TM8111 - Identity-Based Cryptography

About

Examination arrangement

Examination arrangement: Oral examination and Report
Grade: Passed/Failed

Evaluation form Weighting Duration Examination aids Grade deviation
Approved report 40/100 A
Oral examination 60/100 D

Course content

The course will be given every second year, on demand, next time autumn 2018. Identity-Based Encryption (IBE) is a kind of public-key encryption in which the public key of a user is some unique information about the identity of the user that is publicly known (e.g. the user's email address). The idea was first proposed by Adi Shamir in 1984, and it appeared particularly attractive since there is no need to acquire an identity public key prior to encryption. Interestingly, an implementation of the idea was not given until 2001. Today, it is a vibrant field of research, as it is considered an alternative to the classical PKI infrastructure.

Learning outcome

A. Knowledge: After having completed the course, the students shall have obtained basic knowledge of the principles and methods which are employed in Identity Based Encryption (IBE): the security models, security proof techniques, different implementations, as well as some of the inherent problems that accompany this type of cryptographic schemes.

Learning methods and activities

Lectures, colloquia and discussions.
Final report based on the course material and the latest articles on identity-based encryption published on Eprint. Final oral exam that includes the presentation of the final report and answering oral questions. The grading rule is pass/fail. The minimum passing grade is 70/100 points (70%).

Compulsory assignments

  • Final report

Specific conditions

Exam registration requires that class registration is approved in the same semester. Compulsory activities from previous semester may be approved by the department.

Course materials

1. “Introduction to Identity-Based Encryption”, Luther Martin, ARTECH HOUSE, INC, 2008,
2. “Identity-Based Cryptography”, Edited by Marc Joye, Thomson R&D, France, and, Gregory Neven IBM Zürich Research Laboratory, Switzerland, IOS Press, 2009,
3. “Identity-Based Encryption”, Sanjit Chatterjee, Palash Sarkar, Springer Science+Business Media, LLC 2011
Latest papers posted on Cryptology Eprint Archive

Timetable

Detailed timetable

Examination

Examination arrangement: Oral examination and Report

Term Statuskode Evaluation form Weighting Examination aids Date Time Room *
Autumn ORD Approved report 40/100 A
Spring ORD Approved report 40/100 A
Autumn ORD Oral examination 60/100 D
Spring ORD Oral examination 60/100 D
  • * The location (room) for a written examination is published 3 days before examination date.
If more than one room is listed, you will find your room at Studentweb.