Keyphrases
Adversary
15%
Auxiliary Input
10%
Barak
11%
Black Box
14%
Black-box Reductions
9%
Collision Resistance
11%
Collision-Resistant Hash Function
10%
Composable
6%
Crypto
7%
Cryptographic
9%
Cryptography
11%
Derandomization
11%
Functional Encryption
23%
General Circuits
7%
Grey-box
10%
Hash Function
7%
Indistinguishability Obfuscation
47%
Interactive Proofs
6%
Keyless
6%
Knowledge Argument
15%
Leakage-tolerant
6%
Learning with Errors Problem
12%
Non-black-box
7%
Non-black-box Simulation
8%
Non-interactive
17%
Non-interactive Witness-indistinguishable
6%
Non-malleable Commitments
6%
Obfuscation
41%
Obfuscator
16%
One-way Function
34%
Point Obfuscation
9%
Post-quantum
11%
Prover
15%
Public Key Encryption
12%
Random Phase Encoding
9%
Round Complexity
9%
Secret Key
6%
Sender
8%
Simulation Techniques
6%
Statistical Zero-knowledge
14%
Strong Simulation
6%
Subexponential
9%
Succinct Arguments
8%
Succinct Non-interactive Arguments
16%
Verifiable Random Function
6%
Verifier
17%
Virtual Black-box
11%
Zero-knowledge
30%
Zero-knowledge Arguments
16%
Zero-knowledge Protocols
12%
Computer Science
Arithmetic Circuit
6%
Basic Building Block
6%
Complexity Class
5%
Encryption Scheme
13%
Fully Homomorphic Encryption
17%
Hash Function
32%
Hashing
9%
Homomorphic Encryption
6%
Instantiation
5%
Knowledge Proof
7%
Knowledge Protocol
25%
Learning with Errors
24%
Main Component
9%
Obfuscation
100%
Polynomial Time
5%
Proof System
8%
public key
6%
public-key encryption
19%
Random Function
9%
random oracle model
5%
secure multiparty computation
6%
Simulation Technique
9%
Soundness
20%
Time Complexity
8%