Secure multi-party computation
Access structure
Secret sharing
Entailment
Public-key cryptography
Monotone
Sheaf
Cryptography
Cryptographic protocols
Oblivious transfer