Keyphrases
Adversary
13%
All-or-nothing
11%
Bit Commitment
13%
Bitstring
11%
Broadcast Channel
11%
Certificate Revocation Schemes
14%
Cheater
13%
Cheating
23%
Circuit Evaluation
12%
Commitment Scheme
16%
Cryptographic Assumptions
11%
Cryptographic Primitives
11%
Cryptographic Protocols
15%
Cryptography
13%
Information Theory
35%
Information-theoretic Security
17%
Interactive Hashing
25%
Interactive Protocol
13%
Mobile Ad Hoc Network (MANET)
14%
Multi-party Computation
15%
Multi-party Protocol
14%
Noisy Channel
14%
Oblivious Transfer
100%
Partial Information
13%
Perfect Zero-knowledge
34%
Podolsky
11%
Privacy Amplification
33%
Prover
46%
Quantum Bit Commitment
14%
Quantum Cryptography
22%
Quantum Message
11%
Quantum Oblivious Transfer
17%
Quantum Secret Sharing
12%
Quantum State
22%
Rabin
13%
Round numbers
17%
Secrecy Capacity
17%
Secret Key
12%
Secret Sharing Scheme
11%
Secure Function Evaluation
25%
Secure multiparty Quantum Computation
17%
Secure Protocol
14%
Security Definitions
12%
Sender
15%
Special Circumstances
12%
Two-party
27%
Unconditionally Secure
33%
Verifier
32%
Zero-knowledge
24%
Zero-knowledge Protocols
21%
Computer Science
Authentication
15%
Backdoors
7%
Binary Symmetric Channel
7%
Boolean Circuit
7%
Broadcast Channel
22%
Building-Blocks
7%
Circuit Evaluation
22%
Coding Theory
7%
Computing Power
19%
Cryptographic Device
7%
Cryptographic Primitive
20%
Cryptographic Protocol
24%
Error Correcting Code
7%
Error-correcting code
9%
Function Evaluation
21%
Hashing
29%
information theoretic security
9%
Interactive
69%
Key Generation
7%
Knowledge Proof
14%
Knowledge Protocol
34%
Learning with Errors
7%
Letter Characterization
7%
mobile ad-hoc network
14%
Polynomial Time
14%
Proof
37%
Proof System
9%
Public-Key Cryptography
14%
Public-Key Cryptosystems
7%
Quantum Computing
17%
Quantum Cryptography
24%
Quantum Measurement
7%
Quantum Message
7%
Qubit
20%
Random Number
7%
Random Permutation
7%
Random Variable
7%
Revocation Certificate
14%
Secrecy Capacity
22%
Secret Information
7%
Secret Sharing
16%
secret sharing scheme
14%
Secure Protocol
14%
Security Parameter
8%
Single Iteration
7%
Spatial Separation
7%
Theoretic Tool
7%
Winning Probability
7%
Winning Strategy
7%
wiretap channel
14%