Keyphrases
Argument Schemes
10%
Arithmetic Circuits
15%
Authenticated Data Structures
10%
Blockchain
22%
Commitment Scheme
11%
Computation Time
12%
Cross-Chain Bridge
10%
Data Owner
24%
Decision Tree
10%
Distributed Algorithms
10%
Distributed Load Balancing
10%
Expressiveness
12%
File-injection Attack
10%
Graph Signal Processing
20%
Interactive Oracle Proofs
13%
Interactive Proofs
18%
Libra
10%
Machine Learning
12%
Many-to-many
10%
Merkle Tree
12%
Multi-pattern Matching
10%
Multiple Servers
10%
Order of Magnitude
19%
Outsourced Database
20%
Polynomial Commitment
28%
Proactive Secret Sharing
10%
Probabilistic Routing
10%
Proof of Contribution
10%
Protocol Sequences
10%
Prover
100%
Routing Strategy
10%
Searchable Encryption
10%
Searchable Encryption Scheme
10%
Server System
10%
Shift-invariant
10%
Snark
15%
SQL Query
25%
Succinct Proofs
29%
TCP Congestion Control
10%
TCP Performance
10%
Trainer
10%
Untrusted Server
15%
Vector Commitment
10%
Verifiable Computation
30%
Verification Time
29%
Verifier
26%
Zero Trust
12%
Zero-knowledge
43%
Zero-knowledge Arguments
17%
Zero-knowledge Proof
66%
Computer Science
Arithmetic Circuit
25%
Blockchain
32%
Blog
10%
Building-Blocks
13%
Communication Complexity
8%
Computation Time
20%
Congestion Control
10%
Control Mechanism
5%
Convolutional Neural Network
20%
Cryptocurrency
15%
Cryptographic Operation
10%
Cryptographic Primitive
20%
Data Structure
10%
Database Systems
12%
Decision Trees
10%
Distributed Algorithm
6%
Elliptic Curve
10%
Emerging Application
10%
Ethereum
10%
Graph Computation
10%
Hash Function
33%
Knowledge Proof
72%
Load Balancing
10%
Logistic Regression
10%
Longest Path
10%
Machine Learning
27%
Multiple Server
10%
Multiplicative Factor
5%
Neural Network Training
10%
Nondeterministic Computation
6%
Pattern Matching
10%
Performance Improvement
15%
Performance Issue
5%
Preprocessing Phase
10%
Privacy Preserving
13%
Privacy Preserving Machine Learning
10%
Private Set Intersection
10%
Proof System
12%
public key
12%
Public Verifiability
10%
Public-Key Cryptography
10%
Routing Strategy
6%
Searchable Encryption Scheme
10%
Secret Sharing
25%
Smart Contract
6%
Static Program Analysis
10%
Storage Server
10%
Structured Query Language
31%
Subgraphs
10%
Wireless Networks
8%