Foundations of Cryptography

CS60088, Spring 2018, LTP: 3-1-0


Class Timings MON: 10:00-10:55; WED: 08:00--09:55; THUR: 10:00-10:55
Venue CSE119
Instructor Somindu Chaya Ramanna
Teaching assistants Poorva Dixit, Anindya Ganguly

Syllabus (Tentative)

References

Evaluation

The evaluation for this course will be based on a class test mid-sem, end-sem examinations and a term paper. Details are below.
40%: end-sem exam
20%: mid-sem exam
10%: class test
30%: presentation
[If class test does not take place then term paper will cover 40% of the grade.]

Tests/Exams

[Test questions and solutions will be uploaded here.]

Presentation

Below is a list of research papers (search on Google scholar). Each student is expected to choose one (not struck out) from the list, prepare a presentation on the paper or any particular aspect of the paper. Choice of topic is on a first come first serve basis. Each presentation will be for 30 minutes (20 mins for the talk + 10 mins for questions). Evaluation of the presentation will be based on the following criteria:
  1. Werner Alexi, Benny Chor, Oded Goldreich, Claus P. Schnorr. RSA and Rabin Functions: Certain Parts are as Hard as the Whole. SIAM Journal on Computing, Vol. 17, Iss. 2.
  2. Manuel Blum, Silvio Micali. How to Generate Cryptographically Strong Sequences of Pseudorandom Bits. SIAM Journal on Computing, Vol. 13, Iss. 4.
  3. Mihir Bellare and Philip Rogaway. Random oracles are practical: a paradigm for designing efficient protocols. First Conf. on Computer and Communications Security, pp. 62 73, 1993
  4. M. Naor and M. Yung, "Public-key cryptosystems provably secure against chosen ciphertext attacks", in 22nd ACM Symposium on the Theory of Computing, pp. 427-437, 1990.
  5. M Luby, C Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 1988 - SIAM
  6. D. Coppersmith. Small solutions to polynomial equations, and low exponent RSA vulnerabilities. Journal of Cryptology, 1997 - Springer
  7. Chris Peikert and Alon Rosen. "Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices." Theory of Cryptography Conference. Springer, Berlin, Heidelberg, 2006.
  8. Dan Boneh and Matt Franklin. "Identity-based encryption from the Weil pairing." Annual international cryptology conference. Springer, Berlin, Heidelberg, 2001.
  9. David Pointcheval and Jacques Stern. "Security proofs for signature schemes." International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1996.
  10. Mihir Bellare and Oded Goldreich. "On defining proofs of knowledge." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1992.
  11. Moni Naor and Omer Reingold. "Number-theoretic constructions of efficient pseudo-random functions." Journal of the ACM (JACM) 51.2 (2004): 231-262.
  12. Danny Dolev, Cynthia Dwork and Moni Naor. "Nonmalleable cryptography." SIAM review 45.4 (2003): 727-784.
  13. Antoine Joux. "Multicollisions in iterated hash functions. Application to cascaded constructions." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 2004.
  14. K. Kurosawa and Y. Desmedt. A new paradigm of hybrid encryption scheme. In CRYPTO 2004, LNCS 3152, pages 426--442. Springer-Verlag, 2004.
  15. David Cash, Eike Kiltz, and Victor Shoup. "The twin Diffie-Hellman problem and applications." Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2008.
  16. Dan Boneh, Ben Lynn and Hovav Shacham. "Short signatures from the Weil pairing." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2001.
  17. Eiichiro Fujisaki and Tatsuaki Okamoto. "Secure integration of asymmetric and symmetric encryption schemes." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1999.

Tutorials

[Tutorial questions and solutions will be uploaded here.]

Tutorial 1 Questions Solutions

Tutorial 2 Questions Solutions

Tutorial 3 Questions Solutions

Note: There will be no evaluation for the tutorials. The purpose is for you to get more exposure and be able to solve problems independently. DO NOT search for solutions online during these sessions. Instead try to come up with the solution independently or via discussions with the TA's/classmates.