Applied Cryptography D
Aalto University
<p>This is an intermediate-level course on cryptography, with focus on public-key, application-oriented cryptographic primitives. It covers definitions and constructions of core and advanced public-key primitives, and their applications in privacy-preserving systems.</p><p>In particular, we cover the following core primitives:<br />- Public-key encryption<br />- Signatures<br />- Commitments<br />- Zero-knowledge arguments</p><p>We will also cover advanced primitives, with focus on their applications in privacy-preserving systems. The exact list of primitives and applications may differ in each instance of the course. Some examples are given below:</p><p>- Identity-based encryption and attributed-based encryption: Cryptographic access control<br />- Group signatures, ring signatures, blind signatures, and anonymous credentials: Anonymous authentication<br />- Searchable encryption, and oblivious random access machine: Searching and operating over encrypted database<br />- Private information retrieval: Private queries over public databases<br />- Proof of work, proof of stake, ring confidential transactions, coin mixing, swapping: Cryptocurrencies, smart contracts, and distributed anonymous applications<br />- Password-based cryptography: Enhanced password-based authentication</p>
Back
|
|