PENN CIS 620, FALL 2007: FOUNDATIONS OF CRYPTOGRAPHY (original) (raw)


PENN CIS 620, FALL 2007: FOUNDATIONS OF CRYPTOGRAPHY

Prof Michael Kearns
mkearns@cis.upenn.edu
Mondays 12-3 PM
315 Levine Hall

URL for this page:www.cis.upenn.edu/~mkearns/Crypto


SEMINAR DESCRIPTION

In this seminar we will undertake a detailed study of the mathematical foundations of modern, complexity-based cryptography, as well as its connections with other topics in theoretical computer science, including computational learning theory, algorithmic game theory, and privacy-preserving data mining and inference. The emphasis of the seminar will be on the conceptual rather than the practical. As opposed to an "applied" cryptography or security seminar, we will be primarily interested in the broad possibilities for, and limits on, secure computation.

The first part of the seminar will be more structured and will closely followOded Goldreich'ssuperbFoundations of Cryptography, Volume I (Basic Tools).Topics to be covered include:


SEMINAR FORMAT, REQUIREMENTS, AND PREREQUISITES
The first portion of the seminar (based on Goldreich's book(s)) will be in what we might call "semi-" or "assisted" lecture format. I will structure the broad discussion and lecture a bit, but each week there will be one or more designated discussants whose role is to help present proofs or proof sketches/intutions, present additional material such as solutions to exercises in Goldreich, etc. Participants taking the seminar for credit will be expected to act as discussants.
The latter portion of the seminar, when we are examining applications of cryptographic tools to other areas such as computational learning theory, will be run in reading-group format, with different participants leading informal discussion of papers.
In order to allow plenty of time for leisurely discussion, the seminar will meet once a week on Mondays from 12 to 3. Lunch will be served.
Participants should be comfortable with the basics of computational complexity, design and analysis of algorithms, and probability theory. Some exposure to number theory will be helpful at certain points but is not required.
Auditors and occasional participants are welcome. Strong undergraduates are also encouraged to join.

DETAILED MEETING SCHEDULE
Mon Sep 10
In the first meeting, I will go over course mechanics and present a detailed overview of the topics to be covered.
READING: Goldreich Chapter 1.
Mon Sep 17 ==> Wed Sep 19: Due to a longstanding commitment I have in D.C., this week's meeting will be held Wed Sep 19 from 12 to 3 PM.
This week's assistant is Praveen Srinivasan. Topics to be covered this week:

Mon Nov 5
Computational learning theory and cryptography, continued.

Mon Nov 12
This week we will examine research at the intersection of game theory and cryptography, assisted by Jinsong, Jenn, and Andrew.

Mon Nov 19
This week will examine the logic-based approaches to security and how they relate to the computational view, with Jeff Vaughan assisting.

Mon Nov 26
For our final meeting, we will cover papers on privacy-preserving data mining and code obfuscation, assisted by Mark Dredze. We'll use the remaining time to hear Andrew Clausen discuss some of his own research.

Mon Dec 3
NO MEETING. I am proud to announce that this is probably the first cryptography seminar ever to be cancelled due to NIPS:). Enjoy your holidays and thanks for a great semester --- I learned a lot.


ADDITIONAL READINGS

Here I will collect papers from the literature that may eventually migrate onto our meeting schedule.

Cryptography and Computational Learning Theory

Cryptography and Algorithmic Game Theory

Privacy-Preserving Data Mining and Inference