Advanced topics on privacy enhancing technologies
CS-523
Additional Materials
This page is part of the content downloaded from Additional Materials on Sunday, 29 June 2025, 20:56. Note that some content and any files larger than 50 MB are not downloaded.
Description
These materials will be updated as the lecture goes. Last update: 9th May.
Page content
Lecture 2 - Privacy-preserving Crypto I (Secure Multiparty Computation)
- The pragmatic MPC book covers much more material than we discussed in class. But it is nicely written, and can be a great compendium for studying the topics covered in the class or to explore the same material presented in a slightly different way.
Rough outline of the sections covered in this class:
- Section 1.3: Other applications of MPC protocols
- Section 2.2: Basic Primitives: secret sharing
- Section 3.1: Yao's garbled circuits protocol
- Section 3.3 & 3.4: BGW protocol (we used additive shares; and didn't cover the interactive multiplication protocol). Section 3.4 describes Beaver triplets
- Section 3.7: Semi-honest oblivious transfer protocol
- Bellare-Micali Construction Alternative write-up of the (maliciously secure) Bellare-Micali OT construction.
Lecture 3 - Privacy-preserving Crypto II (Homomorphic encryption)
- A Guide to Fully Homomorphic Encryption - Mostly theory. This paper is far more advanced than what we have seen in the lecture
- SoK: Fully Homomorphic Encryption Compilers - Theory and some practical considerations. Also more advanced than what we have seen in the lecture