Assignments in this course will consist of research paper presentation, reviews of three papers being presented, a course project, and one finals assignment. The course project can take the form of implementing an existing technique, using an existing tool or compiler for an application that requires data protection, designing a new application (must properly demonstrate security), or perform a literature review. Each project can be done individually or in teams of two (non-survey projects only).
All students are expected to participate in class discussions and perform all assignments regardless of the number of credit hours they are registered for.
Your instructor will treat you as a professional, and you should plan on conducting yourself in an appropriate way. No behavior that compromises academic honesty (such as use of someone else's work or code, using prohibited materials during tests, or making your work available to others) will be tolerated in this course. If you need assistance with anything, do not hesitate to contact the instructor.
It is expected that your work represents your own understanding of the problem. If work of others is used, it must be properly cited. Use of properly cited material is acceptable, but no referencing is treated as claiming the work as your own.
Academic dishonesty will not be tolerated in this course. It is the CSE policy that each case of academic integrity violation is recorded. The standing policy of the department is that all students involved in an academic integrity violation will receive an F grade for the course, unless the instructor recommends a lesser penalty for the first instance of academic integrity violation for the student in question.
Additional information about the CSE policies can be found here; UB academic integrity policies are available here; and UB graduate school guidelines can be found here.
Date | Class content |
Week 1: August 28 |
|
Week 2: September 4 |
|
Week 3: September 11 |
|
Week 4: September 18 | Garbled circuit evaluation in the semi-honest and malicious models:
|
Week 5: September 25 | Garbled circuit evaluation (cont.):
|
Week 6: October 2 | Secret sharing:
|
Week 7: October 9 | Secret sharing (cont.):
|
Week 8: October 16 | Homomorphic encryption:
|
Week 9: October 23 | Secure and verifiable outsourcing:
|
Week 10: October 30 | E-cash:
|
Week 11: November 6 | Block chains:
|
Week 12: November 13 | Anonymous authentication:
|
Week 13: November 20 | Voting:
|
Week 14: November 27 | Voting:
|
Week 15: December 4 | Project presentations |