Keyphrases
Fully Homomorphic Encryption
95%
Privacy-preserving
84%
Homomorphic Encryption
84%
Encrypted Data
58%
One-way Function
50%
Epigenetic Pacemaker
47%
Topology Hiding
47%
Ciphertext
47%
Secret Key
46%
Arithmetic Progressions
42%
Fourier Coefficients
33%
Homomorphic Encryption Scheme
31%
Hard-Core Predicates
31%
List Decoding
31%
Codeword
31%
Tree Training
31%
Decision Tree
31%
Secure Search
31%
User-generated Content
31%
Search on Encrypted Data
31%
Fourier Approximation
31%
CCA2
31%
Encryption
30%
Cryptography
26%
Two-server Model
24%
Bohr Sets
23%
Encryption Scheme
21%
Medical Records
21%
Data Security
20%
Local Demand
19%
World Wide Web
19%
Object Placement
19%
Traffic Pattern
19%
Content Provider
19%
Oracle
19%
Deterministic Algorithm
19%
Communication Complexity
19%
Learning Algorithm
18%
Hardcore
15%
Combinatorial Chemistry
15%
Efficiency Improvement
15%
Small Sets
15%
One-bit
15%
Reaction Vessel
15%
Atomic Swap
15%
Error Reduction Algorithm
15%
Multiple Routes
15%
Cross-chain
15%
Pseudorandom Functions
15%
Cache Replacement
15%
Computer Science
Fully Homomorphic Encryption
100%
Homomorphic Encryption
98%
Privacy Preserving
84%
Encrypted Data
82%
Encryption Scheme
73%
Ciphertext
47%
Fourier Coefficient
36%
Distributed Computation
36%
Reveal Information
36%
Communication Graph
36%
Learning Algorithm
31%
homomorphic-encryption
31%
Decision Tree
31%
Information Retrieval
31%
identity based encryption
31%
User-Generated Content
31%
Medical Record
31%
Random Walk
31%
Communication Complexity
27%
Data Security
26%
Decryption
24%
Machine Learning
23%
Learning System
23%
Error Correcting Code
21%
Multiple Design
21%
Advanced Encryption Standard
21%
Polynomial Time
21%
Object Placement
19%
Traffic Pattern
19%
Content Provider
19%
public-key encryption
15%
Proof Technique
15%
Time Computable Function
15%
Blockchain
15%
Personal Record
15%
Fairness Constraint
15%
Most Significant Bit
15%
Cryptographic Algorithm
15%
side-channel
15%
Cryptographic Technique
15%
public key
15%
Influencing Factor
15%
Data Protection
15%
Data Retrieval
15%
Postprocessing
15%
Data in Use
13%
Storage Overhead
10%
Public Key Encryption
10%
public-key encryption scheme
10%
Regression Task
10%