COS 533 - Advanced Cryptography (Spring 2021)
	 Course Information 
	
	
	| Instructor:  | Mark Zhandry ( )  | 
	 |      Office Hours:  By appointment  | 
	| TAs:  | Ben Kuykendall and Jiaxin Guan | 
	| Time:  |  TuTh 1:30pm - 2:50pm (EST) | 
	| Location:  |  Zoom  | 
	| Grading:  |  Based on homeworks every ~2 weeks, scribing some lectures  | 
	
	 Course Description 
	
	This course will cover a selection of advanced topics in cryptography. Examples of potential topics include: 
	
		-  Foundations
		
			-  Cryptography from minimal assumptions
			
 -  Black box separations - arguing that something might be impossible
		
 
		 -  Mathematical tools
		
			-  Lattices
			
 -  Elliptic curves
			
 -  Pairings
			
 -  Isogenies
			
 -  Multivariate equations
		
 
		 -  Quantum
		
			-  Post-Quantum Cryptography - Securing cryptography from quantum attacks
			
 -  Quantum cryptography - Using quantum computing to achieve never-before-possible applications
		
 
		 -  Cryptanalysis techniques
		
			-  Index calculus
			
 -  Pollard Rho
			
 -  Lattice cryptanalysis
		
 
		 -  Applications
		
			-  Fully homomorphic encryption - Computing on encrypted data
			
 -  Zero knowledge proofs - Proving a theorem without revealing the proof
			
 -  Traitor tracing - Finding the source of leaked keys
			
 -  Identity-based encryption - Encryption where your public key is simply your email address
			
 -  Private information retrieval - Retrieving a database record without revealing which record
			
 -  Secret sharing - Only qualified sets of users can reconstruct a secret
			
 -  Multiparty computation - Mutually distrusting users computing joint function over their private inputs
			
 -  Obfuscation - Hiding secrets in software code.
		
 
		 -  Other topics
		
			-  Non-black-box techniques - Overcoming black box separations
			
 -  Time/Space trade-offs
		
 
	 
	
	COS 533 is intended to complement the topics covered in COS 433, covering some of the more recent advances in 
	cryptography and with a greater emphasis on theory.
	
	
	
Prerequisites: Familiarity with computability and complexity theory, such as that covered in 
	COS 340 (Turing Machines, P vs NP, NP-completeness, etc).   Basic number theory (arithmetic modulo primes, composites).  
	COS 433 is 
not required, though some familiarity with crypto concepts (one-way functions, encryption, digital signatures, public key vs secret key 
	cryptography, etc) is recommended.
	
 Example Schedule (subject to change based on student interest) 
	
	
	|  Lecture  |   Topic  |  							 Scribe Notes  | 
	|  1 - Tu, 2/2    |   Course introduction, review of basic crypto concepts  |  			[1] | 
	|  2 - Th, 2/4    |   Cryptography from minimal assumptions |  							[2] | 
	|  3 - Tu, 2/9    |   Cryptography from minimal assumptions, cont. |  						[3] | 
	|  4 - Th, 2/11    |   Cryptography from minimal assumptions, cont. |  						[4] | 
	|  5 - Tu, 2/16    |   Class Cancelled | 											 | 
	
	|  6 - Th, 2/18    |   Algebraic tools for Cryptography  |  									[5] | 
	|  7 - Tu, 2/23    |   Algebraic tools for Cryptography, cont.  |  									[6] | 
	|  8 - Th, 2/25    |   Algebraic tools for Cryptography, cont.  |  											[7] | 
	|  9 - Tu, 3/2   |   Algebraic tools for Cryptography, cont.  |  									[8] | 
	|  10 - Th, 3/4  |   Zero Knowledge  |  										[9] | 
	|  11 - Tu, 3/9  |   Zero Knowledge  | 								[10] | 
	|  12 - Th, 3/11  |   Identity-based encryption  |  								[11] | 
	|  Tu, 3/16  |   No Class - Spring recess  | 
	|  13 - Th, 3/18  |    Identity-based encryption  | 						[12] | 
	|  14 - Tu, 3/23   |   Traitor Tracing  | 								[13] | 
	|  15 - Th, 3/25   |   Fully Homomorphic Encryption  |  										[14] | 
	|  16 - Tu, 3/30  |   Fully Homomorphic Encryption  |  								[15] | 
	|  17 - Th, 4/1  |   Functional Encryption  | 								[16] | 
	|  18 - Tu, 4/6  |   Obfuscation  | 								[17] | 
	|  19 - Th, 4/8  |   Obfuscation  |  													[18] | 
	|  20 - Tu, 4/13  |   Obfuscation  | 													[19] | 
	|  21 - Th, 4/15   |   Post-quantum cryptography | 											[20] | 
	|  22 - Tu, 4/20   |   Post-quantum cryptography |  									[21] | 
	|  23 - Th, 4/22  |   Quantum Cryptography  |  									[22] | 
	|  24 - Tu, 4/27  |   Quantum Cryptography |  									 | 
	
	
	 Homework Assignments 
	
	Homework 0.  Due 2/3
	
Homework 1. Due 2/25
	
Homework 2. Due 3/12
	
Homework 3. Due 4/15
	
Homework 4. Due 5/5
	
	
	
	
Instructions for Homeworks: Please type up your solutions (LaTeX preferred).  Submit your solutions to Canvas by the due date.
	
 Templates for Scribe Notes 
	
	ln.tex
	template.tex
	
	Latex source files for first lecture
	ln1.tex