1. Cryptography Basics
Lectures 1-6: Private key and public key cryptography: Lec1, Lec2, Lec3, Lec4, Lec5, Lec6
2. Oblivious Computation
Lecture 7, 10th February: Introduction to Oblivious RAMs, Square-root ORAM
Readings: Software Protection and Simulation on Oblivious RAMs
Presenter: Kartik Nayak (slides)
Blog post: Anurag Kashyap, Andy Demma (blog post*)
Lecture 8, 15th February: Hierarchical ORAMs and Tree-based ORAMs
Readings: Software Protection and Simulation on Oblivious RAMs, Tree ORAMs
Presenter: Kartik Nayak (slides)
Blog post: Grayson York, Omar AlSughayer (blog post*)
Lecture 9, 17th February: Oblivious Sorting and OPRAMs
Readings: Oblivious Parallel RAM, A Simple Oblivious Sort
Presenter: Norah Tan (slides)
Blog post: Haozhan Sun, George Wang (blog post*)
3. Multiparty Computation
Lecture 10, 22nd February: Introduction to Multiparty Computation, Oblivious transfer
Readings: Oblivious transfer: link1, link2 (Section 3.7), How to simulate it?
Presenters: Kartik Nayak (notes), Chenghong Wang (slides)
Blog post: Olivier, Andy Demma (blog post*)
Lecture 11, 24th February: GMW, Yao’s Garbled Circuits
Readings: GMW protocol: link1 (Section 3.2), link2; Yao’s garbled circuits: link1 (Section 3.1), link2, link3
Presenter: Olivier Binette (slides)
Blog post: Anurag Kashyap, Rahul Ramesh (blog post*)
Lecture 12, 1st March: ABY
Readings: ABY
Presenter: Grayson York (slides)
Blog post: Norah Tan, Qiulin Li (blog post*)
4. Using Trusted Hardware and MPC
Lecture 13, 3rd March: Trusted Hardware
Presenter: Matthew Lentz (slides)
Blog post: Haozhan Sun, Yanping Zhang (blog post*)
Lecture 14, 8th March: Obliviousness + MPC
Readings: Secure Two-Party Computation in Sublinear (Amortized) Time
Presenter: Yanping Zhang (slides)
Blog post: Yanping Zhang, Rahul Ramesh (blog post*)
Lecture 15, 15th March: Efficient MapReduce Under SGX, GraphSC
Readings: MapReduce Obliviousness, GraphSC
Presenters: Haozhan Sun (slides), Sarisht Wadhwa (slides)
Blog post: Grayson York, Qiaoyi Fang (blog post*)
Lecture 16, 17th March: Private Contact Discovery
Readings: Private contact discovery
Presenter: Omar AlSughayer (slides)
Blog post: Jian Yao, Yuqing Zhang (blog post*)
5. Searchable Encryption
Lecture 17, 22nd March: Introduction to Searchable Encryption
Readings: Dynamic Searchable Symmetric key encryption, Dynamic Searchable Encryption in Very-Large Databases
Presenters: Chenghong Wang, Anurag Kashyap
Blog post: Sarisht Wadhwa, David Fischer
Lecture 18, 24th March: Inference Attacks, Leakage Abuse Attacks
Readings: Inference attacks, Leakage abuse attacks
Presenters: Qiaoyi Fang, Huashuo Zhang
Blog post: Chenghong Wang, Norah Tan
Lecture 17, 22nd March: ZK Proofs
Readings: http://www.cs.umd.edu/~jkatz/gradcrypto2/NOTES/lecture17.pdf (Section 2), http://www.cs.umd.edu/~jkatz/gradcrypto2/NOTES/lecture23.pdf (Section 3.1), https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf (Chapter 4), https://eprint.iacr.org/2013/073.pdf
Presenters: Qiaoyi Fang (slides), Anurag Kashyap (slides)
Blog post: Sarisht Wadhwa, David Fischer (blog post *)
Lecture 18, 24th March: Introduction to Searchable Encryption, Inference Attacks
Readings: Dynamic Searchable Symmetric key encryption
Presenters: Chenghong Wang
Blog post: Chenghong Wang, Norah Tan (blog post*)
Lecture 19, 29th March: File-Injection Attacks
Readings: File-injection attacks
Presenter: Qiulin Li (slides)
Blog post: Weilie Lin, Chenghong Wang (blog post *)
6. Contact Tracing
Lecture 20, 31st March: Introduction to Contact Tracing, TraceTogether + Apple-Google APIs, Hamagen
Readings: Apple-Google APIs, TraceTogether, Hamagen: Proposal to Israel’s ministry of health
Presenter: Jian Yao (slides) Yuqing Zhang
Blog post: George Wang, Qiulin Li (blog post *)
Lecture 21, 5th April: Contact Tracing Approaches
Readings: Different contact tracing approaches
Presenter: Rahul Ramesh (slides)
Blog post: Jian Yao, Omar AlSughayer (blog post *)
7. Consensus
Lecture 22, 7th April: Introduction to Consensus, Bitcoin
Readings: Intro_video1, Intro_video2, Nakamoto analysis
Presenter: Kartik Nayak
Blog post: David Fischer, Ajay Dheeraj
Lecture 23, 14th April: Algorand
Readings: Algorand: link1, link2
Presenter: Ajay Dheeraj, George Wang (slides)
Blog post: Olivier, Sarisht Wadhwa
Lecture 24, 19th April: Dolev-Strong, FLM Lower Bound
Readings: Dolev-Strong protocol; Lower bound on setup assumptions: link1, link2;
Presenter: Andy Demma, Weilie Lin, David Fischer
Blog post: Qiaoyi Fang, Yuqing Zhang
Lecture 25, 21st April:
Presenter:
Blog post: Weilie Lin, Ajay Dheeraj
*The blog posts are written by the students and not proofread by the instructor.
Timelines
- Project proposal due on Friday, 26th February
- Blog posts for Monday and Wednesday classes should be posted by Friday and Monday respectively.