Lecture Topics
Part 1: Public Key Encryption, Identity-Based Encryption and More
- Lecture 1: Class Introduction
- Lecture 2: Public Key Encryption and Number Theory Background
- Lecture 3: Identity-Based Encryption and the Boneh-Franklin IBE system
( Boneh-Franklin paper)
- Lecture 4: Removing Random Oracles From IBE I: The Boneh-Boyen system
(Boneh-Boyen paper)
- Lecture 5: Removing Random Oracles II: The Waters' IBE system
- Lecture 6: Chosen Ciphertext Secure Encryption and IBE
Class Presentations
- Lecture 7: Discussion of Class Presentations
Part 2: Signatures
- Lecture 8: Basic Definitions and Constructions
- Lecture 9: One-Time Signatures and Generic Constructions
- Lecture 10: Aggregate Signatures
- Lecture 11: Removing Random Oracles
- Lecture 12: RSA Signatures-- Full Domain Hash and Strong RSA
- Lecture 13: Short Signatures from Standard Assumptions
Part 3: Homomorphic Encryption, Non-Interactive Zero Knowledge and Applications
- Lecture 14: Homomorphic Encryption
- Lecture 15: Non-Interactive Zero Knowledge Proofs and the Groth, Ostrovksy, and Sahai system
- Lecture 16: Group signatures; an application of NIZKs
Part 4: Broadcast Systems
- Lecture 17: Broadcast Encryption
- Lecture 18: Traitor Tracing
Part 5: Multi-Party Computation
- Lecture 19: Oblivious Transfer: Definitions and Constructions
- Lecture 20: Multi-Party Computation
- Lecture 21: Zero Knowledge
Part 6: Class Choice
|