CS 7870 - Seminar in TCS: Computing on Encrypted Data
Spring 2024

Course Description

The course will cover various advanced topics in cryptography, at the forefront of current research. The main themes will be secure computation over encrypted data.

Logistic: Mondays, Thursdays 11:45 - 1:25 pm. 6th Floor of 177 Huntington.
Contact me if you want to attend, access to building is restricted

Prerequisites: We will assume basic knowledge of crypto at the level of an undergrad crypto course. For example, we assume students have familiarity with one way functions, symmetric and public key encryption, reduction-based proofs of security. If you are unfamiliar with some of these topics, it may still be possible to take the course with some additional self-learning to catch up.


Each student will prepare (roughly) 2 lectures for the course by reading the relevant papers and presenting the material.

Schedule (Tentative)

Class/Date Topic Covered Resources Notes/Slides
1/8 Learning with Errors (LWE), Regev Encryption MIT Course Notes
Chris Peikert Tutorial
1/11 Fully Homomorphic Encryption, Gentry-Sahai-Waters FHE Paper
Simons Video
Vaikuntanathan Course Notes
1/18 Trapdoors and Fully Homomorphic Signatures GPV Trapdoors, MP Trapdoors, FHS Paper
Simons Video
1/22 Attribute/Laconic Encryption: AB-LFE and ABE (Ethan Mook) ABE paper
LFE paper
Simons Video
1/25 Functional Encryption, (Reusable) Garbled Circuits and more GC notes
Reusable GC and FE paper
1/29 Predicate Encryption and Bootstrapping (Ethan Mook) PE paper
Bootstrapping paper
2/1 Multi-Key and Spooky FHE Multi-Key FHE paper
Spooky FHE paper
Simons Talk
2/5 Homomorphic Secret Sharing from DDH (LaKyah Tyner) HSS Paper
2/8 Pseudorandom Correlation Generators (John Abascal) PCG Paper
2/12 Obfuscation I: Definitions, Impossibility and Applications (Jad Silbak) resource
2/15Obfuscation II: Approaches via FE and XIO (Manu Kondapaneni) XiO Paper
2/22Obfuscation III: Construction from Well-Founded Assumptions (Manu Kondapaneni)JLS Paper
2/26 Compute-and-Compare (Locakble) Obfuscation (LaKyah Tyner) paper
Simons video
2/29Other Approaches to Obfuscation and Witness Encryption (Megan Chen)Directed Encoding
WE from Evasive LWE
3/11 Laconic OT and IBE from DDH (Ryan Little) LOT paper
IBE paper
3/14 Private Information Retreival (PIR) with Preprocessing (Michelle Thalakottur)Simple PIR
3/18Doubly Efficient PIRDEPIR Paper
3/21Non-Interactive ZK from LWE (Michelle Thalakottur)paper 1
paper 2
3/25 Succinct Non-Interactive Arguments (Cody Freitag)SNARGs from LWE
3/28Two Round MPC from OT (Cody Freitag)paper1
4/1TBD (John Abascal)resource
4/4TBD (Megan Chen)resource
4/8TBD (Ryan Little) resource
4/11TBD (Jad Silbak) resource


General crypto resources:
Introduction to Modern Cryptography by Katz and Lindell.
Graduate Crypto Book by Dan Boneh and Victor Shoup.
Lecture Notes by Rafael Pass and Abhi Shelat.
Lecture notes by Yevgeniy Dodis
Lecture notes by Chris Peikert
Lecture notes by Boaz Barak.
Slides by Stefan Dziembowski.
Slides,Notes by Gil Segev.

Related courses and workshops:
Simons Workshop on Lattices
Simons Bootcamp
Simons Obfuscation Workshop
David Wu's class at UT Austin
Vinod Vaikuntanathan's class at MIT
Shweta Agrawal's class at IIT Madras