Public-Key Encryption has had a significant impact by enabling remote parties to communicate securely via an insecure channel. Latest schemes go further by providing a fine-grained access to the encrypted data.
Learning objective
The student is comfortable with formal security definitions and proof techniques used to analyze the security of the latest encryption schemes with advanced features. This prepares the student to start reading research papers on the field.
Content
We will start by presenting the notion of Public-Key Encryption with its various security guarantees and some constructions. Then we will look into encryption schemes with fine-grained access control to the encrypted data, such as identity-based encryption or attribute-based encryption and present different methodology to prove their security.
Literature
Links to relevant research papers will be given in the course materials.
Prerequisites / Notice
It is recommended for students to have prior exposure to cryptography, e.g.the D-INFK course "Digital Signatures" or "Applied Cryptography".