Cryptology City

Cryptology City
Home

❯

Primitives

38 items under this folder.

ABCDFHIKMNOPSTZ

A

  • Attribute-based encryption

    B

    • Broadcast encryption

      C

      • Commitment scheme

        D

        • Digital signature

          • Distributed Point Functions

            • Doubly-efficient PIR

              F

              • Fingerprinting Code

                • Fuzzy identity-based encryption

                  H

                  • Hash function

                    • Hidden vector encryption

                      • Hierarchical identity-based encryption

                        • Homomorphic encryption

                          I

                          • Identity-based encryption

                            • Indistinguishability Obfuscation

                              • Inner-product predicate encryption

                                K

                                • Key encapsulation mechanism

                                  • Key exchange

                                    M

                                    • Message authentication code

                                      • Multi-server Private Information Retrieval

                                        • Multi-server Symmetric private information retrieval

                                          N

                                          • Non-interactive zero-knowledge

                                            O

                                            • Oblivious RAM

                                              • Oblivious transfer

                                                • One-way permutations

                                                  P

                                                  • Polynomial commitment scheme

                                                    • Private Information Retrieval

                                                      • Pseudorandom error-correcting code

                                                        • Pseudorandom function

                                                          • Pseudorandom generator

                                                            • Pseudorandom permutation

                                                              • Public key encryption

                                                                S

                                                                • Secret sharing

                                                                  • Secure multi-party computation

                                                                    • Succinct argument

                                                                      • Symmetric key encryption

                                                                        T

                                                                        • Trapdoor hash functions

                                                                          • Trapdoor permutation

                                                                            Z

                                                                            • Zero-knowledge proof


                                                                              Created with Quartz v4.5.2 © 2026

                                                                              • GitHub
                                                                              • Bluesky