Official course description, subject to change:
Basic info last published 1/10-20

Cryptographic Computation and Blockchain, MSc

Course info
Language:
English
ECTS points:
7.5
Course code:
KSCRCOB1KU
Participants max:
18
Offered to guest students:
yes
Offered to exchange students:
yes
Offered as a single subject:
yes
Price (single subject):
10625 DKK (incl. vat)
Programme
Level:
MSc. Master
Programme:
MSc in Computer Science
Staff
Course manager
Associate Professor
Course semester
Semester
Forår 2021
Start
25 January 2021
End
28 May 2021
Exam
Abstract
This course will introduce basic concepts and techniques for designing and analysing cryptographic protocols with a focus on privacy preserving computation and blockchain protocols. We will cover both the main constructions of such protocols and the theoretical models used for proving their security.
Description

In a modern cryptographic protocol, a group of users perform complex tasks that require privacy and/or authenticity guarantees against an attacker by exchanging messages and using cryptographic schemes. These protocols can be used for a multitude of applications, such as computing on private data you cannot see and agreeing on data with the guarantee that it becomes immutable. In order to construct powerful cryptographic protocols and mathematically prove that they are indeed secure, we use special techniques and theoretical models different from those used for obtaining simpler cryptographic primitives (such as public key encryption).

In this course, we will introduce both the main techniques for constructing cryptographic protocols and the theoretical models used for mathematically proving their security. We will focus on protocols for secure multiparty computation (MPC) and blockchain based consensus, which are now used for many applications. Besides exploring the features  that these protocols provide and how they work, we will also understand why they securely provide these features and how to prove their security.

We will cover the following topics:
  • Adversarial Models
  • Simulation Based Proofs
  • Secure Multiparty Computation (MPC)
  • Secret Sharing
  • Commitments
  • Oblivious Transfer
  • Zero Knowledge Proofs
  • Byzantine Agreement
  • Blockchains based on Proof-of-Work
  • Blockchains based on Proof-of-Stake
  • Blockchain Applications
Formal prerequisites

1. Discrete Mathematics
2. Security 1

Students should be familiar with basic cryptography (hash functions, pseudorandom functions, message authentication codes, public key encryption and digital signatures) and discrete mathematics (including models of computation, combinatorics, probability and number theory). 

Intended learning outcomes

After the course, the student should be able to:

  • Describe security guarantees of a cryptographic protocol
  • Develop simulation based security definitions
  • Describe building blocks for cryptographic protocols (commitments, oblivious transfer, zero knowledge proof)
  • Prove the security of building blocks for cryptographic protocols (commitments, oblivious transfer, zero knowledge proof)
  • Describe Secure Multiparty Computation protocols
  • Prove the security of Secure Multiparty Computation protocols
  • Identify the properties of consensus protocols
  • Describe protocols for Proof-of-Work based Blockchains
  • Prove the security of protocols for Proof-of-Work based Blockchains
  • Describe protocols for Proof-of-Stake based Blockchains
  • Describe Blockchain Applications
Ordinary exam
Exam type:
D: Submission of written work with following oral, Internal (7-point scale)
Exam variation:
D2G: Submission for groups with following oral exam supplemented by the submission. Shared responsibility for the report.