course-details-portlet

TM8111 - Identity-Based Cryptography

About

Examination arrangement

Examination arrangement: Oral examination and Report
Grade: Passed/Failed

Evaluation form Weighting Duration Examination aids Grade deviation
Approved report 40/100 A
Oral examination 60/100 D

Course content

The course will be given every second year, on demand, next time autumn 2020. Identity-Based Encryption (IBE) is a kind of public-key encryption in which the public key of a user is some unique information about the identity of the user that is publicly known (e.g. the user's email address). The idea was first proposed by Adi Shamir in 1984, and it appeared particularly attractive since there is no need to acquire an identity public key prior to encryption. Interestingly, an implementation of the idea was not given until 2001. Today, it is a vibrant field of research, as it is considered an alternative to the classical PKI infrastructure.

Learning outcome

A. Knowledge: After having completed the course, the students shall have obtained basic knowledge of the principles and methods which are employed in Identity Based Encryption (IBE): the security models, security proof techniques, different implementations, as well as some of the inherent problems that accompany this type of cryptographic schemes.

Learning methods and activities

Lectures, colloquia and discussions.
Final report based on the course material and the latest articles on identity-based encryption published on Eprint. Final oral exam that includes the presentation of the final report and answering oral questions. The grading rule is pass/fail. The minimum passing grade is 70/100 points (70%).

Compulsory assignments

  • Final report

Specific conditions

Exam registration requires that class registration is approved in the same semester. Compulsory activities from previous semester may be approved by the department.

Course materials

1. “Introduction to Identity-Based Encryption”, Luther Martin, ARTECH HOUSE, INC, 2008,
2. “Identity-Based Cryptography”, Edited by Marc Joye, Thomson R&D, France, and, Gregory Neven IBM Zürich Research Laboratory, Switzerland, IOS Press, 2009,
3. “Identity-Based Encryption”, Sanjit Chatterjee, Palash Sarkar, Springer Science+Business Media, LLC 2011
Latest papers posted on Cryptology Eprint Archive

More on the course
Facts

Version: 1
Credits:  7.5 SP
Study level: Doctoral degree level

Coursework

Term no.: 1
Teaching semester:  AUTUMN 2020

No.of lecture hours: 2
Lab hours: 2
No.of specialization hours: 8

Language of instruction: English

Location: Trondheim

Subject area(s)
  • Safety and Reliability
  • Telematics
  • Technological subjects
Contact information
Course coordinator: Lecturer(s):

Department with academic responsibility
Department of Information Security and Communication Technology

Phone:

Examination

Examination arrangement: Oral examination and Report

Term Status code Evaluation form Weighting Examination aids Date Time Digital exam Room *
Autumn ORD Approved report 40/100 A
Room Building Number of candidates
Autumn ORD Oral examination 60/100 D
Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
Examination

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU