course-details-portlet

TM8111 - Identity-Based Cryptography

About

This course is no longer taught and is only available for examination.

Examination arrangement

Examination arrangement: Oral examination and Report
Grade: Passed / Not Passed

Evaluation Weighting Duration Grade deviation Examination aids
Approved report 40/100 A
Oral examination 60/100 D

Course content

The course will be given every second year, next time autumn 2024. Identity-Based Encryption (IBE) is a kind of public-key encryption in which the public key of a user is some unique information about the identity of the user that is publicly known (e.g. the user's email address). The idea was first proposed by Adi Shamir in 1984, and it appeared particularly attractive since there is no need to acquire an identity public key prior to encryption. Interestingly, an implementation of the idea was not given until 2001. Today, it is a vibrant field of research, as it is considered an alternative to the classical PKI infrastructure.

Learning outcome

A. Knowledge: After having completed the course, the students shall have obtained basic knowledge of the principles and methods which are employed in Identity Based Encryption (IBE): the security models, security proof techniques, different implementations, as well as some of the inherent problems that accompany this type of cryptographic schemes.

Learning methods and activities

Lectures, colloquiums and discussions.

Compulsory assignments

  • Final report

Further on evaluation

Two parts provide the basis for the final grade in the course, a final report and an oral final exam that count for 40 and 60% of the final grade, respectively. The final report shall be based on the course material and on the latest articles on identity-based encryption published on ePrint. The final oral exam includes a presentation of the final report and answering oral questions. The course is graded to passed/failed. The minimum passing grade is 70/100 point (70%).

Course materials

1. “Introduction to Identity-Based Encryption”, Luther Martin, ARTECH HOUSE, INC, 2008, 2. “Identity-Based Cryptography”, Edited by Marc Joye, Thomson R&D, France, and, Gregory Neven IBM Zürich Research Laboratory, Switzerland, IOS Press, 2009, 3. “Identity-Based Encryption”, Sanjit Chatterjee, Palash Sarkar, Springer Science+Business Media, LLC 2011 Latest papers posted on Cryptology Eprint Archive

More on the course

No

Facts

Version: 1
Credits:  7.5 SP
Study level: Doctoral degree level

Coursework

Language of instruction: English

Location: Trondheim

Subject area(s)
  • Safety and Reliability
  • Telematics
  • Technological subjects
Contact information
Course coordinator: Lecturer(s):

Department with academic responsibility
Department of Information Security and Communication Technology

Examination

Examination arrangement: Oral examination and Report

Term Status code Evaluation Weighting Examination aids Date Time Examination system Room *
Autumn ORD Oral examination 60/100 D
Room Building Number of candidates
Autumn ORD Approved report 40/100 A
Room Building Number of candidates
  • * The location (room) for a written examination is published 3 days before examination date. If more than one room is listed, you will find your room at Studentweb.
Examination

For more information regarding registration for examination and examination procedures, see "Innsida - Exams"

More on examinations at NTNU