CS 7870 - Seminar in TCS: Computing on Encrypted Data
Spring 2024

Course Description

The course will cover various advanced topics in cryptography, at the forefront of current research. The main themes will be secure computation over encrypted data.

Logistic: Mondays, Thursdays 11:45 - 1:25 pm. 6th Floor of 177 Huntington.
Contact me if you want to attend, access to building is restricted

Prerequisites: We will assume basic knowledge of crypto at the level of an undergrad crypto course. For example, we assume students have familiarity with one way functions, symmetric and public key encryption, reduction-based proofs of security. If you are unfamiliar with some of these topics, it may still be possible to take the course with some additional self-learning to catch up.

Grading

Each student will prepare (roughly) 2 lectures for the course by reading the relevant papers and presenting the material.

Schedule (Tentative)

Class/Date Topic Covered Resources Notes/Slides
1/8 Learning with Errors (LWE), Regev Encryption MIT Course Notes
Chris Peikert Tutorial
notes
1/11 Fully Homomorphic Encryption, Gentry-Sahai-Waters FHE Paper
Simons Video
Vaikuntanathan Course Notes
notes
1/18 Trapdoors and Fully Homomorphic Signatures GPV Trapdoors, MP Trapdoors, FHS Paper
Simons Video
notes
1/22 Attribute/Laconic Encryption: AB-LFE and ABE (Ethan Mook) ABE paper
LFE paper
Simons Video
1/25 Functional Encryption, (Reusable) Garbled Circuits and more GC notes
Reusable GC and FE paper
1/29 Predicate Encryption and Bootstrapping (Ethan Mook) PE paper
Bootstrapping paper
2/1 Multi-Key and Spooky FHE Multi-Key FHE paper
Spooky FHE paper
Simons Talk
2/5 Homomorphic Secret Sharing from DDH (LaKyah Tyner) HSS Paper
video
2/8 Pseudorandom Correlation Generators (John Abascal) PCG Paper
video1
video2
2/12 Obfuscation I: Definitions, Impossibility and Applications (Jad Silbak) resource
2/15Obfuscation II: Approaches via FE and XIO (Manu Kondapaneni) XiO Paper
BV
2/22Obfuscation III: Construction from Well-Founded Assumptions (Manu Kondapaneni)JLS Paper
video
2/26 Compute-and-Compare (Locakble) Obfuscation (LaKyah Tyner) paper
Simons video
2/29Other Approaches to Obfuscation and Witness Encryption (Megan Chen)Directed Encoding
WE from Evasive LWE
3/11 Laconic OT and IBE from DDH (Ryan Little) LOT paper
IBE paper
3/14 Private Information Retreival (PIR) with Preprocessing (Michelle Thalakottur)Simple PIR
PIANO
3/18Doubly Efficient PIRDEPIR Paper
video
3/21Non-Interactive ZK from LWE (Michelle Thalakottur)paper 1
paper 2
video
3/25 Succinct Non-Interactive Arguments (Cody Freitag)SNARGs from LWE
3/28Two Round MPC from OT (Cody Freitag)paper1
paper2
4/1TBD (John Abascal)resource
4/4TBD (Megan Chen)resource
4/8TBD (Ryan Little) resource
4/11TBD (Jad Silbak) resource
4/15TBDresource

Resources

General crypto resources:
Introduction to Modern Cryptography by Katz and Lindell.
Graduate Crypto Book by Dan Boneh and Victor Shoup.
Lecture Notes by Rafael Pass and Abhi Shelat.
Lecture notes by Yevgeniy Dodis
Lecture notes by Chris Peikert
Lecture notes by Boaz Barak.
Slides by Stefan Dziembowski.
Slides,Notes by Gil Segev.

Related courses and workshops:
Simons Workshop on Lattices
Simons Bootcamp
Simons Obfuscation Workshop
David Wu's class at UT Austin
Vinod Vaikuntanathan's class at MIT
Shweta Agrawal's class at IIT Madras