The concepts of efficient computation and partially efficient computation are introduced and used to define two criterias of security for public key cryptosystem. The relation of these criteria to others is discussed. Finally we proved that any determinis