Weekly Topics Breakdown
| Week | Date | Planned Topic | Lecture
notes |
References |
| 1 | 8/25/2024 | Introduction - Course Logistics | Introduction | |
| 8/27/2024 | Review number theory | Lecture 1 | Forouzan - Ch. 2 | |
| 2 | 9/1/2024 | Review number theory | Lecture 2 | Forouzan - Ch. 9 |
| 9/3/2024 | Review number theory | Lecture 3 | Forouzan - Ch. 10 | |
| 3 | 9/8/2024 | Introduction to Lattice | Lecture 4 |
CSC 2414
Lattices in Computer Science Lecture 1 by Vinod Vaikuntanathan |
| 9/10/2024 | LWE-based Cryptgraphy |
Lecture 5 Lecture 5(updated) |
Medium article | |
| 4 | 9/15/2024 | Partial Homomorphic Encryption (PHE) | Lecture 6 | |
| 9/17/2024 | Partial Homomorphic Encryption (PHE) | Lecture 7 | ||
| 5 | National Day break | |||
| 9/24/2024 | Class Canceled | |||
| 6 | 9/29/2024 | Somewhat Homomorphic Encryption (SHE) - BGN | Lecture 8 | Evaluating 2-DNF Formulas on Ciphertexts |
| 10/1/2024 | Bootstrapping | Lecture 9 | ||
| 7 | 10/6/2024 | Leveled HE (GSW) | Lecture 10 |
|
| 10/8/2024 | FHE Over integers | Lecture 11 | ||
| 8 | 10/13/2024 | No class | ||
| 10/15/2024 | BFV, BGV, CKKS | BFV (notes,
paper) Introudction to BGV (notes, paper) Introduction to CKKS (notes, paper) |
||
| 9 | 10/20/2024 | BFV, BGV, CKKS | Introduction to CKKS (notes, paper) | |
| 10/22/2024 | BFV, BGV, CKKS | Introduction to CKKS (notes, paper) | ||
| 10 | 10/27/2024 | Secret Sharing | Lecture 14 | Ch. 2, Privacy-Preserving Computing |
| 10/29/2024 | Shamir's, CRT-based, Blakely | Lecture 15 | Ch. 2, Privacy-Preserving Computing | |
| 11 | 11/3/2024 | Oblivious Transfer | Lecture 16 | Ch. 4
Privacy-Preserving Computing Lin, Hsiao-Ying, and Wen-Guey Tzeng. "An efficient solution to the millionaires’ problem based on homomorphic encryption." In Applied Cryptography and Network Security: Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005. Proceedings 3, pp. 456-466. Springer Berlin Heidelberg, 2005. |
| 11/5/2024 | Oblivious Transfer | Lecture 17 |
Naor, Moni, and Benny Pinkas. "Oblivious transfer and polynomial evaluation." In Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 245-254. 1999.Beaver, Donald. "Precomputing oblivious transfer." In Annual International Cryptology Conference, pp. 97-109. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. https://www.cs.umd.edu/~jkatz/gradcrypto2/f13/lecture4.pdf |
|
| 12 | 11/17/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit |
| 11/19/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit | |
| 13 | 11/24/2024 | Project Progress | ||
| 11/26/2024 | Garbled Circuits | Lecture 18 | Ch. 5 Garbled Circuit | |
| 14 | 12/1/2024 | No classs | ||
| 12/3/2024 | No classs | |||
| 15 | 12/8/2024 | Applications | Paper Discussion | BOLT: Privacy-Preserving, Accurate and Efficient Inference for Transformers (Paper) |
| 12/10/2024 | Applications | Paper Discussion | Efficient
and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data (Paper) |
|
| 12/15/2024 | No classs |