0368-4165-01

Spring 2009

Seminar in Cryptographic Protocols

 

Mondays 13-15

Instructor:  Ran Canetti

Note:  On Monday, March 15 there will be no meeting. A makeup meeting will take place Friday, March 20, 10-12.

General

Cryptographic protocols are algorithms that allow parties to communicate and collaborate in untrusted environments. They include algorithms that protect against external attackers, as well as algorithms for collaboration with untrusted peers. Besides being fascinating in of themselves, cryptographic protocols provide essential building blocks in the design of secure systems. This seminar will cover some aspects of cryptographic protocols, with the purpose of bringing students up to speed with the state of the art and enabling them to perform independent research.

Required background

An introductory graduate course in cryptography (such as the one given last semester at TAU) is highly recommended. If you haven't taken such a course please contact Ran.

Format

Most lectures will be given by the students. Preparing for the lecture will involve:

  • Reading the relevant material.
  • Preparing a presentation. (Slides are recommended but not mandatory.)
  • Meeting with Ran during the week prior to the presentation to go over the presentation, and fixing it accordingly.
  • Presenting in class.
  • Preparing a written summary of the presentation to be posted online. (In case of a slides presentation, the slides themselves can double up as the summary.)

 


Lecture Topics

Below is a list of lecture topics for students to pick from. The lectures to be given and their order will be decided in the first two meetings, based on the makeup of the class and the preferences of the students.

Some lectures are bunched under a single topic. These lectures are best given in sequence, in the specified order. Some ordering between the topic is also best kept. Otherwise lectures can be presented at any order. In any case, each bullet corresponds to a lecture.

In much of the list below only the original papers are mentioned. Often the covered material has better or alternative descriptions in later papers. There may also be presentation materials available online. You are encouraged to use all of these to improve your understanding and your presentation.

Composition and round complexity of Zero-Knowledge protocols

A note on constant-round zero-knowledge proofs for NP
Alon Rosen
TCC 2004

  • On the Concurrent Composition of Zero-Knowledge Proofs
    Ransom Richardson, Joe Kilian
    EUROCRYPT 1999: 415-431

On Constant-Round Concurrent Zero Knowledge.
R. Pass and M. Venkitasubramaniam
TCC 2008

  • How to Go Beyond the Black-Box Simulation Barrier
    Boaz Barak
    FOCS 2001 106-115

Non-Interactive Zero Knowledge and CCA-secure encryption

  • Multiple Non-Interactive Zero Knowledge Proofs Under General Assumptions.
    Uriel Feige, Dror Lapidot, Adi Shamir
    SIAM J. Comput. 29(1): 1-28 (1999)IZK: FLS
  • Robust Non-interactive Zero Knowledge.
    Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai
    CRYPTO 2001: 566-598

Y. Lindell. A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions. In the Journal of Cryptology, 19(3):359-377, 2006.

Identity-based and CCA-secure encryption

  • Identity based encryption from the Weil pairing
    D. Boneh and M. Franklin
    SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003.

Chosen-Ciphertext Security from Identity-Based Encryption.
D. Boneh, R. Canetti, S. Halevi, and J. Katz.
SIAM J. Comput., 36(5): 1301-1328 (2007)

Non-malleable commitments

Multi-party computation and Universally Composable security

Simplified VSS and Fact-Track Multi-party Computations with Applications to Threshold Cryptography.
Rosario Gennaro, Michael O. Rabin, Tal Rabin:
PODC 1998: 101-111

  • Universally Composable Commitments.
    R. Canetti and M. Fischlin. Crypto, 2001. Long version at eprint.iacr.org/2001/055.
  • Universally composable two-party and multi-party secure computation.
    R. Canetti, Y. Lindell, R. Ostrovsky, A. Sahai.
    34th STOC, 2002. Longer version at eprint.iacr.org/2002/140.
  • Universally Composable Security with Pre-Existing Setup.
    R. Canetti, Y. Dodis, R. Pass and S. Walfish.
    TCC 2007. Long version at eprint.iacr.org/2006/432.
  • Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.
    R. Canetti and J. Herzog.
    TCC 2006: 380-403. Long version at eprint.iacr.org/2004/334.

Pseudorandom generators from one-way functions

Program Obfuscation

  • On the (Im)possibility of Obfuscating Programs
    Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan and Ke Yang
    Crypto 2001
    http://www.math.ias.edu/~boaz/Papers/obfuscate.ps
  • Towards realizing random oracles: Hash functions that hide all partial information.
    R. Canetti.
    Crypto, 1997. Longer version available at eprint.iacr.org/1997/007 .

 

Schedule of talks and presentation materials

 

No.

Date

Topic

Speaker

Materials

1

2.3.

Review of Zero-Knowledge (ZK),  Triviality of  3-round  Black-Box ZK: The Goldreich-Krawczyk bound

Ran Canetti

 

2

9.3.

ZK protocols for NP with constant number of rounds : The Goldreich-Kahan and Rosen protocols

Dima Sotnikov

notes

 

 

slides

 

 

3

23.3.

Concurrent ZK: Lower bounds and protocols

Omer Paneth

slides

4

30.3.

Non-Black-Box ZK:  The Barak  protocol

Asaf Porat

slides

 

.

Pesach Vacation

 

 

5

20.4.

Non-Interactive ZK (NIZK):  The Feige-Lapidot-Shamir protocol

Ben Riva

slides

6

27.4.

Robust  NIZK  and CCA-secure encryption

Roy Kasher

slides

7

4.5.

Identity-Based Encryption and CCA-secure encryption

Ilia Lotosh

slides

8

11.5.

Non-Malleable Commitments: The  Dolev-Dwork-Naor and  Lin-Pass-Venkitasubramaniam protocols

Rita Vald

slides

9

15.5.

Universally Composable (UC) Security: The basic framework and composition theorem

Ran Canetti

slides

10

25.5.

UC secure computation with honest majority: The BenOr-Goldwasser-Wigderson protocol

MichaelHakimi

slides

11

1.6.

UC commitments and general secure computation

Daniel Shahaf

slides

12

8.6.

Program obfuscation:  Practical background, definitions, general impossibility

Omer Singer

slides

13

15.6.

Perfect One Way hashing and obfuscation of point functions

Nir Bitansky

slides