Advanced Cryptography for Data Security (CS 7301-501) 
      Time and Location     : MW 5:30-6:45pm ECSS 2.201

     
Instructor
                : Murat Kantarcioglu
Office Hours & Location : Tuesday 16:30-18:30 at ECSS 3.225

      
Teaching Assistant
: TBA
       Office Hours & Location : TBA	


          Prerequisites                     : Grad level introduction to cryptography
            


Grading:

  • Project:              50%
    • Your project should try to create novel solution ideas  or new solution implementations about some data security problem using cryptography. Projects can be done as an group or as an invidual.
  • Class Part.   :     20%

Course Topics:
      • Homomorphic Encryption
      • Identity-based Encryption
      • Predicate based Encryption
      • Keyword Search over Encrypted Data
      • Range queries over Encrypted Data
      • Rational Secret Sharing
      • Differential Privacy and Cryptography

         

           Textbook:   No text book is needed for this class.


 Course Outline:


01.11.10  Mon.

  • Overview of basic crypto. 

01.13.10  Wed.

  • Zero knowledge proofs.

01.18.10  Mon.

  • NO CLASS!

01.20.10  Wed.

  • Introduction to elliptic curves
  • My hand-written notes for the last two classes (mht format)

01.25.10  Mon.

  • Identity based encryption
  • Discussion is based on the following paper (pdf)

01.27.10  Wed.

  • Identity based encryption cont.

02.01.10  Mon.

  • Identity based encryption cont

02.03.10  Wed.

  • Homomorphic encryption
  • Discussion is based on Katz-Lindell Section 11.3.

02.08.10  Mon.

  • Homomorphic encryption cont.

02.10.10  Wed.

  • Homomorphic encryption based secure multi-party computation (SMC)
  • Discussion is based on the following paper (pdf)

02.15.10  Mon.

  • Homomorphic encryption based SMC cont.

02.17.10  Wed.

  • Keyword search on encrypted data
  • Discussion is based on the following paper (pdf)
  • Ali will present the paper.

02.22.10  Mon.

  • Keyword search on encrypted data cont.
  • Discussion is based on the following paper (pdf)
  • ? will present this paper.

02.24.10  Wed.

  • Keyword search on encrypted data cont.
  • Discussion is based on the following paper (pdf)
  • Sean will present this paper.

03.01.10  Mon.

  • Keyword search on encrypted data cont.
  • Discussion is based on the following paper (pdf)
  • James will present this paper.

03.03.10  Wed.

  • Predicate encryption (pdf)
  • Robert will present this paper.

03.08.10  Mon.

  • Range queries over encrypted data
  • Discussion is based on the following paper (pdf)
  • Murat will present this paper.

03.10.10  Wed.

  • Range queries over encrypted data cont.
  • Discussion is based on the following paper (pdf)
  • Murat will present this paper.

03.15.10  Mon.

  • SPRING BREAK

03.17.10  Wed.

  • SPRING BREAK

03.22.10  Mon.

  • Differential privacy
  • Discussion is based on the following paper (pdf)
  • Murat will present this paper.

03.24.10  Wed.

  • Differential privacy cont.
  • Discussion is based on the following paper (pdf)
  • Murat will present this paper.

03.29.10  Mon.

  • Combining differential privacy and SMC
  • Discussion is based on the following paper (pdf)
  • Jennifer will present this paper.

03.31.10  Wed.

  • Combining differential privacy and SMC cont.
  • Discussion is based on the following paper (pdf)
  • Andy will present this paper.

04.05.10  Mon.

  • Game theory basics
  • Discussion is based on the following paper
  • Murat will present basics. 

04.07.10  Wed.

  • Game theory basics cont.
  • See the paper for the previous class.(pdf)
  • Bonas will present

04.12.10  Mon.

  • Game theory and Cryptography
  • Discussion is based on the following paper (pdf)
  • Saiful will present

04.14.10  Wed.

  • Game theory and Cryptography cont.
  • Discussion is based on the following paper (pdf)
  • Mustafa will present

04.19.10  Mon.

  • Rational Secret Sharing
  • Discussion is based on the following paper (pdf)
  • Raymond will present

04.21.10  Wed.

  • Rational Secret Sharing cont.
  • Discussion is based on the following paper (pdf)
  • Amy will present

04.26.10  Mon.

  • Rational Secret Sharing cont.
  • Discussion is based on the following paper (pdf)
  • Vaibhav will present

04.28.10  Wed.

  • Project Presentations
    • Presentation 1: Amy, Bonas, and Vaibhav
    • Presentation 2: James and Richard
    • Presentation 3: Saiful and Andy

05.03.10  Mon.

  • Project Presentations
    • Presentation 1: Ali
    • Presentation 2: Mustafa
    • Presentation 3: Robert
    • Presentation 4: Raymond