How do you authenticate online without disclosing any identity or password? Could a cloud service process encrypted data? How can individuals safeguard their privacy against ubiquitous online services? How do cryptographic voting protocols solve the conflicting goals of authorizing all voters while maintaining their privacy? Will Big Brother always be able to watch every one of your actions on the Internet, or can you hide your data from future cloud systems? Can one distribute a cryptographic operation among a group of participants such that any minority of them may try to cheat but will not succeed? How can two millionaires compute who is richer without disclosing their wealth to each other?
This course gives an introduction to the amazing world of cryptographic protocols with multilateral security. They realize such diverse goals as zero-knowledge proofs, secure multi-party computation, private online elections, auctions without trusted parties, distributed threshold cryptosystems and more. These methods have been developed over the last decades and start to find applications on the Internet today, ranging from nation-wide electronic voting and secure cloud platforms to cryptocurrencies and blockchains.
T1 – Distributed Systems |
T4 – Logic
Christian Cachin |
The course page in ILIAS can be found at https://ilias.unibe.ch/goto_ilias3_unibe_crs_1841374.html.
Schedules and Rooms
|Schedule||Wednesday, 14:15 - 17:00|
|Location||UniBE, Engehaldenstrasse 8|