Cryp­to­graph­ic Pro­to­cols


We will discuss signature schemes, protocols for identification and basics of secure multi-party computation.

Mod­ule In­form­a­tion

  • Module III.2.2: Algorithmen II (algorithms II)
  • Module III.2.3: Komplexität und Kryptographie (complexity and cryptography)
  • Course: L.079.05830
  • V2 + Ü1 SWS (contact time)
  • 4 ECTS credits (workload)
  • Useful previous knowledge: Einführung in Kryptographie (German) or any equivalent course
  • This course will be held in english.

For further information see the corresponding section in the module handbook.


  • Important Note: the lecture will only take place during the second half of the semester. The first lecture is planned to take place on Tuesday, June 13th, 11:15.
  • Lecture:
    • Tuesday, 11:15, F2.211
    • Tuesday, 14:00, F2.211
  • Tutorials:
    • Tuesday, 15:45, F2.211

Lec­ture Notes

This course will make use of the literature given below. Beside this, there will be no lecture notes for this course. Extensive lecture notes on cryptography and cryptographic protocols are available from Luca Trevisan and Berry Schoenmakers are available online.

1. Introduction[PDF]
2a. Signatures[PDF]
2b. One-time Signatures[PDF]
2c. Stateful Signatures[PDF]
3. Identification Protocols[PDF]
4. Interactive and Zero-Knowledge Protocols[PDF]
5. Witness Hiding Protocol[PDF]
6. Fiat-Shamir Heuristic[PDF]
7. Group Signatures[PDF]


The oral exams for Cryptographic Protocols have to be planned individually. Send your requests of an examination date to Gennadij Liske and the second professor of the module using the email form for the type A exam from


Here we will publish the home exercises. Note that we won't publish any solutions to these exercises. Solutions to selected exercises will be discussed in the tutorials. You can submit your solutions in the box at F2.108. 

Handout 12017-19-06
Handout 22017-23-06
Handout 3
Handout 42017-07-072017-07-11: Replacements for exercises 1 and 2
Handout 5
Handout 62017-07-25


  • Bellare, Rogaway: Lecture Notes on "Introduction to Modern Cryptography", University of California, San Diego, 2004--2005. Lecture notes available online!
  • Goldreich: "Foundations of Cryptography, Volume 1: Basic Tools", Cambridge University Press, 2001. ISBN: 0-521-79172-3. Early draft version available online!
  • Goldreich: "Foundations of Cryptography, Volume 2: Basic Applications", Cambridge University Press, 2004. ISBN: 0-521-83084-2.
  • Goldwasser, Bellare: Lecture Notes on "Cryptography", MIT, 1996--2001. Lecture notes available online!
  • Katz, Lindell: "Introduction to Modern Cryptography", Chapman & Hall / CRC Press, 2007. ISBN: 1-5848-8551-3
  • Lindell: Lecture Notes on "Introduction to Cryptography", Bar-Ilan University, 2005. Lecture notes available online!
  • Menezes, van Oorschot, Vanstone: "Handbook of Applied Cryptography", CRC Press, 1996. ISBN: 0-8493-8523-7. Complete book available online!
  • Shoup: "A Computational Introduction to Number Theory and Algebra", Cambridge University Press, 2005. ISBN: 0-521-85154-8. Complete book available online!
  • M. Sipser: "Introduction to the Theory of Computation", 3rd edition, Cengage Learning, 2013. ISBN: 1-133-18779-X.
  • Stinson: "Cryptography: Theory and Practice", 2nd edition, Chapman & Hall / CRC Press, 2001. ISBN: 1-5848-8206-9.
  • Trappe, Washington: "Introduction to Cryptography with Coding Theory", 3rd edition, Chapman & Hall / CRC Press, 2005. ISBN: 1-5848-8508-4.
  • Berry Schoenmakers: "Lecture Notes on Cryptographic Protocols", Chapter 4: Identification Protocols, available online