Computer Science
Ciphertext
100%
identity based encryption
87%
Encryption Scheme
84%
Signature Scheme
63%
Instantiation
60%
Authenticated Key Exchange
50%
Secure Communication
33%
ring signature
25%
Diffie-Hellman-Merkle key exchange
25%
Hash Function
25%
Verification Key
25%
Bloom Filter
25%
Digital Signature
25%
Proof Technique
19%
Public Key Encryption
18%
Security Parameter
16%
Authentication
16%
Security protocols
16%
Key Exchange Protocol
16%
Quantum Cryptography
16%
random oracle model
16%
Computational Problem
12%
Integer Solution
12%
Proof System
8%
Academic Community
8%
Round-Trip Time
8%
Internet Today
8%
Communication Latency
8%
Communication Protocol
8%
Computational Efficiency
8%
Transport Layer Security
8%
Digital Network
8%
Confidential Information
8%
Public Networks
8%
Password
8%
Decryption
6%
Grained Control
5%