Professional Documents
Culture Documents
Dan Boneh
Introduction
What is
cryptography?
Dan Boneh
Crypto core
Talking
to Alice
Talking
to Bob
Alice
Bob
attacker???
Secure communication:
m1
m2
confidentiality and integrity
Dan Boneh
Digital signatures
Anonymous communication
Alice
signature
Who did I
just talk to?
Alice
Bob
Dan Boneh
Digital signatures
Anonymous communication
Anonymous digital cash
Can I spend a digital coin without anyone knowing who I
am?
Who
How to prevent double spending?
was
1$
Alice
Internet
(anon. comm.)
that?
Dan Boneh
Protocols
Elections
Private auctions
Dan Boneh
Protocols
Elections
Private auctions
trusted
authorit
y
Thm: anything the can done with trusted auth. can also
be done without
Secure multi-party computation
Dan Boneh
Crypto magic
Privately outsourcing computation
search
query
What did
she search
for?
E[ query ]
Alice
E[ results ]
results
Zero knowledge
N=pq
Alice
(proof of knowledge)
???
Bob
Dan Boneh
A rigorous science
The three steps in cryptography:
Precisely specify threat model
Propose a construction
Prove that breaking construction under
threat mode will solve an underlying hard
problem
Dan Boneh
End of Segment
Dan Boneh