Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
E
ece498ac-fall2018
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
josephk4
ece498ac-fall2018
Commits
8573e3aa
Commit
8573e3aa
authored
6 years ago
by
kliao6
Browse files
Options
Downloads
Patches
Plain Diff
Edit readme
parent
9021bd2d
No related branches found
Branches containing commit
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
mp1/README.md
+14
-13
14 additions, 13 deletions
mp1/README.md
with
14 additions
and
13 deletions
mp1/README.md
+
14
−
13
View file @
8573e3aa
Machine Problem 1: Zero Knowledge Proofs
========================================
This is the first machine problem for ECE/CS498AC Applied
Cryptography at the
University of Illinois at Urbana-Champaign.
[
Course
website
](
http://soc1024.ece.illinois.edu/teaching/ece498ac/fall2018/
)
This is the first machine problem for
[
ECE/CS498AC Applied
Cryptography
](
(http://soc1024.ece.illinois.edu/teaching/ece498ac/fall2018/
)
) at
the University of Illinois at Urbana-Champaign.
In this assignment you will need to implement several zero-knowledge proof
schemes for languages involving discrete logarithms. This assignment is intended
to provide:
1.
a
hands-on way to understand group theory
2.
p
ractice implementing variations of a cryptographic protocol
3.
r
einforcement of the concepts behind analyzing a protocol with "security
1.
A
hands-on way to understand group theory
2.
P
ractice implementing variations of a cryptographic protocol
3.
R
einforcement of the concepts behind analyzing a protocol with "security
proofs" (You will have to implement in code the "Simulator" and the "Extractor"
that make up part of the proof
)
.
that make up part of the proof.
)
Getting started
---------------
...
...
@@ -26,10 +26,11 @@ implementation is included as a submodule, which can be cloned by running the
following commands:
`git submodule init`
`git submodule update`
The python files in this assignment can be converted to .ipynb using
https://github.com/sklam/py2nb
The python files in this assignment can be converted to .ipynb using
the tool
[
py2nb
](
https://github.com/sklam/py2nb
)
.
Assignment
----------
...
...
@@ -59,10 +60,10 @@ To submit your solution:
-
You must upload your
`mp1`
folder as a zip file to Piazza
-
The upload must be marked "visible to Instructors"
-
The
`mp1`
folder must contain a text file
`report.txt`
, which must include a short english-language narrative explaining:
-
y
our net id
-
w
hat parts you finished, attempted, couldn't figure out
-
a
ny parts you found interesting, challenging, questions you have
-
l
ength can be one paragraph, or several... this is not an essay, but it may be used to justify partial credit
-
Y
our net id
-
W
hat parts you finished, attempted, couldn't figure out
-
A
ny parts you found interesting, challenging, questions you have
-
L
ength can be one paragraph, or several... this is not an essay, but it may be used to justify partial credit
-
**No partners are allowed for this machine problem.**
You must do your own work on this MP.
-
Only modify the
`zkp-assignment.py`
file, since that is the only code we'll check
-
The file must run without throwing exceptions
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment