Advanced Topics in Cryptography


 

Instructor: Benny Pinkas, benny (at) pinkas.net, benny (at) cs.haifa.ac.il.

 

Spring semester 2006.

Dept. of Computer Science, University of Haifa.

 

Description:

This course will cover recent topics of interest in the research of cryptographic techniques.

The course will aim to cover the following topics, although probably only a subset of them will be covered in class:

  1. Oblivious transfer.
  2. Secure computation (Yao’s construction for the two-party case).
  3. Encryption with chosen-ciphertext security (the Cramer-Shoup construction).
  4. Homomorphic encryption (Paillier’s encryption system, the Damgard-Jurik construction).
  5. Privacy preserving database operations:
    1. Private information retrieval (PIR).
    2. Computing intersections.
    3. Keyword search.
  6. Pairing based cryptography:
    1. Identity based encryption (IBE).  (The Boneh-Franklin construction, Cocks’ construction.)
    2. Signature schemes.
  7. Search on encrypted data.
  8. Broadcast encryption.
  9. Side channel attacks.

 

Prerequisites:

Introduction to cryptography.

 

Administrativia:

1.      Office Hours: Wednesday, 12-1pm.

 

Course Plan:

 

Lecture

Date

Subject

Files

1 March 5, 2006 Oblivious Transfer.  slides, printer friendly slides.
2 March 12, 2006 Oblivious Transfer, Yao's secure computation protocol. slides, printer friendly slides.
3 March 19, 2006

Secure computation when a circuit is too large, Multi-party secure computation

slides, printer friendly slides.

4

March 26, 2006

Private Information Retrieval (PIR), keyword search

slides, printer friendly slides.

5

April 2, 2006

Paillier's cryptosystem

slides, printer friendly slides.

6 April 23, 2006 Semantic security. slides, printer friendly slides.
7 April 30, 2006. El Gamal encryption, chosen ciphertext security, the Cramer-Shoup cryptosystem. slides, printer friendly slides.
8 May 7, 2006. The Cramer-Shoup cryptosystem. Bleichenbacher's attack on PKCS #1. slides, printer friendly slides.
9 May 14, 2006. Identity based encryption. Cocks' scheme. slides, printer friendly slides.
10 May 21, 2006. Bilinear mappings and their applications. slides, printer friendly slides.
11 June 4, 2006. Chosen ciphertext security from IBE. slides, printer friendly slides.
12 June 11, 2006. Search on encrypted data. slides, printer friendly slides.
13 June 18, 2006. Search on encrypted data and on streaming data. slides, printer friendly slides.
       
       
       
       
       
       

 

Homeworks:

 

Related Courses:

Last updated: June 19, 2006.