Focus: The focus of this class will be the theoretical foundations and applications of modern cryptography.
Grading: Homeworks - 20%, Midterm I - 25%, Midterm II - 25%, Project Presentation 30%Aug 25 | Introduction & One Way Functions | Notes by Thomas Holenstein More detailed notes (Chapter 1 and 2 (Section 2.1 to 2.3)) Additional fun reading: A Note on Negligible Functions |
Aug 30 | Hardness Amplification and Levin's one-way function | Notes by Thomas Holenstein (for Hardness Amplification) Levin's one way function [Scribe notes for a class by Rafael Pass] |
Sep 1 | Hard Core Bit | Scribe notes for a class by Rafael Pass |
Sep 6 | Computational Indistinguishability and Pseudorandom Generators | Notes by Yehuda Lindell |
Sep 8 | Pseudorandom Generators and Pseudorandom Functions | Notes by Yehuda Lindell (Sections 4.2, 5.1 and 5.2) |
Sep 13 | Zero Knowledge I | Notes by Yehuda Lindell (Sections 5.3) Additional fun reading: Zero-Knoweldge twenty years after its invention |
Sep 15 | Zero Knowledge II | Notes by Yehuda Lindell (Chapter 7) Project Proposal (1 page) due on 10/18 at 11 am (in class) Possible topics for project by Luca Trevisan and David Wagner Additional fun reading: How to Go Beyond the Black-Box Simulation Barrier |
Sep 20 | Public Key Encryption | Notes by Yehuda Lindell (Sections 9 and 10.1) |
Sep 22 | NIZK I | Scribe notes for a class by Jonathan Katz |
Sep 27 | Midterm I | |
Sep 29 | NIZK II | Scribe notes for a class by Jonathan Katz |
Oct 4 | Digital Signatures and CRHF | Scribe notes for a class by Jonathan Katz |
Oct 6 | Public Key Encryption | |
Oct 11 | Public Key Encryption (CCA Security) | Scribe notes for a class by Rafael Pass and this |
Oct 13 | Secure Computation I (Oblivious Transfer and Definitions of Secure Computation) | Notes by Yehuda Lindell (Chapter 13) |
Oct 18 | Secure multi-party Computation (GMW Protocol + Malcious model) | Notes by Yehuda Lindell (Chapter 13) |
Oct 20 | Secure 2-party Computation (Yao's garbled circuit construction) | https://www.youtube.com/watch?v=mtKCDJe4a48 Additional Fun Watching: https://www.youtube.com/watch?v=YvDmGiNzV5E https://www.youtube.com/watch?v=0MW_o9OLcdI https://www.youtube.com/watch?v=PfiBhikvUb4 |
Oct 25 | Bilinear Maps and Identity Based Encryption | |
Oct 27 | Witness Encryption and Fully-Homomorphic Encryption (Bootstrapping) | https://eprint.iacr.org/2013/258.pdf |
Nov 1 | Indistingusishability Obfuscation | |
Nov 3 | Functional Encryption | |
Nov 7 | (Class moved from Nov 8th to Nov 7th 2-3:30 pm in 380 Soda Hall) | |
Nov 10 | https://eprint.iacr.org/2013/451.pdf | |
Nov 15 | Midterm II | |
Nov 17 | Project Presentations | |
Nov 22 | Project Presentations | |
Nov 24 | Thanksgiving Day! | |
Nov 29 | Project Presentations | |
Dec 1 | Project Presentations |
There
is no required textbook for the course and lecture notes on essentially
everything that will be covered can be found online and will be scribed
as part of the class. However, following can be excellent reference
material.