Keyphrases
Secure Computation
67%
Automata
63%
Revocation
63%
Anonymity
56%
Multi-party Computation
51%
Secure multi-party Computation
51%
Dealers
50%
Input Stream
49%
Broadcast Encryption
48%
Information-theoretic Security
45%
Distributed Point Function
41%
Adversary
40%
Non-interactive
40%
Function Secret Sharing
39%
Private Information Retrieval
39%
Correlated Randomness
38%
Security Association
36%
Virtual Private Network
36%
Arbitrators
36%
Network Mechanism
36%
Attribute-based Broadcast Encryption
36%
Distributed Computation
36%
Sender
36%
Decrypt
35%
Oblivious Transfer
35%
Finite Automata
35%
Broadcasters
35%
Pseudorandom Correlation Generators
34%
Crypto
33%
Pseudorandomness
32%
Shared Key
31%
Efficient Scheme
31%
Zero-knowledge Proof
30%
Pseudorandom number Generator
29%
Secret Sharing
29%
Communication Complexity
29%
Bounded Storage Model
27%
Data Packet
27%
Information Security
27%
Non-perennial
27%
Number of Bits
27%
Rendezvous
27%
Dishonest Majority
25%
Computational Complexity
25%
Pseudorandom Functions
25%
Information Theory
25%
Concrete Efficiency
24%
Hash Function
24%
Public Key
23%
Multipath
22%
Computer Science
Secret Sharing
100%
Anonymity
72%
Automaton
63%
secure multiparty computation
62%
Function Point
53%
Input-Stream
49%
Ciphertext
46%
Encryption Scheme
42%
public key
42%
Information Retrieval
40%
Communication Complexity
37%
secret sharing scheme
37%
State Automaton
37%
Security Association
36%
Virtual Private Networks
36%
Distributed Computation
36%
Decryption
34%
Computational Complexity
32%
Boolean Circuit
31%
Knowledge Proof
30%
Computational Cost
29%
Hash Function
29%
Multipath
27%
Storage Model
27%
Random Sequence
27%
Information Security
27%
Random Permutation
27%
Attribute-Based Encryption
25%
Communication Cost
25%
Arithmetic Circuit
24%
Cryptographic Application
23%
Attackers
23%
Reputation System
21%
Security Parameter
21%
Secure Communication
21%
Input Symbol
20%
Hash Table
20%
Communication Overhead
19%
Authorized User
19%
Computing Device
18%
Database Session
18%
Turing Machine
18%
Authentication
18%
Security Requirements
18%
Wide Area Network
18%
Local Area Network
18%
Input/Output
18%
Firewall
18%
External Source
18%
Public Networks
18%