Selected Topics in Cryptography
Lecture Notes
This section contains a set of lecture notes and scribe notes for each lecture. Scribe notes are latex transcriptions by students as part of class work. Scribe notes are used with permission of the students named.
WEEK # |
TOPICS |
LECTURE NOTES |
SCRIBE NOTES |
1 |
L1: Overview of the Course. The "Classic" Definitional Framework of Multiparty Function Evaluation (along the lines of [C00]): Motivation for the Ideal-Model Paradigm. |
(PDF) |
L1-L2: "Universal Composability" by Yoav Yerushalmi and Steve Weis (PDF) |
2 |
L3: The Non-Concurrent Composition Theorem. Example: Casting Zero-Knowledge within the Basic Definitional Framework. The Blum Protocol for Graph Hamiltonicity. |
(PDF) |
L3-L4: "Universal Composability" by Yael Tauman Kalai and Abhi Shelat (PDF) |
3 |
L5: Theory of Cryptography Conference (TCC) |
||
4 |
L7: The Universally Composable (UC) Security Framework: Motivation and the Basic Definition (based on [C01]). |
(PDF) |
L7: "The Universal Composability Framework - Definitions" by Vinod Vaikuntanathan (PDF) |
5 |
L9: UC Commitments: Motivation. The Ideal Commitment Functionality. Impossibility of Realizations in the Plain Model. |
(PDF) |
L9: "UC Commitments and Other Feasibility Results" by Susan Hohenberger (PDF) |
6 |
L11: UC Zero Knowledge from UC Commitments. Secure Realization of any Multi-Party Functionality with any Number of Faults: The Semi-Honest Case. (Static, Adaptive, Two-Party, Multi-Party.) |
(PDF) |
|
7 |
L13: Universal Composition with Joint State. |
(PDF) |
L13-L14: "JUC; UC Signatures and Authentication" by Yoav Yerushalmi and Steve Weis (PDF) |
8 |
L15: Authenticated Key Exchange and Secure-Session Protocols. |
(PDF) |
|
9 |
L17: Electronic Voting/Introduction |
L17: "Introduction to Electronic Voting" by Ben Adida (PDF) |
|
10 |
L19: Verifiable Mix-Nets |
L19: "Verifable Mix-Net Voting" by Susan Hohenberger (PDF) |
|
11 |
L21: Verifiable Mix-Nets (cont.) |
L21: "Neff (VoteHere) Voting Scheme" by Chris Peikert (PDF) |
|
12 |
L23: Chaum's Voting Scheme |
L23: "Chaum's Election Scheme" by Yoav Yerushalmi (PDF) |
|
13 |
L25: Pairing-Based Cryptography |
L25: "Pairing-Based Cryptography" by Ben Adida (PDF) |
Assignments
Homework 1 (PDF)
Homework 2 (PDF)
Homework 3 (PDF)
Homework 4 (PDF)