Course detail
Cryptologic Protocol Theory
FEKT-XPC-CPTAcad. year: 2022/2023
The course contains the introduction into advanced cryptography and provides the students with the information about basic cryptographic primitives and schemes. In particular, the commitment schemes, interactive proof systems, zero-knowledge protocols, sigma protocols, interactive and non-interactive proof of knowledge protocols, group signatures and advanced systems like eCash and attribute-based credentials are covered.
Language of instruction
Number of ECTS credits
Mode of study
Guarantor
Department
Learning outcomes of the course unit
Explain in English the principles of cryptographic commitments, zero-knowledge protocols and sigma protocols.
Design the interactive proof of knowledge protocols.
Use the commitment schemes in complex cryptosystems.
Evaluate speed and computational efficiency of standard proof of knowledge protocols.
Explain in English the principles of attribute authentication systems and eCash systems.
Prerequisites
Co-requisites
Planned learning activities and teaching methods
Assesment methods and criteria linked to learning outcomes
The maximum of 40 points is given upon completion of the tests in laboratories. The requirements on the completion of the tasks in laboratories are described in the annual supervisor’s notice. The maximum of 60 points can be gained during the final exam.
Course curriculum
1. Introduction to modern cryptography, Number Theory.
2. Modular arithmetics, Algebraic structures.
3. Basic cryptographic primitives overview.
4. Elliptic curve cryptography.
5. Bilinear pairing.
6. Protocols using bilinear pairing.
7. Commitment schemes.
8. Zero-knowledge protocols.
9. Sigma protocols.
10. Sigma protocols II.
11. Group signatures.
12. Attribute-based credentials.
Work placements
Aims
Specification of controlled education, way of implementation and compensation for absences
Recommended optional programme components
Prerequisites and corequisites
Basic literature
DAMGAARD, I. On Σ-protocols [online]. Dostupné z: https://cs.au.dk/~ivan/CPT.html (EN)
GARRETT, Paul. Making, breaking codes: an introduction to cryptology. Vyd. 1. Upper Saddle River: Prentice Hall, 2001, xix, 523 s. ISBN 01-303-0369-0. (EN)
MENEZES, Alfred J. Handbook of applied cryptography. Vyd. 1. Boca Raton: CRC Press, 1997, 780 s. ISBN 08-493-8523-7. Online https://cacr.uwaterloo.ca/hac/. (EN)
OCHODKOVÁ, Eliška. Matematické základy kryptografických algoritmů [online]. [cit. 2013-06-11]. Dostupné z: http://mi21.vsb.cz/sites/mi21.vsb.cz/files/unit/mat_zaklady_kryptografickych_algoritmu.pdf (CS)
STALLINGS, William. Cryptography and network security: principles and practice. Seventh edition. xix, 731 pages. ISBN 9781292158587. (EN)
Recommended reading
Elearning
Classification of course in study plans
- Programme BPC-IBE Bachelor's 3 year of study, summer semester, compulsory
Type of course unit
Lecture
Teacher / Lecturer
Syllabus
2. Přehled anglické terminologie
3. Přehled základních kryptografických primitiv
4. Kryptografické závazky
5. Využití kryptografických závazků v konstrukci protokolů
6. Interaktivní důkazové systémy
7. Protokoly s nulovou znalostí
8. Sigma protokoly
9. Sigma protkoly II
10. Interaktivní a neinteraktivní důkazy znalosti
11. Integrace primitiv ve vyšší systémy
12. Skupinové podpisy
13. Atributová pověření
Fundamentals seminar
Teacher / Lecturer
Syllabus
2. Přehled anglické terminologie
3. Přehled základních kryptografických primitiv
4. Kryptografické závazky
5. Využití kryptografických závazků v konstrukci protokolů
6. Interaktivní důkazové systémy
7. Protokoly s nulovou znalostí
8. Sigma protokoly
9. Sigma protkoly II
10. Interaktivní a neinteraktivní důkazy znalosti
11. Integrace primitiv ve vyšší systémy
12. Skupinové podpisy
13. Atributová pověření
Elearning