Home Research Education Publications Activities Resources About Me

Privacy Seminar 2022

Introduction Organisation Resources Schedule See also: Topic list Student lecture Student paper

This is the main web site for the Privacy Seminar (NWI-I00136).


In this seminar we will explore the state of the art in privacy enhancing technologies (PET), and discuss theories (technical, legal and societal) of privacy.





The course code is NWI-I00136.

You will do, in groups of two, a small research project on a particular topic, chosen from a list. The idea is to let you first investigate a particular practical case (what are the privacy issues from a legal and societal perspective, how are they dealt with), and then let you perform some research using particular PETs to solve the problem.

You can use the discussion list on Brightspace to find group partners if you fail to do so during the first lecture.

Working in groups means that you have to divide tasks equally, make a planning, and make sure that you stick to your part while verifying the others are making progress as planned. Cooperation is the keyword here; don't split the task in separate and totally independent parts on which each of you works completely independently. Regularly meet virtually, and discuss and review each others work. You are all responsible for the overall quality of the work and the nature of the collaboration. Should anything go wrong, contact me sooner rather than later.

You present the results in class as well as writing a student paper on the same topic.

Presence at all lectures is mandatory! (Not present without a valid reason = fail!). Valid reasons are: illness, accident, other study obligation (like exams, study trip), important family events. Invalid reasons are: holidays, trips etc, even if booked before the course started, and many many others.

The final grade = (2 * grade for paper + 1 * grade for presentation ) / 3. If the grade for the paper or presentation is below 5.5, the lowest grade is the final grade!

Background documents


You should have successfully completed the ‘Introduction to Cryptography’ course (NWI-IBC023).


The first few lectures will be spent on outlining the course and the area of privacy enhancing technologies. Slides of the lectures will become available after the lecture.


The course is supported by a wiki, to which all are invited to contribute. You can go the wiki to request an account to get edit rights.


The paper skeleton must be submitted on or before April 14. Deadline for the final paper is June 9. Both deadlines: 12 o'clock night.


On privacy:

On giving presentations:

On writing papers:

The following two books on writing in English are recommended:

Also see the the webpage of the university-wide support for writing

See also the slides of the first two lectures (see schedule below), and the Privacy Wiki (and the pointers to further resources therein).

Schedule (spring 2022)

Lectures take place from 10:30-12:15 in HG 00.071 (until and including March 17) and Mercator 1 00.28 (from April 14 onwards).

Note: Lecture on February 3 takes place in LIN 8

Physical presence is normally speaking mandatory, but given the COVID-19 situation special rules apply. In particular, stay home if you have symptoms or tested positive.

Given the fact that this seminar is highly interactive, no live stream or other ways of participating online is offered.

Slides of presentations that are available are linked from here. The links are released after the lecture.

Date Topic Deadline
3-2 Course organisation and Privacy: an overview, by Jaap-Henk Hoepman
10-2 Basic techniques, by Jaap-Henk Hoepman.
17-2 Usable privacy, by Hanna Schraffenberger.
24-2 Privacy In Databases (Kokkelmans, Pathuis, Wortelboer, Lodeweegs, Dibbets)
3-3 Privacy friendly location based services (Kreza, Juvan Michaelides, Baroutas, Eidelpes)
10-3 Privacy friendly identity management (Schoenmakers, van Rheden, Miggelenbrink, Schmetz, Vrieling)
17-3 Privacy friendly revocation of credentials (Grootjen, van Haren, Valentijn, Peijer)
23-3 (no lecture)
31-3 (no lecture)
7-4 (no lecture)
14-4 (no lecture) Privacy friendly search (Vahdati, Pour, Fan, Meng, Demir) Deadline paper skeleton
21-4 Obfuscation (Hofman, de Boer, Ekici, Scattolin, Alter)
28-4 Revocable Privacy (Uchoa De Assis, van der Laan, Tamminga, Philipse, Coros)
5-5 (no lecture)
12-5 Anonymous cryptocurrencies (Gautam, Hifnawy, Sukumar, Nikou, Gorugantula)
19-5 Privacy in Machine Learning (Frings, Besouw, Jeurissen, Bangma, van Rhijn)
26-5 (no lecture)
2-6 Privacy in asynchronous messaging (Popa, de Gouw, Verbakel, Kolijn)
9-6 Secure mulit-party computation (Harsema, Ravensbergen, Jans, Koning) Deadline student paper
13-6 (extra lecture) Privacy friendly search (Vahdati, Pour, Fan, Meng, Demir)

Last Version - e1e3326.
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman
Email: jhh@cs.ru.nl