Overview of Topics

Overview of Topics

Topics are marked with either building block (BB) or system (SYS).

 

BB: Private Information Retrieval (Single Server) (Omkar Kute)

Private information retrieval schemes retrieve records from a server without revealing to the server(s) which records they retrieved. This is a key building block in many privacy-enhancing systems. The papers in this block only use a single server.

#crypto

 

BB: Private Information Retrieval (Multiple Servers) (Fatjon Kuci)

Private information retrieval schemes retrieve records from a server without revealing to the server(s) which records they retrieved. This is a key building block in many privacy-enhancing systems. The papers in this block use multiple servers and a non-collusion assumption.

#crypto #lotsofcrypto

 

BB: Anonymous Communication (Onion/Mix) (Animesh Kumar Aashu)

Anonymous communication systems hide who is communicating with whom. In this week you'll be reading two legendary papers in this area. Loopix provides better protection than Tor, but this protection comes at a cost.

 

BB: Anonymous Communication (DC-Nets) (Jonas Birtel)

Anonymous communication systems hide who is communicating with whom. Whereas in the previous week, we looked at system that would admit a small amount of leakage, protocols based on dining cryptographer networks can provide much stronger guarantees.

 

BB: Anonymous Communication (Wrapup) (Robin Wiesen)

Anonymous communication systems hide who is communicating with whom. In this week, we'll look at two systems that try to balance leakage and performance in anonymous communication.

 

BB: Private Set Intersection (Tim Rausch)

Private set intersection protocols compute the intersection of two sets without leaking any other information. These protocols are for example used for private contact discovery.

#crypto

 

SYS: Content Moderation (Mahmoud Altaha)

These content moderation systems aims to mitigate the damage that might result from end-to-end encryption online.

These papers are a bit lighter on hard scientific content, but raise a lot of interesting questions for discussion.

 

SYS: Compromised Credential Checking (Luc Seyler)

Compromised Credential Checking (C3) systems (such as Have I Been Powned) let users check whether their passwords have been leaked, without creating new risks for users.

 

SYS: Systems for Journalists (Simran Munot)

The first paper is a bit of a weird one, instead looking at the needs of a community. All the technical weight (and there is plenty) is in the second paper.

  • Main Paper: Susan E. McGregor, Polina Charters, Tobin Holliday, Franziska Roesner:
    Investigating the Computer Security Practices and Needs of Journalists. USENIX Security Symposium 2015: 399-414
  • Follow-up Paper: Kasra Edalatnejad, Wouter Lueks, Julien Pierre Martin, Soline Ledésert, Anne L'Hôte, Bruno Thomas, Laurent Girod, Carmela Troncoso:
    DatashareNetwork: A Decentralized Privacy-Preserving Search Engine for Investigative Journalists. USENIX Security Symposium 2020: 1911-1927

 

SYS: Systems for Humanitarians (Sahibzada Amin)

As for the journalist setting, the first paper is actually an HCI paper, studying the needs of a community. The second paper has a lot of technical depth.

 

SYS: Reputation Systems (not assigned)

Another way to combat misbehaviour by anonymous users is to assign them a reputation. In this week, we would look at privacy-friendly ways to track a user's reputation.

(A review for this week should be for the main paper, not the follow-up paper.)

#crypto

 

SYS: "Blocking" Users (not assigned)

In this week we look at two (quite different) ways to block users or avoid blocking users.

 

SYS: Digital Contact Tracing (not assigned)

Digital contact tracing systems aim to help mitigate pandemics. These papers have a little bit of crypto, but are overall quite readable.

  • Classic Paper: Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
    Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020)
  • Follow-up Paper: Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradou, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy: Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems. Digit. Threat.: Res. Pract. 3, 3, Article 28 (September 2022)

I deliberately left the "original" DP3T paper here, but calling this a paper would be a little bit of a stretch. For something a little bit more retrospective, you might also enjoy reading:

  • Carmela Troncoso, Dan Bogdanov, Edouard Bugnion, Sylvain Chatel, Cas Cremers, Seda F. Gürses, Jean-Pierre Hubaux, Dennis Jackson, James R. Larus, Wouter Lueks, Rui Oliveira, Mathias Payer, Bart Preneel, Apostolos Pyrgelis, Marcel Salathé, Theresa Stadler, Michael Veale: Deploying decentralized, privacy-preserving proximity tracing. Commun. ACM 65(9): 48-57 (2022)

 

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.