Topics in advanced Cryptography, Fall 2023

Course Description

In this course, we shall focus on some advanced topics at the intersection of game theory and cryptography.

Logistics

Lectures

Lecture Date Topic Class notes
1 Aug 21, 2023 Introduction to Games lect1.pdf
2 Aug 23, 2023 Solution concepts and equilibria lect2.pdf
3 Aug 28, 2023 Introduction to Mechanism Design lect3.pdf
4 Sep 4, 2023 Baysean games, Auctions lect4.pdf
5 Sep 6, 2023 Miscellaneous mechanisms: Fair division, matching, TFM lect5.pdf
6 Sep 11, 2023 Introduction to secure computing Introduction to MPC
7 Sep 13, 2023 Secure computation models Definitions,Security model(Ch5)
8 Sep 20, 2023 Yao's two party protocol Yao's Protocol, Proof of security, Additional resource
9 Sep 25, 2023 Bridging Game theory and cryptography Paper
10 Sep 27, 2023 Co-operative Game Theory lect11.pdf
11 Oct 4, 2023 Rational Secure Computation and Ideal Mechanism Design lect11.pdf
12 Oct 9, 2023 Rational Proofs lect12.pdf
13 Oct 11/16, 2023 Towards a Game Theoretic View of Secure Computation lect13.pdf
14 Oct 18/25, 2023 A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains lect14.pdf
15 Oct 25, 2023 Game Theoretic Notions of Fairness in Multi-Party Coin Toss lect15.pdf
16 Oct 30, 2023 Byzantine agreement with a rational adversary lect16.pdf
17 Nov 06/08, 2023 Fair Computation with Rational Players lect17.pdf
18 Nov 13, 2023 A Cryptographic Solution to a Game Theoretic Problem lect18.pdf
19 Nov 20, 2023 RPD: Cryptography Against Incentive-driven Adversaries lect19.pdf

Papers to present

1. Aditya (8/Nov): A Cryptographic Solution to a Game Theoretic Problem, Dodis, Halevi and Rabin, CRYPTO - 2000
2. Arun (4/Oct): Rational Secure Computation and Ideal Mechanism Design, Izmalkov, Micali, Lepinski, FOCS - 2005
3. Rationality and Adversarial Behavior in Multy-Party Computation, Lysyanskaya, Triandopoulos, Annual International Cryptology Conference - 2006
4. Rational Secret Sharing and Multiparty Computation, Halpern and Teague, STOC-2006
5. Cryptography and Game Theory, Kol and Naor, Ch 8, Algorithmic game theory 2007
6. Bridging Game Theory and Cryptography, J Katz, TCC-2008
7. Privacy-Aware Mechanism Design Nissim, Orlandi, Smorodinski, ACM-EC-2012
8. Shubh (6/Nov): Fair Computation with Rational Players Groce and Katz, Annual International Conference on the Theory and Applications of Cryptographic Techniques-2012
9. Bhargav (9/Oct): Rational Proofs Azar and Micali, STOC-2012
10. Bhavish (30/Oct): Byzantine agreement with a rational adversary, Groce, Katz, Thiruvengadam, Zikas, ICALP - 2012
11. Siddharth (20/Nov) RPD: Cryptography Against Incentive-driven Adversaries Garay, Katz, Maurer, FOCS-2013
12. Social rational secure multi-party computation Wang, Liu, Wang and Xu, Concurrency and Computation: Practice and Experience-2014
13. Shreya (11/Oct): Towards a Game Theoretic View of Secure Computation Asharov, Canneti and Hazay, Journal of cryptology-2016
14. Ugender (16/Oct): A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains Manshaei, Jadliwala, Maiti, Fooladgar, IEEE Access-2017
15. Sourabh (25/Oct, 15/Nov): Game Theoretic Notions of Fairness in Multi-Party Coin Toss Chung, Guo, Lin, Pass and Shi, TCC-2018
16. A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss Wu, Asharov and Shi, CRYPTO-2022
17. log*-Round Game-Theoretically Fair Leader Election Komargodski,Matsuo,Shi,Wu, CRYPTO-2022