0368-4165-01
Spring
2009
Seminar in Cryptographic Protocols
Mondays 13-15
Instructor: Ran Canetti
Note: On Monday, March 15
there will be no meeting. A makeup meeting will take place Friday, March 20,
10-12.
General
Cryptographic protocols are algorithms that allow parties to
communicate and collaborate in untrusted environments. They include
algorithms that protect against external attackers, as well as algorithms for
collaboration with untrusted peers. Besides being fascinating in of
themselves, cryptographic protocols provide essential building blocks in the
design of secure systems. This seminar will cover some aspects of
cryptographic protocols, with the purpose of bringing students up to speed
with the state of the art and enabling them to perform independent research.
Required background
An introductory graduate course in
cryptography (such as the one given last semester at
TAU) is highly recommended. If you haven't taken such a course please
contact Ran.
Format
Most lectures will be given by the students. Preparing for the lecture
will involve:
- Reading
the relevant material.
- Preparing
a presentation. (Slides are recommended but not mandatory.)
- Meeting
with Ran during the week prior to the presentation to go over the
presentation, and fixing it accordingly.
- Presenting
in class.
- Preparing
a written summary of the presentation to be posted online. (In case of a
slides presentation, the slides themselves can double up as the
summary.)
Lecture Topics
Below is a list of lecture topics for students to pick from. The
lectures to be given and their order will be decided in the first two
meetings, based on the makeup of the class and the preferences of the
students.
Some lectures are bunched under a single topic. These lectures are best
given in sequence, in the specified order. Some ordering between the topic is
also best kept. Otherwise lectures can be presented at any order. In any
case, each bullet corresponds to a lecture.
In much of the list below only the original papers are mentioned. Often
the covered material has better or alternative descriptions in later papers.
There may also be presentation materials available online. You are encouraged
to use all of these to improve your understanding and your presentation.
Composition and round complexity of Zero-Knowledge protocols
A
note on constant-round zero-knowledge proofs for NP
Alon Rosen
TCC 2004
- On
the Concurrent Composition of Zero-Knowledge Proofs
Ransom Richardson, Joe Kilian
EUROCRYPT 1999: 415-431
On Constant-Round Concurrent Zero Knowledge.
R. Pass and M. Venkitasubramaniam
TCC 2008
- How
to Go Beyond the Black-Box Simulation Barrier
Boaz Barak
FOCS 2001 106-115
Non-Interactive Zero Knowledge and CCA-secure encryption
- Multiple
Non-Interactive Zero Knowledge Proofs Under General Assumptions.
Uriel Feige, Dror Lapidot, Adi Shamir
SIAM J. Comput. 29(1): 1-28 (1999)IZK: FLS
- Robust
Non-interactive Zero Knowledge.
Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe
Persiano, Amit Sahai
CRYPTO 2001: 566-598
Y. Lindell. A Simpler Construction of
CCA2-Secure Public-Key Encryption Under General Assumptions. In the Journal
of Cryptology, 19(3):359-377, 2006.
Identity-based and CCA-secure encryption
- Identity
based encryption from the Weil pairing
D. Boneh and M. Franklin
SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
Chosen-Ciphertext
Security from Identity-Based Encryption.
D. Boneh, R. Canetti, S. Halevi, and J. Katz.
SIAM J. Comput., 36(5): 1301-1328 (2007)
Non-malleable commitments
Multi-party computation and Universally Composable security
Simplified VSS and Fact-Track Multi-party
Computations with Applications to Threshold Cryptography.
Rosario Gennaro, Michael O. Rabin, Tal Rabin:
PODC 1998: 101-111
- Universally
Composable Commitments.
R. Canetti and M. Fischlin. Crypto, 2001. Long version at eprint.iacr.org/2001/055.
- Universally
composable two-party and multi-party secure computation.
R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai.
34th STOC, 2002. Longer version at eprint.iacr.org/2002/140.
- Universally
Composable Security with Pre-Existing Setup.
R. Canetti, Y. Dodis, R. Pass and S. Walfish.
TCC 2007. Long version at eprint.iacr.org/2006/432.
- Universally
Composable Symbolic Analysis of Mutual Authentication and Key-Exchange
Protocols.
R. Canetti and J. Herzog.
TCC 2006: 380-403. Long version at eprint.iacr.org/2004/334.
Pseudorandom generators from one-way functions
Program Obfuscation
- On
the (Im)possibility of Obfuscating Programs
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit
Sahai, Salil Vadhan and Ke Yang
Crypto 2001
http://www.math.ias.edu/~boaz/Papers/obfuscate.ps
- Towards
realizing random oracles: Hash functions that hide all partial
information.
R. Canetti.
Crypto, 1997. Longer version available at eprint.iacr.org/1997/007 .
Schedule of talks and presentation materials
No.
|
Date
|
Topic
|
Speaker
|
Materials
|
1
|
2.3.
|
Review of Zero-Knowledge (ZK), Triviality of
3-round Black-Box ZK: The Goldreich-Krawczyk bound
|
Ran Canetti
|
|
2
|
9.3.
|
ZK protocols for NP with constant number of rounds : The
Goldreich-Kahan and Rosen protocols
|
Dima
Sotnikov
|
notes
slides
|
3
|
23.3.
|
Concurrent
ZK: Lower bounds and protocols
|
Omer
Paneth
|
slides
|
4
|
30.3.
|
Non-Black-Box
ZK: The Barak protocol
|
Asaf
Porat
|
slides
|
|
.
|
Pesach Vacation
|
|
|
5
|
20.4.
|
Non-Interactive
ZK (NIZK): The Feige-Lapidot-Shamir protocol
|
Ben
Riva
|
slides
|
6
|
27.4.
|
Robust
NIZK and CCA-secure encryption
|
Roy
Kasher
|
slides
|
7
|
4.5.
|
Identity-Based
Encryption and CCA-secure encryption
|
Ilia
Lotosh
|
slides
|
8
|
11.5.
|
Non-Malleable
Commitments: The Dolev-Dwork-Naor and
Lin-Pass-Venkitasubramaniam
protocols
|
Rita
Vald
|
slides
|
9
|
15.5.
|
Universally
Composable (UC) Security: The basic framework and composition theorem
|
Ran
Canetti
|
slides
|
10
|
25.5.
|
UC
secure computation with honest majority: The BenOr-Goldwasser-Wigderson
protocol
|
MichaelHakimi
|
slides
|
11
|
1.6.
|
UC
commitments and general secure computation
|
Daniel
Shahaf
|
slides
|
12
|
8.6.
|
Program
obfuscation: Practical background, definitions, general impossibility
|
Omer
Singer
|
slides
|
13
|
15.6.
|
Perfect
One Way hashing and obfuscation of point functions
|
Nir
Bitansky
|
slides
|
|
|
|
|
|
|
|
|