PrivTech WS17/18
Seminar on Privacy-Preserving Technologies (PrivTech) offered during WS17/18.
News
- 20. Feb 2018 – Detailed presentation schedule online.
- 17. Jan 2018 – Presentations scheduled for March 9th.
- 30. Oct 2017 – Groups and topics have been assigned.
- 23. Oct 2017 – Kick-Off slides with topics are online (see Material below).
- 07. Aug 2017 – New website for PrivTech WS17/18 online.
Registration
Please register for our seminar in . TUCaN
Timeline
- Mon, 23. Oct 2017, 09:50 – 11:30: Seminar Kick-Off at CASED (S4|14), Room 5.3.01
() Mornewegstraße 32, 5th floor
We give an overview of the available topics and answer organizational questions. - Thu, 26. Oct 2017, 23:59 (CEST/UTC+2): Topic Selection Deadline.
All interested students submit a list of all topics ordered by their preference (details follow) - Thu, 30. Nov 2017, 23:59 (CET/UTC+1): Intermediate Report Submission Deadline.
Each group submits a 1-page intermediate report, containig the structure of the final document to the respective advisor via email. - Fri, 09. Feb 2018, 23:59 (CET/UTC+1): Final Report Submission Deadline.
All reports must be submitted . via easychair
The page limit is 5-7 pages for groups of 2, and 6-8 pages for groups of 3 students. - Fri, 09. Mar 2018, 10:00 – 17:00: Presentations at CASED (S4|14), Room 5.3.01
() Mornewegstraße 32, 5th floor
Presentations
The presentations will take place on Friday, 9th March 2018 at CASED (Mornewegstraße 32, S4|14) room 5.3.01. Please use the , where the gym is located. This staircase will bring you directly to room 5.3.01 on the 5th floor. entrance to the building at Mornewegstraße 32
Each talk slot includes 10 minutes of questions and discussion.
10:00 – 10:10 Opening
Session 1: Applications of Privacy-Preserving Protocols
10:10 – 10:40 C2 – Privacy-Preserving Deep Learning
10:40 – 11:10 AX2 – State-of-the-Art Privacy-Preserving Genome-Wide Association Studies
11:10 – 11:20 Break
Session 2: Generic Secure Computation
11:20 – 11:50 AX1 – GMW vs. Yao – Depth-Optimized vs. Size-Optimized Circuits
11:50 – 12:20 AX3 – High-Throughput Secure Three-Party Computation from a Semi-Honest Minority towards a Malicious Minority
12:20 – 13:20 Lunch
Session 3: Private Set Intersection
13:20 – 13:50 D1 – Private Set Intersection from Homomorphic Encryption
13:50 – 14:20 C3 – Multi-Party Private Set Intersection
14:20 – 14:30 Break
Session 4: Private Function Evaluation
14:30 – 15:00 A1 – Comparison of Two Modern Approaches to Private Function Evaluation
15:00 – 15:30 A2 – On the Practicality of Valiant's Universal Circuits
15:30 – 15:40 Break
Session 5: Privacy-Enhancing Technologies
15:40 – 16:10 D3 – Privacy-Preserving Routing
16:10 – 16:40 D2 – Riposte and OnionPIR: Anonymous Communication with Metadata Protection
16:40 – 17:00 Closing Remarks
Access restricted section: Log in to see this section.