- compute on encrypted data;
- build a database that can be queried without the server knowing which parts of it are accessed;
- have anonymous communications;
- make digital cash;
- shuffle cards over the internet;
- organize an election in which the organizers can't cheat;
- have services with access control that keep users untraceable;
- understand attacks against privacy, including de-anoymization/re-identification attacks, profiling, data mining and side-channel attacks;
- identify privacy issues related to mass surveillance and solutions to prevent them.
At the end of this learning unit, the student is able to :
Based on the LO referential of the program « Master in Electrical Engineering », this course contributes to the development, acquisition, and evaluation of the following learnging outcomes :
These themes may include: secure two-party and multi-party protocols, oblivious memories, verifiable voting, crypto-currencies, verifiable computation, anonymous credentials, differential privacy and big data, post-Snowden cryptography.
Due to the COVID-19 crisis, the information in this section is particularly likely to change.Lectures and exercise sessions.
Homeworks and mini-projects may be proposed during the semester.
Due to the COVID-19 crisis, the information in this section is particularly likely to change.The final examination is based on exercises, based on the learning outcomes listed above.
One of more mini-projects may be proposed during the semester and contribute to the final grade.
The practical details are given on Moodle.
- Slides and online references are available from Moodle.