PrivTech WS16/17

PrivTech WS16/17

Seminar on Privacy-Preserving Technologies (PrivTech) offered during WS16/17.

News

  • 01. Mar 2017 – Detailed presentation schedule online.
  • 20. Jan 2017 – Presentations scheduled for March 13th.
  • 28. Oct 2016 – Topics and groups have been assigned.
  • 21. Oct 2016 – Kick-Off slides with topics are online (see Material below).
  • 13. Oct 2016 – Room change: The kick-off will be in S4|14 room 3.1.01 (Mornewegstraße 30, 3rd floor).
  • 11. Aug 2016 – New website for PrivTech WS16/17 online.

Registration

Please register for our seminar in TUCaN.

Timeline

  • Fri, 21. Oct 2016, 09:50 – 11:30: Seminar Kick-Off at CASED (S4|14), Room 3.1.01 (Mornewegstraße 30, 3rd floor)
    We give an overview of the available topics and answer organisational questions.
  • Mon, 24. Oct 2016, 23:59 (CEST/UTC+2): Topic Selection Deadline.
    All interested students submit a list of all topics ordered by their preference via email to
  • Thu, 01. Dec 2016, 23:59 (CET/UTC+1): Intermediate Report Submission Deadline.
    Each group submits a 1-page intermediate report, containig the structure of the final document to the respective advisor via email.
  • Fri, 10. Feb 2017, 23:59 (CET/UTC+1): Final Report Submission Deadline.
    All reports must be submitted on the easychair website.
  • Mon, 13. Mar 2017, 10:00 – 17:00: Presentations at CASED (S4|14), Room 5.3.01
    (Mornewegstraße 32, 5th floor)

Presentations

The presentations will take place on Monday, 13th March 2017 at CASED (Mornewegstraße 32, S4|14) room 5.3.01. Please use the entrance to the building at Mornewegstraße 32, where the gym is located. This staircase will bring you directly to room 5.3.01 on the 5th floor.

Each talk slot includes 10 minutes of questions and discussion.

10:00 – 10:10 Opening

Session 1: Generic Secure Computation
10:10 – 10:40 D5 – Mixed Protocol Secure Computation
10:40 – 11:10 D2 – Privacy-Preserving Mobile Applications

11:10 – 11:20 Break

Session 2: Private Set Intersection
11:20 – 11:50 C2 – PSI: Are Generic Protocols better than Custom Protocols?
11:50 – 12:20 C3 – Scalable Semi-Honest and Malicious-Secure PSI Protocols

12:20 – 13:25 Lunch

Session 3: Private Function Evaluation
13:25 – 13:50 A1 – Privacy-Preserving Checking for Credit Worthiness
13:50 – 14:20 A5 – Server-Aided SFE/PFE

14:20 – 14:30 Break

Session 4: Private Functions as Data
14:30 – 15:00 A2 – Representing Functions as Data
15:00 – 15:30 A4 – Privacy-Preserving Remote Diagnostics

15:30 – 15:40 Break

Session 5: Special-Purpose Protocols
15:40 – 16:10 D4 – Privacy-Preserving Recommender Systems
16:10 – 16:45 D1 – Private Information Retrieval

16:45 – 17:00 Closing Remarks

Access restricted section: Log in to see this section.