Date | Additional resources / notes |
---|---|
Module 1
(Slides) What is Privacy? | |
May 6 |
Video
Solove, 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy, 2007 |
Module 2
(Slides) Background | |
May 8 |
Video
McCullagh, How Pakistan knocked YouTube offline (and how to make sure it never happens again), 2008 |
May 13 | Video |
May 15 | Video |
May 16 | Assignment 0 due |
Module 3
(Slides) Privacy in Computation: Distributed Trust | |
May 20 | Victoria Day: no class |
May 21 | Class on Tuesday (Victoria Day makeup) Video |
May 22 | Video |
May 27 |
Video
Devet et al., Optimally Robust Private Information Retrieval, 2012 |
May 27 | Assignment 1 due |
May 29 | Video |
Jun 3 |
Video
Drijvers et al., On the Security of Two-Round Multi-Signatures, 2019 Komlo and Goldberg, FROST: Flexible Round-Optimized Schnorr Threshold Signatures, 2020 |
Module 4
(Slides) Privacy in Computation: Trusted Hardware | |
Jun 5 | Video |
Jun 10 |
Video
Sasy et al., Fast Fully Oblivious Compaction and Shuffling, 2022 |
Jun 12 |
Video
Sasy et al., Waks-On/Waks-Off: Fast Oblivious Offline/Online Shuffling and Sorting with Waksman Networks, 2023 Stefanov et al., Path ORAM: An Extremely Simple Oblivious RAM Protocol, 2018 |
Module 5
(Slides) Privacy in Computation: Homomorphic Encryption | |
Jun 17 | Video |
Jun 19 | Video |
Jun 20 | Assignment 2 due |
Jun 24 |
Video
Akhavan Mahdavi and Kerschbaum, Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators, 2022 |
Module 6
(Slides) Privacy in Communication: Protecting Metadata | |
Jun 26 | Video |
Jul 1 | Canada Day: no class |
Jul 3 |
Video
Sasy and Goldberg, SoK: Metadata-Protecting Communication Systems, 2024 Kuhn et al., On Privacy Notions in Anonymous Communication, 2019 |
Jul 8 | Video |
Jul 10 | Video |
Jul 15 | PETS: no class |
Jul 17 | PETS: no class |
Jul 22 | Assignment 3 due |
Module 7
(Slides) Privacy in Communication: Censorship Resistance | |
Jul 22 | Video |
Jul 24 |
Video
Bock et al., Geneva: Evolving Censorship Evasion Strategies, 2019 |
Jul 29 |
Video
Kon et al., SpotProxy: Rediscovering the Cloud for Censorship Circumvention, 2024 Tulloch and Goldberg, Lox: Protecting the Social Graph in Bridge Distribution, 2023 |
Aug 8 | Assignment 4 due |