Objectives:
Privacy is a fundamental human right, which is especially critical in IoT and Big Data era. To support this right, Privacy
enhancing techniques play a fundamental role in the design and development of information and communication
systems. This course aims to provide an opportunity for undergraduate and graduate students at Faculty of Computer
Science, UNB, to obtain a fundamental but practical knowledge of privacy enhancing techniques in response to the
emerging threats to public information security and personal privacy. This course covers diverse topics on privacy
enhancing techniques including privacy techniques for database and big data, basic cryptographic techniques for privacy,
homomorphic encryption techniques, anonymous communication network techniques, private information retrieval,
oblivious protocols, zero knowledge proofs, private matching protocols in mobile social networks, searchable encryption
and secure data sharing in cloud computing, and privacy-preserving data aggregation in smart grid. Emphasis is given on
both theoretical aspects and practical applications of privacy enhancing techniques.
1. Understand the basic concepts of privacy and privacy requirements in practical scenarios
2. Understand the privacy techniques for database and big data, including differential privacy techniques
3. Understand the basic concepts of symmetric encryption, hash function and public key cryptography
4. Understand some typical homomorphic encryption techniques, i.e., Paillier public key encryption, Boneh-
Goh-Nissim (BGN) public key encryption
5. Understand the anonymous communication network techniques
6. Understand the private information retrieval techniques
7. Understand the oblivious protocols
8. Understand the zero knowledge proofs and privacy-preserving credential techniques
9. Design private matching protocols in mobile social networks
10. Design secure data sharing in cloud computing
11. Design privacy-preserving data aggregation in smart grid
12. Explore new privacy topics with ease and confidence
Reference Material:
This course will be using a combination of lecture notes and the textbook:
Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu, Differential Privacy and Applications, Springer; 1st ed. 2017
edition, ISBN-10: 9783319620022, ISBN-13: 978-3319620022
A good reference book or cyber security is also strongly recommended. In the event that materials from different
sources conflicts, the version given in class and lecture notes should be followed.
Recommended References:
+ S. Zeadally and M. Badra, Privacy in a Digital, Networked World: Technologies, Implications and Solutions, Springer
Publishing Company, 2015, ISBN:3319084690 9783319084695
+ W. Mao, Modern Cryptography: Theory and Practice. Prentice Hall PTR, 2003, ISBN: 0130669431
+ D. Stinson, Cryptography: Theory and Practice (Third Edition). CRC Press, 2005, 978-1584885085
+ Papers of interest from selected conferences and journals by the Instructor
Lecture notes and other additional course material, including project requirements and assignments, will be available
on Desire2Learn.
Evaluation:
1 Group-based Project: 20%
Report 15% (6-page report for CS6413, 3-page report for CS4413)
Presentation 5% (20-minute presentation + 5-minute Q&A)
2 Theory Assignments: 15%
2 Programming Assignments: 15%
1 Midterm: 20% (Friday, March 1, 2019)
1 Final: 30%
Note that you must pass the project (50% or higher) in order to pass the course. You must also pass the assignments (50%
or higher average overall for the assignments) in order to pass the course. The midterm is scheduled for Friday, March 1,
2019, unless subsequently changed.
All material presented in class will be in the lecture notes, but may not be in the textbook. You are required to take
notes for those useful discussions in class.
All assignments should include a header or title page with the following information: Name, Student Number, Course
Number, and Assignment Number. The source code in the assignments must be handed in as hard copy (as part of your
assignment) and also submitted electronically using Desire2Learn so that it can be compiled and tested.
The group-based project must be handed in as hard copy to the Instructor’s office (GE 114) by the due date and time
and also submitted electronically using D2L. Note that, each group is formed by no more than 3 people, and all
members in the same group will receive the same grade in the project.
Topics (in approximate order):
Course overview, and review some basic cryptographic techniques for privacy including symmetric encryption,
hash function, and public key encryption
Understand the privacy techniques for database and big data, including differential privacy techniques
Homomorphic cryptographic techniques for privacy
Anonymous communication network techniques
Private information retrieval techniques, Oblivious protocols
Zero knowledge proof techniques
Private matching protocols in mobile social networks
Secure data sharing in cloud computing
Privacy-preserving data aggregation in smart grid
Some topics may be rearranged.
ACADEMIC OFFENCES (from Undergraduate Calendar)
A. PLAGIARISM
Plagiarism includes:
1. quoting verbatim or almost verbatim from any source, regardless of format, without acknowledgement;
2. adopting someone else's line of thought, argument, arrangement, or supporting evidence (such as, statistics, bibliographies, etc.) without
indicating such dependence;
3. submitting someone else's work, in whatever form (essay, film, workbook, artwork, computer materials, etc.) without acknowledgement;
4. knowingly representing as one's own work any idea of another.
NOTE: In courses which include group work, a penalty may be imposed on all members of the group unless an act of plagiarism is identified clearly
with an individual student or students.