CSE 701 Fall 2017: Privacy Enhancing Technologies

General Information

Class Schedule

Instructor

Course Objectives

The objectives of this course consist of developing a deep understanding of the available techniques for achieving data privacy and anonymity via technical mechanisms, the ability to reason about them and identify the best tools for a problem in question. The course project additionally includes a research component to demonstrate the ability to build a non-trivial security system or perform a rigorous literature review.

Course Description

This course provides an in-depth treatment of technical mechanisms for protecting data privacy in various contexts. The explored techniques go beyond traditional security tools for protecting data at rest or during transmission and address questions of protecting secrecy of data when it is used in computation, anonymous communications, anonymous authentication, and applications that have anonymity as one of their major goals (including electronic cash, elections, and voting).

Assignments in this course will consist of research paper presentation, reviews of three papers being presented, a course project, and one finals assignment. The course project can take the form of implementing an existing technique, using an existing tool or compiler for an application that requires data protection, designing a new application (must properly demonstrate security), or perform a literature review. Each project can be done individually or in teams of two (non-survey projects only).

All students are expected to participate in class discussions and perform all assignments regardless of the number of credit hours they are registered for.

Grading

Grading for this course will tentatively consist of 25% for presentations, 30% for the course project, 15% for the reviews (3), 10% for the final assignment, and 20% for class participation. The overall performance of 70% or higher is required for getting the S grade.

Assignment Policies

Academic Integrity

Computer science, as a profession, requires us to seek truth not only in scientific discoveries, but also in dealing with the public, as the public depends on our expertise and honesty to construct their computing infrastructure. Thus, competence and trust are essential to being a scholar and a computing professional in particular.

Your instructor will treat you as a professional, and you should plan on conducting yourself in an appropriate way. No behavior that compromises academic honesty (such as use of someone else's work or code, using prohibited materials during tests, or making your work available to others) will be tolerated in this course. If you need assistance with anything, do not hesitate to contact the instructor.

It is expected that your work represents your own understanding of the problem. If work of others is used, it must be properly cited. Use of properly cited material is acceptable, but no referencing is treated as claiming the work as your own.

Academic dishonesty will not be tolerated in this course. It is the CSE policy that each case of academic integrity violation is recorded. The standing policy of the department is that all students involved in an academic integrity violation will receive an F grade for the course, unless the instructor recommends a lesser penalty for the first instance of academic integrity violation for the student in question.

Additional information about the CSE policies can be found here; UB academic integrity policies are available here; and UB graduate school guidelines can be found here.

Detailed Course Schedule

Assignments will not be posted on this web page and instead will be made available through UBlearns.

Date Class content
Week 1: August 28
Week 2: September 4
  • Labor Day, no class
Week 3: September 11
Week 4: September 18 Garbled circuit evaluation in the semi-honest and malicious models:
Week 5: September 25 Garbled circuit evaluation (cont.):
Week 6: October 2 Secret sharing:
Week 7: October 9 Secret sharing (cont.):
Week 8: October 16 Homomorphic encryption:
Week 9: October 23 Secure and verifiable outsourcing:
Week 10: October 30 E-cash:
Week 11: November 6 Block chains:
Week 12: November 13 Anonymous authentication:
Week 13: November 20 Voting:
Week 14: November 27 Voting:
Week 15: December 4 Project presentations