Advanced Topics in Cryptography


 

Instructor: Benny Pinkas, benny (at) pinkas.net.

 

Spring semester 2013.

 

Description:

This course will cover advanced topics in cryptographic research.

The course will aim to cover the following topics, although probably only a subset of them will be covered in class:

  1. Oblivious transfer.
  2. Secure computation (Yao’s construction for the two-party case).
  3. Encryption with chosen-ciphertext security (the Cramer-Shoup construction).
  4. Homomorphic encryption (Paillier’s encryption system, the Damgard-Jurik construction).
  5. Privacy preserving database operations:
    1. Private information retrieval (PIR).
    2. Computing intersections.
    3. Keyword search.
  6. Pairing based cryptography:
    1. Identity based encryption (IBE).  (The Boneh-Franklin construction, Cocks’ construction.)
    2. Signature schemes.
  7. Search on encrypted data.
  8. Broadcast encryption.
  9. Side channel attacks.


Prerequisites:

Introduction to Cruptorgaphy.

 

Grading: Homeworks and a final large homework

Homeworks:


Course Plan:

 

Lecture

Date

Subject

Files

1

26/2/2013

Intro to seucre computation. Oblivious transfer.

slides.

2 5/3/2013 Oblivious transfer. slides.
3
19/3/2013Definitions.slidesAdditonal notes
49/4/2013Sigma protocols.slides.
530/4/2013Sigma protocols.slides.
67/5/2013Fully secure oblivious transfer. slides.
721/5/2013Secure two-party computation.slides.
8-928/5-4/6/2013Secure multi-party computation.slides.
1011/6/2013Secure multi-party computation with unconditional security.slides.
1118/6/2013Private information retrieval.slides.

 

Last updated: June 17, 2013.