Jan 18 | Course outline, security definition | [Ps 1.1-1.3], [KL 1.1,1.2,1.4,2.1] |
Jan 23 | Perfect security, one-time pads | [Ps 1.3], [KL 2.1-2.3] |
Jan 25 | Efficient computation, adversary, PRG | [Ps 2.1,3.1-3.2], [KL 3.1-3.3] |
Jan 30 | Computational indistinguishability | [Ps 3.1] |
Feb 1 | Computational indistinguishability | [Ps 3.1] |
Feb 6 | PRG | [Ps 3.3], [KL 3.3] |
Feb 8 | Pseudo-random functions | [Ps 3.7, 3.8] [KL 8.5] |
Feb 13 | CPA-secure encryption | [Ps 3.9] [KL 3.2, 3.4] |
Feb 15 | Pseudo-random functions | [Ps 3.7, 3.8] [KL 8.5], Abhishek@JHU, Goldwasser@Berkeley, Wichs@Northeastern |
Feb 20 | One-way functions | [Ps 2.2] [KL 8.1] |
Feb 22 | Factoring, reduction | [Ps 2.3-2.4], [KL 9.2.3] |
Feb 27 | From weak to strong OWF | [Ps 2.4], Wichs@NEU, Goldwasser@Berkeley, LTW05 |
Feb 29 | Universal OWF | [Ps 2.13], Wichs@NEU |
Mar 12 | Hard-core lemma | [Ps 3.4] [KL 8.3.3] Bellare@UCSD |
Mar 14 | Hard-core lemma | [Ps 3.4] [KL 8.3.3] Bellare@UCSD |
Mar 19 | Min-entropy, Mazor-Pass | Barak@Princeton, Mazor-Pass 2023 |
Mar 21 | Mazor-Pass PRG | Mazor-Pass 2023 and the video recording at TCC 2023 |
Mar 26 | Message Authentication | [Ps 5.1, 5.2] [KL 4.1-4.3] |
Mar 28 | Digital Signatures | [Ps 5.3] [KL 13.1, 13.2, 13.6, 14.4], Lamport’79, Goldwasser@Berkeley |
Apr 2 | Zero-knowledge proof | [Ps 4.1-4.6] |
Apr 4 | Application of ZKP | [Ps 4.9] |
Apr 9 | ZKP for graph 3-coloring | [Ps 4.7-4.9] |
Apr 11 | Commitments ZKP for NP | [Ps 4.7] |
… | | |
Apr 30 | (last lecture) | |