Instructor: | Mark Zhandry () |

Office Hours: By appointment | |

TAs: | Ben Kuykendall and Jiaxin Guan |

Time: | TuTh 1:30pm - 2:50pm (EST) |

Location: | Zoom |

Grading: | Based on homeworks every ~2 weeks, scribing some lectures |

- Foundations
- Cryptography from minimal assumptions
- Black box separations - arguing that something might be impossible

- Mathematical tools
- Lattices
- Elliptic curves
- Pairings
- Isogenies
- Multivariate equations

- Quantum
- Post-Quantum Cryptography - Securing cryptography from quantum attacks
- Quantum cryptography - Using quantum computing to achieve never-before-possible applications

- Cryptanalysis techniques
- Index calculus
- Pollard Rho
- Lattice cryptanalysis

- Applications
- Fully homomorphic encryption - Computing on encrypted data
- Zero knowledge proofs - Proving a theorem without revealing the proof
- Traitor tracing - Finding the source of leaked keys
- Identity-based encryption - Encryption where your public key is simply your email address
- Private information retrieval - Retrieving a database record without revealing which record
- Secret sharing - Only qualified sets of users can reconstruct a secret
- Multiparty computation - Mutually distrusting users computing joint function over their private inputs
- Obfuscation - Hiding secrets in software code.

- Other topics
- Non-black-box techniques - Overcoming black box separations
- Time/Space trade-offs

Lecture | Topic | Scribe Notes |

1 - Tu, 2/2 | Course introduction, review of basic crypto concepts | [1] |

2 - Th, 2/4 | Cryptography from minimal assumptions | [2] |

3 - Tu, 2/9 | Cryptography from minimal assumptions, cont. | [3] |

4 - Th, 2/11 | Cryptography from minimal assumptions, cont. | [4] |

5 - Tu, 2/16 | Class Cancelled | |

6 - Th, 2/18 | Algebraic tools for Cryptography | [5] |

7 - Tu, 2/23 | Algebraic tools for Cryptography, cont. | [6] |

8 - Th, 2/25 | Algebraic tools for Cryptography, cont. | [7] |

9 - Tu, 3/2 | Algebraic tools for Cryptography, cont. | [8] |

10 - Th, 3/4 | Zero Knowledge | [9] |

11 - Tu, 3/9 | Zero Knowledge | [10] |

12 - Th, 3/11 | Identity-based encryption | [11] |

Tu, 3/16 | No Class - Spring recess | |

13 - Th, 3/18 | Identity-based encryption | [12] |

14 - Tu, 3/23 | Traitor Tracing | [13] |

15 - Th, 3/25 | Fully Homomorphic Encryption | [14] |

16 - Tu, 3/30 | Fully Homomorphic Encryption | [15] |

17 - Th, 4/1 | Functional Encryption | [16] |

18 - Tu, 4/6 | Obfuscation | [17] |

19 - Th, 4/8 | Obfuscation | [18] |

20 - Tu, 4/13 | Obfuscation | [19] |

21 - Th, 4/15 | Post-quantum cryptography | [20] |

22 - Tu, 4/20 | Post-quantum cryptography | [21] |

23 - Th, 4/22 | Quantum Cryptography | [22] |

24 - Tu, 4/27 | Quantum Cryptography |

Homework 1. Due 2/25

Homework 2. Due 3/12

Homework 3. Due 4/15

Homework 4. Due 5/5

template.tex

ln1.tex