ID-based encryption
Forcing
Semantic security
Diffie–Hellman problem
Cryptography
Boneh/Franklin scheme
Advantage