Keyphrases
Encryption
83%
Rate 1
56%
Trapdoor Functions
52%
Encryption Scheme
48%
Secure Encryption
44%
Public Key
40%
Sender
39%
Key-dependent Message
36%
Circular Security
35%
Oblivious Transfer
35%
Cryptography
34%
Public Key Encryption
33%
Secret Sharing Scheme
33%
Computational Diffie-Hellman Assumption
32%
Black Box
25%
Private Key Generator
23%
One-way Function
22%
Computational Diffie-Hellman
21%
Trapdoor
20%
Linear Function
19%
Identity-based
19%
Cryptographic Primitives
19%
Private Information Retrieval
17%
Identity-based Encryption
16%
Set-membership
16%
Master Key
16%
Application Rate
16%
Identity Construction
16%
Compact Ring
16%
Ring Signature
16%
Semantic Security
16%
IND-CCA2 Security
16%
Asymmetric Encryption
16%
Symbolic Security
16%
Security Notions
16%
Circuit Satisfiability
16%
Encryption Applications
16%
Branching Programs
16%
Inner Product Encryption
16%
Access Structure
16%
Communication Cost
16%
Number of Groups
15%
Lossy Trapdoor Functions
13%
Key-dependent Message Security
13%
Crypto
13%
Arbitrary Functions
13%
Adversary
13%
Linear Combination
13%
Secret Key
12%
One-time Signature
12%
Computer Science
Encryption Scheme
100%
Diffie-Hellman-Merkle key exchange
93%
public key
81%
public-key encryption
68%
Cryptographic Primitive
41%
Linear Function
33%
secret sharing scheme
33%
identity based encryption
32%
Learning with Errors
27%
Reproducibility
24%
Fully Homomorphic Encryption
24%
Soundness
24%
Linear Combination
22%
Private Set Intersection
20%
Decryption
16%
group key agreement
16%
Key Generation
16%
ring signature
16%
Asymmetric Encryption
16%
Communication Cost
16%
Encrypted Data
16%
Arithmetic Circuit
16%
Symmetric Key Encryption
16%
Hash Function
16%
bilinear map
15%
Cryptographic Technique
14%
Building-Blocks
13%
Auxiliary Information
12%
Obfuscation
12%
Communication Overhead
11%
Database Entry
11%
Ciphertext
10%
Group Operation
8%
Notification Service
8%
chosen ciphertext attack
8%
Security Parameter
8%
Security Criterion
8%
Security Standard
8%
Compression Technique
8%
secret message
5%
secure multiparty computation
5%
Protocol Extension
5%
Public Key Encryption
5%
Weak Entity
5%
Learning Problem
5%
Secret Key Encryption
5%