Keyphrases
Functional Encryption
64%
Encryption Scheme
57%
Private Key
49%
One-way Function
45%
Adversary
41%
Public Key
39%
Tight
38%
Plaintext
38%
Deterministic Encryption
37%
Trapdoor Functions
34%
Log-log
33%
Public-key Encryption Schemes
32%
Lossy Trapdoor Functions
30%
Indistinguishability Obfuscation
29%
Black Box
28%
Cryptographic
24%
Discrete Logarithm Problem
24%
Ciphertext
23%
Searchable Symmetric Encryption
23%
Oracle
22%
Injective
21%
Public Key Encryption
21%
Cryptography
20%
Resilient
20%
Indistinguishability
19%
Non-black-box
19%
Black-box Construction
19%
Decryption Key
19%
Secret Key
18%
Communication Complexity
17%
Computer Science
Encryption Scheme
100%
public-key encryption
85%
public key
70%
Obfuscation
53%
Instantiation
38%
Building-Blocks
30%
Symmetric Encryption
28%
Decryption
28%
Ciphertext
27%
Cryptographic Primitive
27%
Discrete Logarithm
24%
Communication Complexity
24%
identity based encryption
24%
Hostile Environment
23%
Proof System
23%
Attackers
21%
Authentication Protocol
21%
Space Overhead
19%
Searchable Symmetric Encryption Scheme
19%
Signature Scheme
19%
Authentication
17%
Cuckoo Hashing
17%
Diffie-Hellman-Merkle key exchange
17%
Hash Function
16%
Encrypted Data
16%
random oracle model
15%
Proof Technique
15%
Encoding Scheme
14%
Fundamental Problem
14%
Knowledge Proof
14%