Projects
Zero Knowledge Proof systems [Saturday]
The 9th BIU Winter School: https://cyber.biu.ac.il/event/the-9th-biu-winter-school-on-cryptography/?fbclid=IwAR1c3c4MsI00hZR1Q1lkKwApfxM2lsIP5wMB55SNyyc-I-drBYunIVKfWEU
Foundations of Cryptography by Yehuda Lindell, 2017.
Chapter 6 of [Book] Carmit Hazay, Yehuda Lindell (auth.) - Efficient Secure Two-Party Protocols_ Techniques and Constructions-Springer-Verlag Berlin Heidelberg (2010).pdf by Hazay and Lindell, 2010
Privacy-Preserving Deep Learning [Sunday]
Cryptography Made Simple (Wednesday evening)
Nigel P Smart books: Cryptography Made Simple
https://documents.uow.edu.au/~hduong/Crypto-Made-Simple.html
Secure Multiparty Computation (MPC): [Thursday]
[Book] Carmit Hazay, Yehuda Lindell (auth.) - Efficient Secure Two-Party Protocols_ Techniques and Constructions-Springer-Verlag Berlin Heidelberg (2010).pdf by Hazay and Lindell, 2010
1st BIU Winter school: https://cyber.biu.ac.il/event/the-1st-biu-winter-school/?fbclid=IwAR1pdAd2IPH0J7dY6lu026b3GERxMw1Kty9NnD2c8f7m2uqheFgsZEk3BWs
How To Simulate It - A Tutorial on the Simulation Proof Technique by Yehuda Lindell
Privacy Preserving Data Mining: [Tuesday]:
Link Seminar: 840879
[Book][Aggrawal2015] DataMining_TheTextBook.pdf by Aggarwal, Charu C. [Other link]
Puncturable Primitives:
Witness Encryption
Witness Encryption and its Applications by Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption by James Bartusek , Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai and Mark Zhandry
Witness Encryption from Instance Independent Assumptions by Craig Gentry, Allison Lewko and Brent Waters
Timed-release Encryption
How to build time-lock encryption by Jia Liu, Tibor Jager, Saqib A. Kakvi and Bogdan Warinschi
Timed-Release Encryption Revisited by by Sherman S. M. Chow, S. M. Yiu
Revocable quantum timed-release encryption by Dominique Unruh
Security Proof Techniques:
Game-based Proof: Sequences of games: a tool for taming complexity in security proofs by Victor Shoup (or here)
Simulation-based Proof: How To Simulate It - A Tutorial on the Simulation Proof Technique by Yehuda Lindell
UC-based Proof: Universally Composable Security: A New Paradigm for Cryptographic Protocols by Ran Cannetti
Security Reduction: [Book] Introduction to Security Reduction by Fuchun Guo, Willy Susilo, Yi Mu