Advanced Topics in
Cryptography
|
Instructor: Benny Pinkas, benny (at) pinkas.net, benny
(at) cs.haifa.ac.il.
Spring semester 2008.
Dept.
of Computer Science, University
of Haifa.
Description:
This course will cover recent topics
of interest in the research of cryptographic techniques.
The course will aim to cover the
following topics, although probably only a subset of them will be covered in
class:
- Oblivious transfer.
- Secure computation (Yao’s construction for the
two-party case).
- Encryption with chosen-ciphertext security (the
Cramer-Shoup construction).
- Homomorphic encryption (Paillier’s encryption system,
the Damgard-Jurik construction).
- Privacy preserving database operations:
- Private information retrieval (PIR).
- Computing intersections.
- Keyword search.
- Pairing based cryptography:
- Identity based encryption (IBE). (The
Boneh-Franklin construction, Cocks’ construction.)
- Signature schemes.
- Search on encrypted data.
- Broadcast encryption.
- Side channel attacks.
Prerequisites:
Introduction to cryptography.
Administrativia:
1.
Office Hours: Wednesday, 12-1pm.
Course
Plan:
Lecture
|
Date
|
Subject
|
Files
|
1 |
May 11, 2008 |
Oblivious Transfer. |
slides. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Homeworks:
Related Courses:
Pairing based cryptography
Last updated: May 10, 2008.