Weekly Topics Breakdown
Week | Date | Planned Topic | Lecture
notes |
References |
1 | 8/25/2024 | Introduction - Course Logistics | Introduction | |
8/27/2024 | Review number theory | Lecture 1 | Forouzan - Ch. 2 | |
2 | 9/1/2024 | Review number theory | Lecture 2 | Forouzan - Ch. 9 |
9/3/2024 | Review number theory | Lecture 3 | Forouzan - Ch. 10 | |
3 | 9/8/2024 | Introduction to Lattice | Lecture 4 |
CSC 2414
Lattices in Computer Science Lecture 1 by Vinod Vaikuntanathan |
9/10/2024 | LWE-based Cryptgraphy |
Lecture 5 Lecture 5(updated) |
Medium article | |
4 | 9/15/2024 | Partial Homomorphic Encryption (PHE) | Lecture 6 | |
9/17/2024 | Partial Homomorphic Encryption (PHE) | Lecture 7 | ||
5 | National Day break | |||
9/24/2024 | Class Canceled | |||
6 | 9/29/2024 | Somewhat Homomorphic Encryption (SHE) - BGN | Lecture 8 | Evaluating 2-DNF Formulas on Ciphertexts |
10/1/2024 | Bootstrapping | Lecture 9 | ||
7 | 10/6/2024 | Leveled HE (GSW) | Lecture 10 |
|
10/8/2024 | FHE Over integers | Lecture 11 | ||
8 | 10/13/2024 | No class | ||
10/15/2024 | BFV, BGV, CKKS | BFV (notes,
paper) Introudction to BGV (notes, paper) Introduction to CKKS (notes, paper) |
||
9 | 10/20/2024 | BFV, BGV, CKKS | Introduction to CKKS (notes, paper) | |
10/22/2024 | BFV, BGV, CKKS | Introduction to CKKS (notes, paper) | ||
10 | 10/27/2024 | Secret Sharing | Lecture 14 | Ch. 2, Privacy-Preserving Computing |
10/29/2024 | Shamir's, CRT-based, Blakely | Lecture 15 | Ch. 2, Privacy-Preserving Computing | |
11 | 11/3/2024 | Oblivious Transfer | Lecture 16 | Ch. 4
Privacy-Preserving Computing Lin, Hsiao-Ying, and Wen-Guey Tzeng. "An efficient solution to the millionaires’ problem based on homomorphic encryption." In Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings 3, pp. 456-466. Springer Berlin Heidelberg, 2005. |
11/5/2024 | Oblivious Transfer | Lecture 17 |
Naor, Moni, and Benny Pinkas. "Oblivious transfer and polynomial evaluation." In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 245-254. 1999.Beaver, Donald. "Precomputing oblivious transfer." In Annual International Cryptology Conference, pp. 97-109. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. https://www.cs.umd.edu/~jkatz/gradcrypto2/f13/lecture4.pdf |
|
12 | 11/17/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit |
11/19/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit | |
13 | 11/24/2024 | Project Progress | ||
11/26/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit | |
14 | 12/1/2024 | No classs | ||
12/3/2024 | No classs | |||
15 | 12/8/2024 | Applications | Paper Discussion | BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers (Paper) |
12/10/2024 | Applications | Paper Discussion | Efficient
and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data (Paper) |
|
12/15/2024 | No classs |