Advanced Topics in Cryptography


 

Instructor: Benny Pinkas, benny (at) pinkas.net, benny (at) cs.haifa.ac.il.

 

Spring semester 2010.

Dept. of Computer Science, University of Haifa.

 

Description:

This course will cover advanced topics in cryptographic research.

The course will aim to cover the following topics, although probably only a subset of them will be covered in class:

  1. Oblivious transfer.
  2. Secure computation (Yao’s construction for the two-party case).
  3. Encryption with chosen-ciphertext security (the Cramer-Shoup construction).
  4. Homomorphic encryption (Paillier’s encryption system, the Damgard-Jurik construction).
  5. Privacy preserving database operations:
    1. Private information retrieval (PIR).
    2. Computing intersections.
    3. Keyword search.
  6. Pairing based cryptography:
    1. Identity based encryption (IBE).  (The Boneh-Franklin construction, Cocks’ construction.)
    2. Signature schemes.
  7. Search on encrypted data.
  8. Broadcast encryption.
  9. Side channel attacks.

 

Prerequisites:

Introduction to cryptography.

 

 

Course Plan:

 

Lecture

Date

Subject

Files

1 March 7, 2010 Oblivious Transfer.  slides (all slides are password protected. The password is the number of the room in which the lecture takes place).
2 March 14, 2010 Oblivious Transfer. slides.
3 March 21, 2010 Yao's secure computation protocol. Secure computation of the median. slides.
4 April 11, 2010 Secure multi-party protocols. Private Information Retrieval. slides.
5 April 18, 2010 Private Information Retrieval. slides.
6 April 25, 2010 Homomorphic encryption. slides.
7 May 2, 2010 Private keyword search. Semantic security. slides.
8 May 9, 2010 Semantic security. The Cramer-Shoup cryptosystem. slides.
9 May 23, 2010 The Cramer-Shoup cryptosystem. Chosen ciphertext attacks. slides.
10 May 30, 2010 Identity based encryption. Cocks encryption scheme. slides.
11 June 6, 2010 Identity based encryption. Bilinear pairings. slides.
12 June 13, 2010 Chosen ciphertext security from identity based encryption. slides.

 

Homeworks:

 

Related Courses:

Last updated: June 19, 2010.