Computer Science
Malicious Adversary
100%
Private Set Intersection
55%
Secure Protocol
43%
Privacy Preserving
38%
secure multiparty computation
32%
Advanced Encryption Standard
25%
Secret Sharing
23%
Knowledge Proof
22%
random oracle model
22%
Information Retrieval
22%
privacy preserving data mining
19%
Decryption
19%
Intersection Set
16%
Security Parameter
14%
secret sharing scheme
14%
Function Evaluation
14%
Physical Protocol
14%
Computation Cost
14%
Communication Cost
14%
Data Mining Algorithm
14%
Proof System
14%
Sensitive Informations
14%
Cuckoo Hashing
13%
Hashing
13%
Key Generation
13%
Cryptographic Protocol
12%
public key
12%
Graphics Processing Unit
12%
Cryptographic Technique
11%
Machine Learning
11%
Learning System
11%
Privacy Concern
11%
Instantiation
10%
public-key encryption
9%
Encrypted Data
9%
information theoretic security
9%
Key Management
9%
deduplication
9%
e-Mail
9%
Message Update
9%
Encryption Scheme
9%
Communication Complexity
8%
Computer Hardware
8%
Trust Infrastructure
8%
Authenticated Key Exchange
7%
Database Server
7%
Homomorphic Encryption
7%
Decision Tree
7%
Cryptanalysis
7%
Window Operating System
6%
Keyphrases
Malicious Adversary
55%
Secure Two-party Computation
42%
Private Set Intersection
38%
Oblivious Transfer
38%
Two-party
33%
Efficient Protocol
33%
Cut-and-choose
26%
Secure Computation
26%
Secure multi-party Computation
18%
Constant Rounds
18%
Private Information Retrieval
17%
Random Oracle Model
17%
Secure Protocol
16%
Cryptographic
15%
Oblivious Transfer Protocol
15%
Security Parameters
15%
Privacy-preserving
14%
Sudoku Puzzle
14%
Physical Zero-knowledge Proof
14%
Compiler
14%
Sender
13%
Round numbers
13%
Black-box Reductions
13%
Statistical Security
13%
Two-party Computation
13%
Yao's Protocol
13%
Semi-honest Adversary
12%
Trusted Third Party
12%
Semi-honest
11%
Distributed Key Generation
11%
Communication Cost
11%
Computation Cost
11%
Number of Parties
11%
Hashing
10%
Secret Sharing
10%
Circuit-based
10%
Zero-knowledge Proof Systems
9%
Epidemiological Simulation
9%
Certified Electronic Mail
9%
GPU Acceleration
9%
Large-scale Application
9%
Data Mining Techniques
9%
Multicast Security
9%
Replicated Secret Sharing
9%
Constant Complexity
9%
Privacy Preserving Data Mining
9%
Generic Protocol
9%
Prover
9%
Verifier
9%
Cut-and-choose Oblivious Transfer
9%