Overview of the course:
Over the last couple of years, advanced cryptographic solutions have been proposed by the community in order to guarantee both privacy and functionality in cloud-based services by offering fine-grained access control policies over encrypted data. The purpose of this class is to introduce these advanced primitives and the current challenges in research.
We will cover several recent advances in cryptographic protocols, such as:
- Identity-based encryption
- Attribute-based encryption
- Functional encryption
- Fully-homomorphic encryption
- Multi-party computation
- Constrained pseudorandom functions
- Indistinguishability obfuscation
Course objectives:
- Understand advanced notions of cryptography: Definitions, security requirements, and their limitations.
- Acquire a toolkit for modern research in cryptography.
- Be able to read state-of-the art articles in cryptography.
Prerequisites:
There is no requirement for attending this class but it is highly recommended to have taken an introductory class on cryptography before. Students should also know basics in complexity theory, probabilities, and algebra.
Evaluation:
Scribe or homework and article presentation. Presentations will be 20-minute talks followed by up to 20 minutes of questions. Students are free to use either slides or blackboard. At least one question will relate to the course (and not to the articles). Every student has to choose an article (or a pair of article in some cases) to present in the list below.
Course Notes:
- Class 1 (Sep. 10):
Public-key exchange, Diffie-Hellman assumptions, Collision-Resistant Hash Functions, and Public-Key Encryption
[note] - Class 2 (Sep. 17):
Pairings, Identity-Based Encryption, Boneh-Franklin IBE
[note] (scribe: Calvin Abou Haidar) - Class 3 (Sep. 24):
A Tutorial on Hybrid Proofs in Cryptography
[note] (scribe: Quentin Deschamps) - Class 4 (Oct. 1):
BLS Signature and GPSW Attribute-Based Encryption
[note] (scribe: Lison Blondeau-Patissier) - Class 5 (Oct. 8):
Introduction to Lattice-Based Cryptography
[note] (scribe: Julien Du Crest) - Class 6 (Oct. 15):
Encrypting with Lattices
[note] (scribe: Matthieu Vieira) - Class 7 (Oct. 22):
Fully-Homomorphic Encryption
[unedited note] (scribe: Étienne Vareille) - Class 8 (Nov. 5):
GPV Signatures and IBE in the Standard Model (Benoit Libert)
[note] (scribe: Rémy Neveu) - Class 9 (Nov. 12):
GPV proofs and ABB IBE (Benoit Libert)
- Class 10 (Nov. 19):
Proof of ABB IBE and ABE for circuits (Benoit Libert)
[note] (scribe: Nacim Oijid) - Class 11 (Nov. 26):
ABE for Circuits from LWE (Benoit Libert)
[note] (scribe: Denis Rochette) - Class 12 (Dec. 3):
Public-key encryption with keyword search (Benoit Libert)
[note] (scribe: Florent Guépin) - Class 13 (Dec. 17):
Garbled Circuits and Functional Encryption
[unedited note] (scribe: Fabrice Lécuyer) - Class 14 (Jan. 7):
Indistinguishability Obfuscation
List of articles:
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
Shweta Agrawal, Xavier Boyen, Panagiotis Voulgaris, Vinod Vaikuntanathan, Hoeteck Wee
[pdf] | PKC 2012
To be presented by Julien DeveveyFunctional Encryption for Inner Product Predicates from Learning with Errors
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
[pdf] | ASIACRYPT 2011
To be presented by Matthieu Vieira- Direct chosen ciphertext security from identity-based techniques
Xavier Boyen, Qixiang Mei, Brent Waters
[pdf] | ACM CCS 2005
AND
Chosen-Ciphertext Security from Tag-Based Encryption
Eike Kiltz
[pdf] | TCC 2006 Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz, Amit Sahai, Brent Waters
[pdf] | Eurocrypt 2008
To be presented by Samuel HumeauPredicate encryption for circuits from LWE
Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee
[pdf] | CRYPTO 2015
To be presented by Nacim Oijid- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison Lewko, Brent Waters
[pdf] | TCC 2010 Fast cryptographic primitives and circular-secure encryption from hard learning problems
Benny Applebaum, David Cash, Chris Peikert, Amit Sahai
[pdf] | CRYPTO 2009
To be presented by Hadrien BrochetLattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
Shweta Agrawal, Dan Boneh, and Xavier Boyen
[pdf] | CRYPTO 2010
To be presented by Fabrice LécuyerCircuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
Zvika Brakerski and Vinod Vaikuntanathan
[pdf] | Crypto 2016
To be presented by Denis RochetteTwo Round Multiparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs
[pdf] | Eurocrypt 2016
To be presented by Julien Du CrestKey Homomorphic PRFs and Their Applications
Dan Boneh, Kevin Lewi, Hart William Montgomery, and Ananth Raghunathan
[pdf] | Crypto 2013
To be presented by Léo Paviet SalomonRiding on Asymmetry: Efficient ABE for Branching Programs
Sergey Gorbunov and Dhinakaran Vinayagamurthy
[pdf] | Asiacrypt 2015
To be presented by Rémy NeveuLeveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov, Vinod Vaikuntanathan, and Daniel Wichs
[pdf] | STOC 2015
To be presented by Florent Guépin- Towards Tightly Secure Short Signature and IBE
Xavier Boyen and Qinyi Li
[pdf] | Asiacrypt 2016 Identity-Based Encryption Gone Wild
Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart
[pdf] | ICALP 2006
AND
Generalized Key Delegation for Hierarchical Identity-Based Encryption
Michel Abdalla and Eike Kiltz and Gregory Neven
[pdf] | ESORICS 2007
To be presented by Calvin Abou-HaidarFunctional Encryption for Quadratic Functions, and Applications to Predicate Encryption
Romain Gay
[pdf] | Crypto 2017
To be presented by Quentin DeschampsABE for Deterministic Finite Automata from k-Lin
Junqing Gong, Brent Waters, and Hoeteck Wee
[pdf] | CRYPTO 2019
To be presented by Lison Blondeau-PatissierAttribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Shweta Agrawal, Monosij Maitra, Shota Yamada
[pdf] | CRYPTO 2019
To be presented by Théophile DubucSpace-Efficient Identity Based Encryption Without Pairings
Dan Boneh, Craig Gentry, and Mike Hamburg
[pdf] | FOCS 2007
AND
An Identity Based Encryption Scheme Based on Quadratic Residues
Clifford Cock
[pdf] | IMA Int. Conf. 2001
To be presented by Herménégilde Valentin