Computer Science
Secure Protocol
100%
Communication Complexity
58%
secure multiparty computation
57%
Security Parameter
51%
Secret Sharing
47%
Reference String
44%
Cryptographic Protocol
43%
random oracle model
41%
Blockchain
38%
Signature Scheme
37%
Function Evaluation
34%
secret sharing scheme
32%
Instantiation
32%
Cryptographic Primitive
29%
public key
25%
Preprocessing Phase
24%
Boolean Circuit
24%
Malicious Adversary
23%
Cryptography
23%
Registration Authority
22%
Preprocessing
22%
Homomorphic Encryption
19%
public-key encryption
19%
Digital Signature Standard
19%
Protocol Execution
19%
Firewall
19%
Cryptocurrency
19%
Hardware Token
19%
Decoding Error
19%
Linear Function
19%
Paillier Cryptosystem
19%
Boolean Function
19%
Hash Function
19%
Knowledge Protocol
18%
Building-Blocks
16%
Single Message
14%
Digital Signature Scheme
13%
Cardinality
13%
Parameter Value
13%
Internal State
11%
O-Notation
11%
Computation
9%
Contexts
9%
Liveness
9%
Fully Homomorphic Encryption
9%
Input Distribution
9%
retrieval model
9%
Proactive Security
9%
Security Standard
9%
Practical Implication
9%
Keyphrases
Random Oracle
9%
Verifiable Computation
9%
Valiant
9%
Verifiable Delay Function
9%
Commitment Scheme
9%
Composable
9%
Random Beacon
9%
Homomorphic
9%
Universal Composability
9%
Universally Composable
9%
Time-lock Puzzles
9%
Linear Error Correcting Codes
6%
Homomorphic Commitments
6%