Course - Identity-Based Cryptography - TM8111
TM8111 - Identity-Based Cryptography
About
Examination arrangement
Course content
The course will be given every second year, on demand, next time autumn 2020. Identity-Based Encryption (IBE) is a kind of public-key encryption in which the public key of a user is some unique information about the identity of the user that is publicly known (e.g. the user's email address). The idea was first proposed by Adi Shamir in 1984, and it appeared particularly attractive since there is no need to acquire an identity public key prior to encryption. Interestingly, an implementation of the idea was not given until 2001. Today, it is a vibrant field of research, as it is considered an alternative to the classical PKI infrastructure.
Learning outcome
A. Knowledge: After having completed the course, the students shall have obtained basic knowledge of the principles and methods which are employed in Identity Based Encryption (IBE): the security models, security proof techniques, different implementations, as well as some of the inherent problems that accompany this type of cryptographic schemes.
Learning methods and activities
Lectures, colloquia and discussions.
Final report based on the course material and the latest articles on identity-based encryption published on Eprint. Final oral exam that includes the presentation of the final report and answering oral questions. The grading rule is pass/fail. The minimum passing grade is 70/100 points (70%).
Compulsory assignments
- Final report
Specific conditions
Exam registration requires that class registration is approved in the same semester. Compulsory activities from previous semester may be approved by the department.
Recommended previous knowledge
Master's degree in ICT with emphasis on information security.
Course materials
1. Introduction to Identity-Based Encryption, Luther Martin, ARTECH HOUSE, INC, 2008,
2. Identity-Based Cryptography, Edited by Marc Joye, Thomson R&D, France, and, Gregory Neven IBM Zürich Research Laboratory, Switzerland, IOS Press, 2009,
3. Identity-Based Encryption, Sanjit Chatterjee, Palash Sarkar, Springer Science+Business Media, LLC 2011
Latest papers posted on Cryptology Eprint Archive
Version: 1
Credits:
7.5 SP
Study level: Doctoral degree level
Term no.: 1
Teaching semester: AUTUMN 2020
No.of lecture hours: 2
Lab hours: 2
No.of specialization hours: 8
Language of instruction: English
Location: Trondheim
- Safety and Reliability
- Telematics
- Technological subjects
Department with academic responsibility
Department of Information Security and Communication Technology
Phone:
Examination
Examination arrangement: Oral examination and Report
- Term Status code Evaluation form Weighting Examination aids Date Time Digital exam Room *
- Autumn ORD Approved report 40/100 A
-
Room Building Number of candidates - Autumn ORD Oral examination 60/100 D
-
Room Building Number of candidates
- * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
For more information regarding registration for examination and examination procedures, see "Innsida - Exams"