Keyphrases
Adversary
14%
Auxiliary Input
9%
Barak
11%
Black Box
13%
Black-box Reductions
8%
Collision Resistance
10%
Collision-Resistant Hash Function
9%
Composable
6%
Crypto
7%
Cryptographic
9%
Cryptography
11%
Derandomization
10%
Functional Encryption
22%
General Circuits
6%
Grey-box
10%
Hash Function
7%
Indistinguishability Obfuscation
44%
Interactive Proofs
6%
Keyless
6%
Knowledge Argument
14%
Leakage-tolerant
6%
Learning with Errors Problem
11%
Non-black-box
7%
Non-black-box Simulation
7%
Non-interactive
18%
Non-interactive Witness-indistinguishable
6%
Non-malleable Commitments
6%
Obfuscation
39%
Obfuscator
15%
One-way Function
35%
Point Obfuscation
9%
Post-quantum
10%
Prover
14%
Public Key Encryption
14%
Random Phase Encoding
15%
Round Complexity
9%
Secret Key
6%
Sender
8%
Simulation Techniques
6%
Statistical Zero-knowledge
13%
Strong Simulation
6%
Subexponential
9%
Succinct Arguments
8%
Succinct Non-interactive Arguments
15%
Verifiable Random Function
6%
Verifier
17%
Virtual Black-box
10%
Zero-knowledge
32%
Zero-knowledge Arguments
15%
Zero-knowledge Protocols
11%
Computer Science
Arithmetic Circuit
6%
Basic Building Block
6%
Diffie-Hellman-Merkle key exchange
9%
Encryption Scheme
15%
Fully Homomorphic Encryption
17%
Function Evaluation
6%
Hash Function
30%
Hashing
9%
Homomorphic Encryption
6%
Instantiation
5%
Knowledge Proof
6%
Knowledge Protocol
24%
Learning with Errors
25%
Main Component
8%
Obfuscation
100%
Polynomial Time
5%
Proof System
8%
public key
6%
public-key encryption
20%
Random Function
9%
random oracle model
5%
secure multiparty computation
6%
Simulation Technique
8%
Soundness
19%
Time Complexity
8%