### Organization

Lecturers: Prof. Dr. Ueli Maurer and Dr. Martin Hirt

The lecture starts on **Friday, February 22, 2013**
and takes place every Friday **13-15** in **CAB G51**.

The exercise sessions starts on **Monday, February 24, 2013**
and takes place every Monday **13-15** in **CAB G56**. The assistant is Daniel Tschudi.

### Lecture Notes

- The lecture note for the course: [Single File Version][Printable Version]
- Summary of the lecture notes in English for MPC: [MPC (.pdf)]
- Summary of the lecture notes in English for Voting: [Voting (.pdf)]

### Exercises

Exercises and solutions will be provided here. The exercise sessions have a special format: The students solve the tasks in small groups and present them at the blackboard afterwards.- Exercise 1: [pdf] Solution: [pdf]
- Exercise 2: [pdf] Solution: [pdf]
- Exercise 3: [pdf] Solution: [pdf]
- Exercise 4: [pdf] Solution: [pdf]
- Exercise 5: [pdf] Solution: [pdf]
- Exercise 6: [pdf] Solution: [pdf]
- Exercise 7: [pdf] Solution: [pdf]
- Exercise 8: [pdf] Solution: [pdf]
- Exercise 9: [pdf] Solution: [pdf]
- Exercise 10: [pdf] Solution: [pdf]
- Exercise 11: [pdf] Solution: [pdf]
- Exercise 12: [pdf] Solution: [pdf]
- Exercise 13: [pdf] Solution: [pdf]
- Exercise 14: [pdf] Solution: [pdf]

### Handouts

Digital versions of the slides will be provided here.- Lectures 1-2: [Slides] [Presentation]
- Lecture 3-4: [Slides] [Presentation]
- Lecture 5: [Slides] [Presentation] [Handout]
- Lecture 6: [Slides] [Presentation]
- Lecture 7-9: [Slides]
- Lecture 10-11: [Slides]
- Lecture 12: [Slides]
- Lecture 13: [Slides]

### Reading Assignments

The following papers will be distributed in the lecture:- U. Maurer: Unifying Zero-Knowledge Proofs of Knowledge: [pdf]
- G. Brassard, D. Chaum, C. Crepeau: Minimum Disclosure Proofs of Knowledge: [ps]

### Some relevant literature

**O.Goldreich: The Foundations of Cryptography --- Volumes 1 and 2, Cambridge University Press, 2001 and 2004**.

some copies are available at the Computer Science Library

for interactive proofs and zero-knowledge proofs see Volume 1, Chapter 4.**A.Menezes, P.van Oorschot, S.Vanstone: Handbook of Applied Cryptography, CRC Press, 1996**.

available on-line.