Bonn-Aachen International Center
for Information Technology

Imprint

cosec

students

science

city life
cosec >students >Teaching >IPEC Winter 2012 
bitkey
Account 
Password 
Register?New password?

Cryptography and game theory

Corresponding entry in Aachen Campus, Bonn Basis.

Responsible

Joachim von zur Gathen

Allocation

2+2 SWS, 4 credits ECTS

Lecture

Yona Raekow and Konstantin Ziegler

Time & Place

12.3.-23.3.2012, B-IT Marschallsaal (and B-IT 1.25 on 23.3.2012)

The lecture's mailing list

Students interested in the course are invited to join the mailing list to receive up-to-date information:

[Sorry, you need to enable Javascript to see this.]

You can subscribe to and unsubscribe from to the mailing list using the information given on the list's Info page.

The tentative schedule for the two weeks is as follows:

Date

9.00-10.30

11.00-12.30

12.30-13.30

13.30-15.00

12.03.

Lecture 1

Scribe: Emil

Lecture 2

Scribe: Emil

Lunch break

Tutorial 1

13.03.

Lecture 3

Scribe: Niclas

Lecture 4

Scribe Niclas

Lunch break

Tutorial 2

14.03.

no lecture


15.03.

Lecture 5

Scribe: Nevena

Lecture 6

Scribe: Nevena

Lunch break

Tutorial 3

16.03.

Lecture 7

Scribe: Nevena

Lecture 8

Scribe: Nevena

17.03.

weekend

18.03

weekend

19.03.

Lecture 9

Scribe: Emil

Lecture 10

Scribe: Niclas

Lunch break

Tutorial 4

20.03.

Lecture 11

Scribe: David

Lecture 12

Scribe: David

Lunch break

Tutorial 5

21.03.

no lecture

22.03.

Lecture 13

Scribe: David

Lecture 14

Scribe: David

Lunch break

Tutorial 6

23.03

Wrap up

Exam preparation

Scribe notes for the lectures:

 

 

Scribes

This class has no take-home assignments. Instead, you are required to write and hand-in scribe notes of lectures. You will be assigned a lecture that you should take notes for. (Depending on the number of participants this will happen in pairs, or may be assigned more than one lecture.) Scribe notes are due the monday after your assigned lecture. You have to submit a LaTeX file, named scribesNN.tex, where NN is the two-digit number of the lecture and a corresponding pdf.

Use the following LaTeX template. The scribe notes must be written in LaTeX. They will be made available to your fellow students via this web page. For this purpose you should put special care in producing well-written material. Each scribe-file for a class will be made available in pdf format and will carry the names of the authoring scribes.

More information on LaTeX?

Documentation:

Links:

Quizzes

Access the quizzes on this page. In order to do so, you need to sign up to this page by clicking on the key symbol on the left upper corner.

Contents

Cryptography and game theory both deal with the design and analysis of protocols, also called mechanisms, for the interaction of parties with conflicting interests. However, both disciplines have different origins and use different models and formalisms.

Cryptography considers "good" parties for whom basic properties such as secrecy, correctness, or authenticity should be guaranteed in the face of opposing "malicious" parties. For example, parties may communicate for the purpose of a function evaluation, a so called multi-party computation, where some of the parties may try to prevent a correct computation.

Game theory considers parties with individual goals and aims to design mechanisms of interaction that will lead to behaviors with desirable properties. Here, we can assume that every party will simply act according to its own set of goals, for example maximization of its monetary profit.

In this course we will explore recent results that arose from the cross fertilization of the two areas with the goal to arrive at a better understanding of collaboration between parties with conflicting interests.

Final Exam

Time and place: 30 March 2012, 9.00 am, at b-it Marschallsaal

Literature

Links

 

 

Imprint, webmaster & more