This course will cover some of the latest cryptographic techniques for security protocols. This course intends to stimulate
students in their own research – improve their ability of extracting, presenting, and discussing results from recent papers on a certain topic and try to extend/improve them.
Course Outline
Basics in cryptology – cryptosystems, digital signatures, (keyed) hash functions
Secret sharing
Threshold cryptography
Lattice-based cryptography
Elliptic curve cryptography
Oblivious transfer
Private information retrieval. Secure keyword search
Zero-knowledge proofs
Secure multiparty computations (case studies: set intersection, e-auction, e-voting)
E-voting based on mix-nets
Pairing-based cryptography. Identity based encryption