Secure multi-party computation
Secure two-party computation
Cheque
Digital signature
Standard model
Random oracle
Cryptography
Cryptographic protocols
Public-key cryptography