Unit 1: Protocols, oblivious transfer, Simultaneous contract signing, Bit Commitment, Coin flipping in a well, Zero knowledge protocols, Interactive Proof Systems(IP), Zero Knowledge Definition, Application to User Identification. Multiply part protocols, secret sharing, verifiable secret sharing, anonymous transactions, multiparty ping-pong protocols, multiparty protocols when most parties are honest.
Unit 2: Homomorphic encryption definition, goldwasser-Micali Encryption scheme, Elgamal encryption scheme, Paillier Encryption Scheme, Boneh-Goh-Nissim Encryption Scheme.
Unit 3: Fully Homomorphic encryption definition, Overview of fully homomorphic encryption schemes, secret key somewhat homomorphic encryption, public key somewhat homomorphic encryption. Fully Homomorphic Encryption scheme over images: squashed encryption, bootstapple encryption and Implementation.
Unit 4: Quantum Cryptography Introduction,Quantum Cryptography Threat and Challenges Ahead such as Analysis, Implementation and Caveats. Families of Post-quantum schemes: Code- based Cryptography, Lattice-based cryptography, Hashed-based cryptography, Multivariate Cryptography.