Course detail
Cryptologic Protocol Theory
FEKT-MPA-CPTAcad. year: 2021/2022
The course contains the introduction into advanced cryptography and provides the students with the information about basic cryptographic primitives and schemes. In particular, the commitment schemes, interactive proof systems, zero-knowledge protocols, sigma protocols, interactive and non-interactive proof of knowledge protocols, group signatures and advanced systems like eCash and attribute-based credentials are covered.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Explain in English the principles of cryptographic commitments, zero-knowledge protocols and sigma protocols.
Design the interactive proof of knowledge protocols.
Use the commitment schemes in complex cryptosystems.
Evaluate speed and computational efficiency of standard proof of knowledge protocols.
Explain in English the principles of attribute authentication systems and eCash systems.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
Course curriculum
1. Introduction to modern cryptography, Number Theory.
2. Modular arithmetics, Algebraic structures.
3. Basic cryptographic primitives overview.
4. Elliptic curve cryptography.
5. Bilinear pairing.
6. Protocols using bilinear pairing.
7. Commitment schemes.
8. Zero-knowledge protocols.
9. Sigma protocols.
10. Sigma protocols II.
11. Group signatures.
12. Attribute-based credentials.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
STALLINGS, W. Cryptography and network security: principles and practice. Seventh edition. (EN)
Recommended reading
Elearning
Classification of course in study plans
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Terminology overview.
3. Basic cryptographic primitives overview.
4. Commitment schemes.
5. Use of cryptographic commitment schemes in protocol construction.
6. Interactive proof systems.
7. Zero-knowledge protocols.
8. Sigma protocols.
9. Sigma protocols II.
10. Interactive and non-interactive proofs of knowledge.
11. Integration of primitives into advanced systems.
12. Group signatures.
13. Attribute-based credentials.
Exercise in computer lab
Teacher / Lecturer
Syllabus
2. Computational tools for modern cryptography.
3. Basic arithmetic operations.
4. Cryptographic commitment schemes.
5. Protocols using commitment schemes.
6. Interactive proof systems.
7. Construction of zero-knowledge protocols and formal proofs.
8. Optimization of zero-knowledge proofs.
9. Group signatures.
10. Complex cryptographic systems.
Elearning