For your final project, you can do one of the following.
You will need to write a short survey (due Apr 27) and give a 15 minute presentation on the last week of classes (to be scheduled). For your presentation you can either use slides or the whiteboard.
You can work individually or in pairs. Please let me know about your project proposal by email by Fri Mar 25. You can write a paragraph or two about your proposed topic.
12.00-12.15 | Hing Yin Tsang | One-way functions and pseudorandomness |
12.15-12.30 | Li Fan | One-way functions and pseudorandomness |
12.30-12.45 | Guo Siyao | Hardness amplification and extractors |
12.45-1.30 | break | |
1.30-1.45 | Chi Wang Chow | Subset sum based cryptosystems |
1.45-2.00 | Chuk Hin Chen | Homomorphic encryption |
2.00-2.15 | Xiaolei Wang | Program obfuscation |
2.15-2.30 | Li Jiang | Security for embedded systems |
11.30-11.45 | Zichao Yang | Cryptography and game theory 1 |
11.45-12.00 | Yeung Yuen Chuen | Cryptography and game theory 2 |
12.00-12.15 | Kwok Tsz Chiu | Cryptography and game theory 3 |
12.15-12.30 | Xie Hong, Yang Chen | Cryptography and game theory 4 |
12.30-1.15 | break | |
1.15-1.30 | Wong Chung Hoi, Wong Po Yuen | Cryptography and quantum games |
1.30-1.45 | Zechao Shang | Privacy |
1.45-2.00 | Bai Xue |
Here are some possible choices of topics. Feel also free to propose your own.
In principle, the existence of one-way functions is sufficient to construct pseudorandom generators. In practice, the constructions we know are quite inefficient. Are these inefficiencies inherent or can they be overcome? There has been some recent progress, but many obstacles remain.
In class we only considered stand-alone executions of cryptographic protocols. What happens when several protocols (or several runs of the same protocol) are executed concurrently? This is very relevant in practical scenarios like the internet. These references and lecture notes may be a good starting point for this topic.
Parallel cryptography attempts to come up with extremely efficient implementations of various cryptographic primitives and protocols. Sometimes it is possible, sometimes it isn't, and sometimes we don't know.
Cryptography and game theory share some similarities: Players engage into protocols from which they attempt to extract some utility. Sometimes cryptographic solutions can help in game theory, and vice versa. Here are some sample papers:
Machine learning is used everywhere from the internet to the stock market. On the other hand, cryptography provides examples of hard problems for learning algorithms. For example, pseudorandom functions are hard to learn, because given any observed collection of values it is hard to predict any other value. For this project you can try various implementations of learning algorithms and watch them fail on cryptographic inputs.