Logistic: Mondays, Thursdays 11:45 - 1:25 pm. 6th Floor of 177 Huntington.
Contact me if you want to attend, access to building is restricted
Prerequisites: We will assume basic knowledge of crypto at the level of an undergrad crypto course. For example, we assume students have familiarity with one way functions, symmetric and public key encryption, reduction-based proofs of security. If you are unfamiliar with some of these topics, it may still be possible to take the course with some additional self-learning to catch up.
Class/Date | Topic Covered | Resources | Notes/Slides |
1/8 | Learning with Errors (LWE), Regev Encryption | MIT Course Notes Chris Peikert Tutorial | notes |
1/11 | Fully Homomorphic Encryption, Gentry-Sahai-Waters FHE | Paper Simons Video Vaikuntanathan Course Notes | notes |
1/18 | Trapdoors and Fully Homomorphic Signatures | GPV Trapdoors, MP Trapdoors, FHS Paper Simons Video | notes |
1/22 | Attribute/Laconic Encryption: AB-LFE and ABE (Ethan Mook) | ABE paper LFE paper Simons Video | |
1/25 | Functional Encryption, (Reusable) Garbled Circuits and more | GC notes Reusable GC and FE paper | |
1/29 | Predicate Encryption and Bootstrapping (Ethan Mook) | PE paper Bootstrapping paper | |
2/1 | Multi-Key and Spooky FHE | Multi-Key FHE paper Spooky FHE paper Simons Talk | |
2/5 | Homomorphic Secret Sharing from DDH (LaKyah Tyner) | HSS Paper video | |
2/8 | Pseudorandom Correlation Generators (John Abascal) | PCG Paper video1 video2 | |
2/12 | Obfuscation I: Definitions, Impossibility and Applications (Jad Silbak) | resource | |
2/15 | Obfuscation II: Approaches via FE and XIO (Manu Kondapaneni) | XiO Paper BV | |
2/22 | Obfuscation III: Construction from Well-Founded Assumptions (Manu Kondapaneni) | JLS Paper video | |
2/26 | Compute-and-Compare (Locakble) Obfuscation (LaKyah Tyner) | paper Simons video | |
2/29 | Other Approaches to Obfuscation and Witness Encryption (Megan Chen) | Directed Encoding WE from Evasive LWE | |
3/11 | Laconic OT and IBE from DDH (Ryan Little) | LOT paper IBE paper | |
3/14 | Private Information Retreival (PIR) with Preprocessing (Michelle Thalakottur) | Simple PIR PIANO | |
3/18 | Doubly Efficient PIR | DEPIR Paper video | |
3/21 | Non-Interactive ZK from LWE (Michelle Thalakottur) | paper 1 paper 2 video | |
3/25 | Succinct Non-Interactive Arguments (Cody Freitag) | SNARGs from LWE | |
3/28 | Two Round MPC from OT (Cody Freitag) | paper1 paper2 | |
4/1 | TBD (John Abascal) | resource | |
4/4 | TBD (Megan Chen) | resource | |
4/8 | TBD (Ryan Little) | resource | |
4/11 | TBD (Jad Silbak) | resource | |
4/15 | TBD | resource |
Related courses and workshops:
Simons Workshop on Lattices
Simons Bootcamp
Simons Obfuscation Workshop
David Wu's class at UT Austin
Vinod Vaikuntanathan's class at MIT
Shweta Agrawal's class at IIT Madras