Privacy Seminar 2021
This is the main web site for the Privacy Seminar (NWI-I00136) of the TRU/e security master.
In this seminar we will explore the state of the art in privacy enhancing technologies (PET), and discuss theories (technical, legal and societal) of privacy.
AnnouncementsThe following topics have been claimed so far:
- Anonymous cryptocurrencies
- Searching in encrypted databases
- Privacy friendly search
- Privacy in Asynchronous messaging
- Privacy friendly revocation of credentials
- Revocable privacy
- Privacy Friendly location based services
- Privacy in databases
- Privacy friendly identity management
- Secure multiparty computation
OrganisationThe course code is NWI-I00136.
You will do, in groups of two, a small research project on a particular topic, chosen from a list. The idea is to let you first investigate a particular practical case (what are the privacy issues from a legal and societal perspective, how are they dealt with), and then let you perform some research using particular PETs to solve the problem.
You can use the discussion list on Brightspace to find group partners.
Working in groups means that you have to divide tasks equally, make a planning, and make sure that you stick to your part while verifying the others are making progress as planned. Cooperation is the keyword here; don't split the task in separate and totally independent parts on which each of you works completely independently. Regularly meet virtually, and discuss and review each others work. You are all responsible for the overall quality of the work and the nature of the collaboration. Should anything go wrong, contact me sooner rather than later.
Presence at all lectures is mandatory! (Not present without a valid reason = fail!). Valid reasons are: illness, accident, other study obligation (like exams, study trip), important family events. Invalid reasons are: holidays, trips etc, even if booked before the course started, and many many others.
The final grade = (2 * grade for paper + 1 * grade for presentation ) / 3. If the grade for the paper or presentation is below 5.5, the lowest grade is the final grade!
- Leerdoelen en toetsing (in Dutch, but outdated for this peculiar year...).
- Presentation grading sheet
- Paper grading sheet
PrerequisitesYou should have successfully completed the Cryptography course.
LecturesThe first few lectures will be spent on outlining the course and the area of privacy enhancing technologies. Slides of the lectures will become available after the lecture.
WikiThe course is supported by a wiki, to which all are invited to contribute. You can go the wiki to request an account to get edit rights.
DeadlinesThe paper skeleton must be submitted on or before April 8. Deadline for the final paper is June 13 (a Sunday). Both deadlines: 12 o'clock noon.
- Jaap-Henk Hoepman: Privacy is Hard and Seven Other Myths: Achieving Privacy Through Design (draft December 31, 2019). See Brightspace.
- Jaap-Henk Hoepman and Marc van Lieshout: Privacy. Chapter of a book.
- Jeroen van den Hoven, Martijn Blaauw, Wolter Pieters, Martijn Warnier, Privacy and Information Technology, The Stanford Encyclopedia of Philosophy.
- G. Danezis et. al., Privacy and Data Protection by Design, ENISA Report, December 2014.
- Jaap-Henk Hoepman, Privacy Design Strategies. The Little Blue Book, May, 2018.
- Bits of Freedom, Fix the system, not the symptoms, 2019.
- Slide deck on how to write a good research paper.
- David Labaree on Schooling, History, and Writing.
- Advice on Research and Writing
- Lejla Batina and Peter Schwabe: How to write a paper
- Pinker, S. (2015). The sense of style: The thinking person's guide to writing in the 21st century. Penguin Books.
- Leith, S. (2017). Write to the Point: How to be Clear, Correct and Persuasive on the Page. Profile Books.
See also the slides of the first two lectures (see schedule below), and the Privacy Wiki (and the pointers to further resources therein).
Schedule (spring 2021)Lectures take place from 10:30 to 12:15 on Thursday.
Location HG 00.307, so yes, this course is taught physically! (Yeah!)
Unfortunately, due to the extended lockdown, this course will initially be taught online. We will see how the situation develops and hope to move to real-life teaching. We will discuss this in the first online lecture further. We will use Big Blue Button for the online lectures. Please find the link in Brightspace.
Presence is normally speaking mandatory, but given the COVID-19 situation special rules apply. In particular, stay home if you have symptoms or tested positive. If you are at risk or feel uncomfortable to attend, please contact me before the start of the course to discuss possibilities.
Slides of presentations that are available are linked from here. The links are released after the lecture.
|28-1||Course overview and Privacy: an overview, by Jaap-Henk Hoepman|
|4-2||Basic techniques, by Jaap-Henk Hoepman.|
|11-2||Basic techniques (continued), by Jaap-Henk Hoepman.|
|4-3||Privacy Friendly location based services (Lorenoz Casini, Arun Venugopal,Jana Vojnović)|
|11-3||Privacy in Asynchronous messaging (Floris Hendriks, Rico Janssen, Bart van Vulpen)|
|8-4||Anonymous cryptocurrencies (Roland Leferink, Wietze Mulder, Joren Vrancken)||Deadline paper skeleton|
|15-4||Searching in encrypted databases (Lars Kuipers, Steven Wallis de Vries, Niels Wikkerink)|
|22-4||Privacy friendly search (Laura Philipse, Tom Stock, and Alessandra van Veen)|
|29-4||Privacy in databases (Marc van de Werfhorst, Matti Eisenlohr, and Egidius Mysliwietz)|
|20-5||Revocable privacy (Romy Stähli, Charlotte Leuverink, Job Doesburg)|
|27-5||Privacy friendly identity management (David Vonk, Niek van Sabben, Björn Kraal)|
|3-6||Privacy friendly revocation of credentials|
|10-6||Secure multiparty computation|
|13-6||Deadline student paper|
Last Version -
(Note: changeover from CVS to dotless svn version numbers on Jan 19, 2008, and changeover to GIT versioning on May 30, 2013.)
Maintained by Jaap-Henk Hoepman