FUNDAMENTALS OF DISTRIBUTED LEDGERS
- Overview
- Assessment methods
- Learning objectives
- Contents
- Full programme
- Delivery method
- Teaching methods
- Contacts/Info
The student has knowledge of the topics presented in an introductory Data Security course. In particular, the student knows the main symmetric and asymmetric encryption schemes, such as DES, AES and RSA; digital signature schemes; cryptographic hash functions. In addition, the student has knowledge of the complexity analysis of algorithms.
The verification method consists of a written test.
The purpose of this test is to verify the learning and understanding of the models, architectures and protocols presented during the lessons. A written test consists of questions of a theoretical nature, the purpose of which is to verify the communication skills developed by the student, in particular the acquisition of the technical terminology necessary for the understanding and communication of the methodologies and models related to distributed ledgers and cryptographic protocols.
The questions are 4-5 in number. The written exam duration is 1 hour.
The mark of the written test is expressed in thirtieths. The test is passed if the grade is greater than or equal to 18/30
This course provides an in-depth knowledge of the main architectures relating to distributed ledgers and the related cryptographic protocols that ensure the correct and secure execution of transactions. Examples relating to the main distributed ledgers will be presented, such as Bitcoin, Ethereum, Corda, Hedera.
Introduction to distributed ledgers and related security issues (2 hours, Objective 1)
˗ Distributed ledger architectures and crypto asset transactions (4 hours, Objectives 1, 2)
˗ Data integrity and cryptographic hash functions (4 hours, Objective 1)
˗ Advanced digital signature schemes (4 hours, Objective 1)
˗ Advanced cryptographic techniques for managing transactions (4 hours, Objective 1, 2)
˗ Management of cryptographic assets via wallet (4 hours, Objectives 1, 2, 3)
˗ The problem of consent: communication models and resistance to errors (4 hours, Objective 1)
˗ Practical Byzantine Fault Tolerance, Proof-of-Work, Proof-of-Stake (4 hours, Objective 1)
˗ Randomness beacons and applications to the consent problem (4 hours, Objective 1)
˗ Scalability in distributed ledger (4 hours, Objectives 1, 2, 3)
˗ Introduction to zero-knowledge protocols (4 hours, Objective 1)
˗ Non-interactive zero-knowledge protocols and applications to private transactions (3 hours, Objectives 1, 2, 3)
˗ Decentralized exchanges with atomic swaps among distributed ledgers (3 hours, Objectives 1, 2, 3)
˗ Introduction to distributed ledgers and related security issues (2 hours, Objective 1)
˗ Distributed ledger architectures and crypto asset transactions (4 hours, Objectives 1, 2)
˗ Data integrity and cryptographic hash functions (4 hours, Objective 1)
˗ Advanced digital signature schemes (4 hours, Objective 1)
˗ Advanced cryptographic techniques for managing transactions (4 hours, Objective 1, 2)
˗ Management of cryptographic assets via wallet (4 hours, Objectives 1, 2, 3)
˗ The problem of consent: communication models and resistance to errors (4 hours, Objective 1)
˗ Practical Byzantine Fault Tolerance, Proof-of-Work, Proof-of-Stake (4 hours, Objective 1)
˗ Randomness beacons and applications to the consent problem (4 hours, Objective 1)
˗ Scalability in distributed ledger (4 hours, Objectives 1, 2, 3)
˗ Introduction to zero-knowledge protocols (4 hours, Objective 1)
˗ Non-interactive zero-knowledge protocols and applications to private transactions (3 hours, Objectives 1, 2, 3)
˗ Decentralized exchanges with atomic swaps among distributed ledgers (3 hours, Objectives 1, 2, 3)
˗ Introduction to distributed ledgers and related security issues (2 hours, Objective 1)
˗ Distributed ledger architectures and crypto asset transactions (4 hours, Objectives 1, 2)
˗ Data integrity and cryptographic hash functions (4 hours, Objective 1)
˗ Advanced digital signature schemes (4 hours, Objective 1)
˗ Advanced cryptographic techniques for managing transactions (4 hours, Objective 1, 2)
˗ Management of cryptographic assets via wallet (4 hours, Objectives 1, 2, 3)
˗ The problem of consent: communication models and resistance to errors (4 hours, Objective 1)
˗ Practical Byzantine Fault Tolerance, Proof-of-Work, Proof-of-Stake (4 hours, Objective 1)
˗ Randomness beacons and applications to the consent problem (4 hours, Objective 1)
˗ Scalability in distributed ledger (4 hours, Objectives 1, 2, 3)
˗ Introduction to zero-knowledge protocols (4 hours, Objective 1)
˗ Non-interactive zero-knowledge protocols and applications to private transactions (3 hours, Objectives 1, 2, 3)
˗ Decentralized exchanges with atomic swaps among distributed ledgers (3 hours, Objectives 1, 2, 3)
The lectures consist of 48 hours of theoretical lessons. The lessons are dedicated to the illustration of:
architectural models of distributed ledgers; the problem of consensus in distributed ledgers; primitives and cryptographic protocols related to the management and execution of transactions on distributed ledgers.
There is no textbook. Hence handouts and will be provided slides provided by the teacher, available on the University e-learning site.
Professor Office hours: by appointment.
Send an e-email to alberto.trombetta@uninsubria.it from students’ official uninsubria e-mail.
Professors
Borrowers
-
Degree course in: COMPUTER SCIENCE