Cryptology II  

Description: Hypothesis testing and its extensions in cryptography. Relation between indistinguishability and semantic security. Homological classification of cryptosystems and commitment schemes. Authentication primitives. Sigma protocols and their relation to digital signatures. Zero-knowledge and proofs of knowledge. Secure two- and multi-party computation. Oblivious transfer and crypto-computing. Composability and design of complex protocols. Learning outcomes: Students obtain the ability to understand and verify various security proofs and are able to construct security proofs with reasonable complexity. Students also learn basic principles of cryptographic protocol and primitive design.
Presential
English
Cryptology II
English

Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or HaDEA. Neither the European Union nor the granting authority can be held responsible for them. The statements made herein do not necessarily have the consent or agreement of the ASTRAIOS Consortium. These represent the opinion and findings of the author(s).