learning with Errors
62%
Malicious Adversary
27%
Nondeterministic Computation
12%
Obfuscation
71%
Polynomial Time
35%
Power Consumption
8%
Proof System
8%
public key
16%
public-key encryption
18%
Quantum Channel
8%
Quantum Computing
8%
random oracle model
29%
Receiver Output
8%
Reference String
10%
Reverse Direction
8%
ring signature
8%
secure multiparty computation
91%
Secure Protocol
31%
Security Attack
17%
Security Parameter
8%
Simple Application
8%
Simulation Box
12%
Simulation Technique
20%
Simulation Time
8%
Single Message
12%
Software Implementation
8%
Soundness
10%
Verification Key
8%