PrivTech WS17/18

PrivTech WS17/18

Seminar on Privacy-Preserving Technologies (PrivTech) offered during WS17/18.

News

  • 20. Feb 2018 – Detailed presentation schedule online.
  • 17. Jan 2018 – Presentations scheduled for March 9th.
  • 30. Oct 2017 – Groups and topics have been assigned.
  • 23. Oct 2017 – Kick-Off slides with topics are online (see Material below).
  • 07. Aug 2017 – New website for PrivTech WS17/18 online.

Registration

Please register for our seminar in TUCaN.

Timeline

  • Mon, 23. Oct 2017, 09:50 – 11:30: Seminar Kick-Off at CASED (S4|14), Room 5.3.01
    (Mornewegstraße 32, 5th floor)
    We give an overview of the available topics and answer organizational questions.
  • Thu, 26. Oct 2017, 23:59 (CEST/UTC+2): Topic Selection Deadline.
    All interested students submit a list of all topics ordered by their preference (details follow)
  • Thu, 30. Nov 2017, 23:59 (CET/UTC+1): Intermediate Report Submission Deadline.
    Each group submits a 1-page intermediate report, containig the structure of the final document to the respective advisor via email.
  • Fri, 09. Feb 2018, 23:59 (CET/UTC+1): Final Report Submission Deadline.
    All reports must be submitted via easychair.
    The page limit is 5-7 pages for groups of 2, and 6-8 pages for groups of 3 students.
  • Fri, 09. Mar 2018, 10:00 – 17:00: Presentations at CASED (S4|14), Room 5.3.01
    (Mornewegstraße 32, 5th floor)

Presentations

The presentations will take place on Friday, 9th March 2018 at CASED (Mornewegstraße 32, S4|14) room 5.3.01. Please use the entrance to the building at Mornewegstraße 32, where the gym is located. This staircase will bring you directly to room 5.3.01 on the 5th floor.

Each talk slot includes 10 minutes of questions and discussion.

10:00 – 10:10 Opening

Session 1: Applications of Privacy-Preserving Protocols
10:10 – 10:40 C2 – Privacy-Preserving Deep Learning
10:40 – 11:10 AX2 – State-of-the-Art Privacy-Preserving Genome-Wide Association Studies

11:10 – 11:20 Break

Session 2: Generic Secure Computation
11:20 – 11:50 AX1 – GMW vs. Yao – Depth-Optimized vs. Size-Optimized Circuits
11:50 – 12:20 AX3 – High-Throughput Secure Three-Party Computation from a Semi-Honest Minority towards a Malicious Minority

12:20 – 13:20 Lunch

Session 3: Private Set Intersection
13:20 – 13:50 D1 – Private Set Intersection from Homomorphic Encryption
13:50 – 14:20 C3 – Multi-Party Private Set Intersection

14:20 – 14:30 Break

Session 4: Private Function Evaluation
14:30 – 15:00 A1 – Comparison of Two Modern Approaches to Private Function Evaluation
15:00 – 15:30 A2 – On the Practicality of Valiant's Universal Circuits

15:30 – 15:40 Break

Session 5: Privacy-Enhancing Technologies
15:40 – 16:10 D3 – Privacy-Preserving Routing
16:10 – 16:40 D2 – Riposte and OnionPIR: Anonymous Communication with Metadata Protection

16:40 – 17:00 Closing Remarks

Access restricted section: Log in to see this section.