Private Information Retrieval and Privacy-preserving Data Mining
Differential Privacy
Secure Multiparty Computation of Approximations
Efficiency of Secure Multiparty Protocols
Homomorphic Encryption
Foundational Results on Zero Knowledge
Foundational Results on Oblivious Transfer
Cryptography with Imperfect Randomness and Leakage-Resilient Cryptography
Other Notions of Security
- Adaptive Security:
- Game-theoretic Notions of Security:
- Universal Composability: