Financial Cryptography

TA: Daniel Malinowski


  1. 2015-03-02 

    Lecture: Short introduction to cryptography

    Based on slides from my course [link]

    Exercises joint with the lecture

  2. 2015-03-09 and 2015-03-16 

    Lecture E-cash

    Based on:
    • Ivan Damgaard: On Σ-protocols [pdf]
    • Ronald Cramer, Ivan Damgaard and Jesper Buus Nielsen: On Electronic Payment Systems [pdf]

    Exercises: Sigma protocols

  3. 2015-03-23: class cancelled

  4. 2015-03-30

    Lecture: E-cash - ctd

    Sigma protocols

  5. 2015-04-13 

    Lecture: introduction to Bitcoin

    Based on my slides [pptx,pdf]. See also Satoshi's original paper: [pdf] and Bitcoin wiki [link].

    Exercises: Time lock puzzles [pdf] and the Dolev-Strong protocol [link].

  6. 2015-04-20 

    Lecture: selfish mining attacks on Bitcoin

    Based on:
    • Ittay Eyal, Emin Gun Sirer: Majority is not Enough: Bitcoin Mining is Vulnerable [link]

    Exercises: Simple Bitcoin contracts: deposit and micropayments [link] and [pdf], malleability of Bitcoin transactions

  7. 2015-04-27

    Lecture: Bitcoin contracts

    Based on:
    • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek: Secure Multiparty Computations on Bitcoin [pdf]
    • Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski and Łukasz Mazurek: Fair Two-Party Computations via the Bitcoin Deposits [pdf]

    Exercises: Commitments (standard and Bitcoin based), Blum’s protocol (secure coin toss), Bitcoin lottery, introduction to Multi Party Computations and the problem of fairness, 

  8. 2015-05-04

    Lecture: Difficulty raising attacks on Bitcoin and Bitcoin Mining Pools

    Based on:
    • Lear Bahack: Theoretical Bitcoin Attacks with less than Half of the Computational Power [link]
    • Meni Rosenfeld: Analysis of Bitcoin Pooled Mining Reward Systems [link]

    Exercises: Mining Pools based on [link].

  9. 2015-05-11 

    Lecture: Non-outsourceable puzzles

    Based on:
    • Andrew Miller, Elaine Shi, Ahmed Kosba, and Jonathan Katz: Non-outsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions [link]

    See also Ittay Eyal, and Emin Gün Sirer: How to Disincentivize Large Bitcoin Mining Pools [link]

    ExercisesEthereum, Namecoin, proofs of retrievability, based on [pdf].

  10. 2015-05-18

    Lecture: Scrypt hash function and Litecoin

    Based on:
    • Colin Percival: Stronger Key Derivation Via Sequential Memory-Hard Functions [link]
    • Joël Alwen and Vladimir Serbinenko: High Parallel Complexity Graphs and Memory-Hard Functions [link]

    See also Litecoin wiki [link] and Scrypt wikipedia page [link].

    ExercisesPebbling based on Section 10.1.from [pdf
  1. 2015-05-25 

    Lecture: Primecoin and 
    Proofs of Stake

    Based on:
    • Sunny King: Primecoin: Cryptocurrency with Prime Number Proof-of-Work [link]
    • Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld: Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake [link]

    See also Primecoin webpage [link], Peercoin webpage [link], and NXT webpage [link].

    Exercises: Pebbling continued, Permacoin [pdf]

  2. 2015-06-01 

    Lecture: Zerocash

    Based on: 
    • Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza: Zerocash: Decentralized Anonymous Payments from Bitcoin

    Exercises: Content Distribution based on Section 6 of "Handbook of Financial Cryptography and Security” [book

  3. 2015-06-08

    Lecture: Zerocash - ctd and Spacecoin

    Based on:
    • Sunoo Park and Krzysztof Pietrzak and Joël Alwen and Georg Fuchsbauer and Peter Gazi: Spacecoin: A Cryptocurrency Based on Proofs of Space

  4. 2015-06-15

    Lecture: Namecoin, TOR, Mix-Nets and e-voting

    Based on:
    1. Namecoin wikipedia page [link], see also Zooko's triangle wikipedia page [link]
    2. Tor's wikipedia page [link] and short description on TOR's page [link]
    3. Lecture notes L17-L21 from this course.