Obsah

5. Kryptografické protokoly

Zadání

Kryptografické protokoly, způsoby ustavení kryptografických klíčů, protokoly s nulovým rozšířením znalostí. Kvantová kryptografie.

Vypracování

Kryptografické protokoly

Dalsi protokoly (asi jen pro uplnost, z IV054)

Autentizace

Ustavení klíče

Distribuce veřejných klíčů

Materiály

PV079 Applied ryptography
Summarizing information from Handbook of Applied cryptography (challenge-response protocols, zero-knowledge, auth protocols)
https://is.muni.cz/auth/el/1433/podzim2012/PV079/um/PV079_2012_L06.pdf https://is.muni.cz/auth/el/1433/podzim2012/PV079/um/PV079_2012_L07.pdf

IV054 Codes, Cryptography and Cryptographical Protocols
http://www.fi.muni.cz/usr/gruska/crypto12/crypto_09.pdf

Zero-knowledge proofs protocols:
http://www.cs.cmu.edu/~ryanw/crypto/lec6.pdf http://www.fi.muni.cz/usr/gruska/crypto12/crypto_10.pdf

CS276 Lecture 24: Zero Knowledge Protocols
http://lucatrevisan.wordpress.com/2009/05/11/cs276-lecture-24/

CS276 Lecture 25: Quadratic Residuosity and Zero Knowledge
http://lucatrevisan.wordpress.com/2009/05/04/cs276-lecture-25/

CS276 Lecture 26: Quadratic Residuosity and Proofs of Knowledge
http://lucatrevisan.wordpress.com/2009/05/04/cs276-lecture-26/

CS276 Lecture 27: Computational Zero Knowledge
http://lucatrevisan.wordpress.com/2009/05/16/cs276-lecture-27/

CS276 Lecture 28: the CZK 3-Coloring Protocol
http://lucatrevisan.wordpress.com/2009/05/06/cs276-lecture-28/

All nicely summarized in following book:
Luca Trevisan, Cryptography, Lecture Notes from CS276, Spring 2009, Stanford University
http://theory.stanford.edu/~trevisan/books/crypto.pdf

Kvantová kryptografia

Materiály

Základy I

Základy II

BB-84

Iné

Kvantove protokoly:

In coin-flipping protocols, Alice and Bob can flip a coin over a distance in such a way that neither of them can determine the outcome of the flip but both can agree on the outcome in spite of the fact that they do not trust each other.

In bit commitment protocols Alice can choose a bit and get committed to it in the following sense: Bob has no way of learing Alice's commitment and Alice has no way of changing her commitment.

In 1-out-2 oblivious transfer protocols Alice trasmits two messages m_1 and m_2 to Bob who can chose whether to receive m_1 or m_2, but cannot learn both, and Alice has no idea which of them Bob has received.

In standard oblivious transfer protocols Alice can send a message to Bob in such a way that Bob receives the message with probability 1/2 and a garbage with probability 1/2. Moreover, at the end Bob knows whether he got a message or a garbage, but Alice has no idea which of them Bob has received.