We survey the computational foundations for public-key cryptography. We discuss the computational assumptions that have been used as bases for public-key encryption schemes, and the types of evidence we have for the veracity of these assumptions.
This is a survey that appeared in a book of surveys in honor of Oded Goldreich's 60th birthday.