Privacy Enhancing technology

lelec2770  2019-2020  Louvain-la-Neuve

Privacy Enhancing technology
Note from June 29, 2020
Although we do not yet know how long the social distancing related to the Covid-19 pandemic will last, and regardless of the changes that had to be made in the evaluation of the June 2020 session in relation to what is provided for in this learning unit description, new learnig unit evaluation methods may still be adopted by the teachers; details of these methods have been - or will be - communicated to the students by the teachers, as soon as possible.
5 credits
30.0 h + 30.0 h
Pereira Olivier (coordinator); Standaert François-Xavier;
Familiarity with the basic notions of cryptography is welcome
Main themes
The exact course topics will change from year to year. Examples of relevant topics include techniques that make it possible to :
  • compute on encrypted data;
  • build a database that can be queried without the server knowing which parts of it are accessed;
  • have anonymous communications;
  • make digital cash;
  • shuffle cards over the internet;
  • organize an election in which the organizers can't cheat;
  • have services with access control that keep users untraceable;
  • understand attacks against privacy, including de-anoymization/re-identification attacks, profiling, data mining and side-channel attacks;
  • identify privacy issues related to mass surveillance and solutions to prevent them.

At the end of this learning unit, the student is able to :

1 Based on the LO referential of the program « Master in Electrical Engineering », this course contributes to the development, acquisition, and evaluation of the following learnging outcomes :
  • AA1.2, AA1.3,
  • AA2.2, AA2.3, AA2.5,
  • AA3.1,
  • AA5.1, AA5.3, AA5.4, AA5.6,
  • AA6.1, AA6.2, AA6.3
Specific learning outcomes of the course
  • At the end of this class, the student will be able to  :
  • Analyze the risks of attacks against correctness and privacy for a concrete system
  • Understand cryptographic and architectural tools allowing to mitigate privacy issues
  • Evaluate utility and privacy metrics for databases and distributed systems

The contribution of this Teaching Unit to the development and command of the skills and learning outcomes of the programme(s) can be accessed at the end of this sheet, in the section entitled “Programmes/courses offering this Teaching Unit”.
Various themes will be discussed each year.
These themes may include: secure two-party and multi-party protocols, oblivious memories, verifiable voting, crypto-currencies, verifiable computation, anonymous credentials, differential privacy and big data, post-Snowden cryptography.
Teaching methods
Lectures and exercise sessions.
Evaluation methods
The final examination is based on exercises, based on the learning outcomes listed above. The practical details are given on Moodle.
Des transparents et des références sont disponibles sur le site Moodle du cours.
Faculty or entity

Programmes / formations proposant cette unité d'enseignement (UE)

Title of the programme
Master [120] in Data Science Engineering

Master [120] in Computer Science and Engineering

Master [120] in Mathematical Engineering

Master [120] in Computer Science

Master [120] in Electrical Engineering

Master [120] in Data Science: Information Technology