Multiple students will scribe each lecture. I prefer that you submit your scribed lectures in the following way (you can submit this in one email):

- One scribed lecture for each student.
- All students assigned to a given lecture should merge their notes into one "master" set of notes (by taking the best portions of each of the individual notes).

A first draft of the scribed notes (submitted to me as a tex file that compiles without errors) will be due

In addition to the notes by lecture (below), the notes for all lectures are available in one file (

- Lecture 1 (Introduction, trapdoor permutations): ps | pdf
- Lecture 2 (Public-key encryption, semantic security, hard-core bits): ps | pdf
- Lecture 3 (Hybrid arguments, security for encryption of multiple messages): ps | pdf
- Lecture 4 (More efficient public-key encryption, DDH assumption, El Gamal encryption): ps | pdf
- Lecture 5 (Definitions of security against chosen-ciphertext attacks, non-interactive zero-knowledge (NIZK)): ps | pdf
- Lecture 6 (Adaptively-secure NIZK, the Naor-Yung encryption scheme secure against non-adaptive chosen-ciphertext attacks): ps | pdf
- Lecture 7 (The Naor-Yung encryption scheme, the Dolev-Dwork-Naor encryption scheme secure against adaptive chosen-ciphertext attacks): ps | pdf
- Lecture 8 (The Dolev-Dwork-Naor encryption scheme): ps | pdf
- Lecture 9 (The Cramer-Shoup encryption scheme): ps | pdf
- Lecture 10 (The Cramer-Shoup encryption scheme): ps | pdf
- Lecture 11 (Constructing NIZK proofs): ps | pdf
- Lecture 12 (Constructing NIZK proofs): ps | pdf
- Lecture 13 (Constructing NIZK proofs): ps | pdf
- Lecture 14 (The random oracle (RO) model, encryption schemes in the RO model): ps | pdf
- Lecture 15 (CCA2-secure encryption schemes in the RO model; OAEP+): ps | pdf
- Lecture 16 (One-time signature schemes, signature schemes in the RO model): ps | pdf
- Lecture 17 (Interactive zero-knowledge (ZK) proofs): ps | pdf
- Lecture 18 (Private information retrieval (PIR) --- guest lecture by Prof. Gasarch): ps | pdf
- Lecture 19 (Commitment schemes, ZK proofs for all of NP): ps | pdf
- Lecture 20 (PIR --- guest lecture by Prof. Gasarch): ps | pdf
- Lecture 21 (Witness indistinguishability, parallel composition, perfect vs. standard commitment schemes): ps | pdf
- Lecture 22 (Constructions of perfect/standard commitment schemes): ps | pdf
- Lecture 23 (A constant-round ZK proof for NP, proofs of knowledge): ps | pdf
- Lecture 24 (Arguments, a constant-round ZK argument of knowledge for NP, efficient proof of knowledge for discrete logarithms): ps | pdf
- Lecture 25 (Applications of proof systems to identification protocols): ps | pdf
- Lecture 26 (Byzantine agreement --- guest lecture by Chiu-Yuen Koo): ps | pdf
- Lecture 27 (Byzantine agreement --- guest lecture by Chiu-Yuen Koo): ps | pdf
- Lecture 28 (Identification protocols based on the discrete logarithm assumption; from identification schemes to digital signatures using the Fiat-Shamir transformation): ps | pdf