Focus: The focus of this class will be the theoretical foundations and applications of modern cryptography.
Grading: Scribe notes 20%, Homeworks (3) 40% , Project 40% (No final!)Scribe: Scribers please follow this template. Please hand in your LaTeX source as well along with your scribe!
Sep 3 | Introduction | |
Sep 8 | One Way Functions [Scribe] | Notes by Thomas Holenstein More detailed notes (Chapter 1 and 2 (Section 2.1 to 2.3)) Additional fun reading: A Note on Negligible Functions |
Sep 10 | Hardness Amplification and Levin's one-way function | Notes by Thomas Holenstein (for Hardness Amplification) Levin's one way function [Scribe notes for a class by Rafael Pass] |
Sep 15 | Hard Core Bit [Scribe] | Scribe notes for a class by Rafael Pass HW #1 |
Sep 17 | Computational Indistinguishability and Pseudorandom Generators [Scribe] | Notes by Yehuda Lindell |
Sep 22 | Pseudorandom Generators and Pseudorandom Functions [Scribe] | Notes by Yehuda Lindell (Sections 4.2, 5.1 and 5.2) |
Sep 24 | Zero Knowledge I [Scribe] | Notes by Yehuda Lindell (Sections 5.3) Additional fun reading: Zero-Knoweldge twenty years after its invention |
Sep 29 | Zero Knowledge II [Scribe] | Notes by Yehuda Lindell (Chapter 7) HW #2 Project Proposal due (10/15 at 2:40 pm) Possible topics for project by Luca Trevisan and David Wagner Additional fun reading: How to Go Beyond the Black-Box Simulation Barrier |
Oct 1 | Public Key Encryption [Scribe] | Notes by Yehuda Lindell (Sections 9 and 10.1) |
Oct 6 | NIZK I [Scribe] | Scribe notes for a class by Jonathan Katz |
Oct 8 | NIZK II [Scribe] | Scribe notes for a class by Jonathan Katz |
Oct 13 | CCA Secure Encryption [Scribe] | Scribe notes for a class by Jonathan Katz |
Oct 15 | Digital Signatures and CRHF [Scribe]. | Scribe notes for a class by Rafael Pass and this |
Oct 20 | Bilinear Maps and Identity Based Encryption [Scribe] | A One Round Protocol for Tripartite Diffie-Hellman Identity based encryption from the Weil pairing HW #3 |
Oct 22 | Secure Computation I (Oblivious Transfer and Definitions of Secure Computation) [Scribe] | Notes by Yehuda Lindell (Chapter 13) |
Oct 27 | Secure multi-party Computation (GMW Protocol + Malcious model) [Scribe] | Notes by Yehuda Lindell (Chapter 13) |
Oct 29 | Secure 2-party Computation (Yao's garbled circuit construction) [Scribe]. | https://www.youtube.com/watch?v=mtKCDJe4a48 Additional Fun Watching: https://www.youtube.com/watch?v=YvDmGiNzV5E https://www.youtube.com/watch?v=0MW_o9OLcdI https://www.youtube.com/watch?v=PfiBhikvUb4 |
Nov 3 | Witness Encryption [Scribe] | https://eprint.iacr.org/2013/258.pdf |
Nov 5 | Obfuscation [Scribe] | https://eprint.iacr.org/2013/451.pdf |
Nov 10 | Using Indistinguishability Obfuscation [Scribe] | |
Nov 12 | Functional Encryption from Indistingusishability Obfuscation [Scribe] | |
Nov 17 | Puncturing [Scribe] | https://eprint.iacr.org/2013/454.pdf |
Nov 19 | Project Presentations | http://goo.gl/forms/n3YlNgQcqr |
Nov 24 | Project Presentations | https://www.dropbox.com/sh/csjuzmkosivvkox/AAAkcFAjoovYUiOrFeH0xfOCa?dl=0 |
Nov 26 | Project Presentations | [Presentation Schedule] |
Dec 1 | Project Presentations | |
Dec 3 | Project Presentations |
There
is no required textbook for the course and lecture notes on essentially
everything that will be covered can be found online and will be scribed
as part of the class. However, following can be excellent reference
material.