Home Research Education Publications Activities Resources About Me

Privacy Seminar 2021

Contents: | Introduction | Organisation | Resources | Schedule |

This is the main web site for the Privacy Seminar (NWI-I00136) of the TRU/e security master.


In this seminar we will explore the state of the art in privacy enhancing technologies (PET), and discuss theories (technical, legal and societal) of privacy.



The following topics have been claimed so far:


The course code is NWI-I00136.

You will do, in groups of two, a small research project on a particular topic, chosen from a list. The idea is to let you first investigate a particular practical case (what are the privacy issues from a legal and societal perspective, how are they dealt with), and then let you perform some research using particular PETs to solve the problem.

You can use the discussion list on Brightspace to find group partners.

Working in groups means that you have to divide tasks equally, make a planning, and make sure that you stick to your part while verifying the others are making progress as planned. Cooperation is the keyword here; don't split the task in separate and totally independent parts on which each of you works completely independently. Regularly meet virtually, and discuss and review each others work. You are all responsible for the overall quality of the work and the nature of the collaboration. Should anything go wrong, contact me sooner rather than later.

You present the results in class as well as writing a student paper on the same topic.

Presence at all lectures is mandatory! (Not present without a valid reason = fail!). Valid reasons are: illness, accident, other study obligation (like exams, study trip), important family events. Invalid reasons are: holidays, trips etc, even if booked before the course started, and many many others.

The final grade = (2 * grade for paper + 1 * grade for presentation ) / 3. If the grade for the paper or presentation is below 5.5, the lowest grade is the final grade!

Background documents


You should have successfully completed the Cryptography course.


The first few lectures will be spent on outlining the course and the area of privacy enhancing technologies. Slides of the lectures will become available after the lecture.


The course is supported by a wiki, to which all are invited to contribute. You can go the wiki to request an account to get edit rights.


The paper skeleton must be submitted on or before April 8. Deadline for the final paper is June 13 (a Sunday). Both deadlines: 12 o'clock noon.


On privacy: On writing papers or giving presentations: The following two books on writing in English are recommended Also see the the webpage of the university-wide support for writing

See also the slides of the first two lectures (see schedule below), and the Privacy Wiki (and the pointers to further resources therein).

Schedule (spring 2021)

Lectures take place from 10:30 to 12:15 on Thursday.

Location HG 00.307, so yes, this course is taught physically! (Yeah!) Unfortunately, due to the extended lockdown, this course will initially be taught online. We will see how the situation develops and hope to move to real-life teaching. We will discuss this in the first online lecture further. We will use Big Blue Button for the online lectures. Please find the link in Brightspace.

Presence is normally speaking mandatory, but given the COVID-19 situation special rules apply. In particular, stay home if you have symptoms or tested positive. If you are at risk or feel uncomfortable to attend, please contact me before the start of the course to discuss possibilities.

Slides of presentations that are available are linked from here. The links are released after the lecture.

Date Topic Deadline
28-1 Course overview and Privacy: an overview, by Jaap-Henk Hoepman
4-2 Basic techniques, by Jaap-Henk Hoepman.
11-2 Basic techniques (continued), by Jaap-Henk Hoepman.
18-2 (no lecture)
25-2 (no lecture)
4-3 Privacy Friendly location based services (Lorenoz Casini, Arun Venugopal,Jana Vojnović)
11-3 Privacy in Asynchronous messaging (Floris Hendriks, Rico Janssen, Bart van Vulpen)
18-3 (no lecture)
25-3 (no lecture)
1-4 (no lecture)
8-4 Anonymous cryptocurrencies (Roland Leferink, Wietze Mulder, Joren Vrancken) Deadline paper skeleton
15-4 Searching in encrypted databases (Lars Kuipers, Steven Wallis de Vries, Niels Wikkerink)
22-4 Privacy friendly search (Laura Philipse, Tom Stock, and Alessandra van Veen)
29-4 Privacy in databases (Marc van de Werfhorst, Matti Eisenlohr, and Egidius Mysliwietz)
6-5 (no lecture)
13-5 (no lecture)
20-5 Revocable privacy (Romy Stähli, Charlotte Leuverink, Job Doesburg)
27-5 Privacy friendly identity management (David Vonk, Niek van Sabben, Björn Kraal)
3-6 Privacy friendly revocation of credentials
10-6 Secure multiparty computation
13-6 Deadline student paper

Last Version -
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman
Email: jhh@cs.ru.nl