Cryptology City
Search
Search
Dark mode
Light mode
Explorer
Cryptology City
Home
❯
Primitives
38 items under this folder.
A
B
C
D
F
H
I
K
M
N
O
P
S
T
Z
A
Attribute-based encryption
B
Broadcast encryption
C
Commitment scheme
D
Digital signature
Distributed Point Functions
Doubly-efficient PIR
F
Fingerprinting Code
Fuzzy identity-based encryption
H
Hash function
Hidden vector encryption
Hierarchical identity-based encryption
Homomorphic encryption
I
Identity-based encryption
Indistinguishability Obfuscation
Inner-product predicate encryption
K
Key encapsulation mechanism
Key exchange
M
Message authentication code
Multi-server Private Information Retrieval
Multi-server Symmetric private information retrieval
N
Non-interactive zero-knowledge
O
Oblivious RAM
Oblivious transfer
One-way permutations
P
Polynomial commitment scheme
Private Information Retrieval
Pseudorandom error-correcting code
Pseudorandom function
Pseudorandom generator
Pseudorandom permutation
Public key encryption
S
Secret sharing
Secure multi-party computation
Succinct argument
Symmetric key encryption
T
Trapdoor hash functions
Trapdoor permutation
Z
Zero-knowledge proof