ETH Zürich » Computer Science » Theory » Cryptography

Cryptographic Protocols (SS 2017)

Lecturer: Dr. Martin Hirt

Teaching Assistants: Chen-Da Liu Zhang and Daniel Tschudi

Lectures: Wednesdays, 13-15, CAB G 51

Exercise Class 1: Wednesdays, 15-17, CAB G 56, Chen-Da Liu Zhang

Exercise Class 2: Wednesdays, 15-17, LFV E 41, Daniel Tschudi (01.03 & 10.05: CAB H 52)


Course Material

Note: Exercise sheets, papers, and slides will be printed for you.

Slides

Slides 01, Slides 02, Slides 03, Slides 04, Slides 05, Slides 06, Slides 07, Slides 08, Slides 09

Notes

Notes 01, Notes 02, Notes 03, Notes 04, Notes 05, Notes 06, Notes 07, Notes 08, Notes 09, Notes 10

Exercises

Exercise 01, Exercise 02, Exercise 03, Exercise 04, Exercise 05, Exercise 06, Exercise 07, Exercise 08, Exercise 09, Exercise 10, Exercise 11, Exercise 12, Exercise 13

Solutions

Solution 01, Solution 02, Solution 03, Solution 04, Solution 05, Solution 06, Solution 07, Solution 08, Solution 09, Solution 10, Solution 11, Solution 12, Solution 13

Exam

  • When
    • Tentatively August 14-16, 2017

  • How
    • You draw a card at random; each card has three subjects/questions
    • You strike out one of the three questions



Handouts

During the course we will cover papers partially. These are part of the material relevant for the exam.
  • U. Maurer: Unifying Zero-Knowledge Proofs of Knowledge: [pdf]
  • G. Brassard, D. Chaum, C. Crepeau: Minimum Disclosure Proofs of Knowledge: [pdf]
  • U. Maurer: Secure Multi-Party Computation Made Simple: [pdf]



Additional Reading Material

  • M. Hirt, U. Maurer: Kryptographische Protokolle.
    Old script from 2009 (German).
    Download: [pdf].

  • O. Goldreich: Foundations of Cryptography --- Volumes 1 and 2, Cambridge University Press, 2001 and 2004.
    Copies available at the Computer Science Library.
    For interactive proofs and zero-knowledge proofs, see Volume 1, Chapter 4.

  • A. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography, CRC Press, 1996.
    Available online.