In a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
Lernziel
To know and understand a selection of cryptographic protocols and to be able to analyze and prove their security and efficiency.
Inhalt
The selection of considered protocols varies. Currently, we consider multi-party computation, secret-sharing, broadcast and Byzantine agreement. We look at both the synchronous and the asynchronous communication model, and focus on simple protocols as well as on highly-efficient protocols.
Skript
We provide handouts of the slides. For some of the topics, we also provide papers and/or lecture notes.
Voraussetzungen / Besonderes
A basic understanding of fundamental cryptographic concepts (as taught for example in the course Information Security) is useful, but not required.
Kompetenzen
Fachspezifische Kompetenzen
Konzepte und Theorien
geprüft
Verfahren und Technologien
geprüft
Methodenspezifische Kompetenzen
Analytische Kompetenzen
geprüft
Entscheidungsfindung
gefördert
Persönliche Kompetenzen
Kreatives Denken
gefördert
Kritisches Denken
gefördert
Leistungskontrolle
Information zur Leistungskontrolle (gültig bis die Lerneinheit neu gelesen wird)