Skip to the content.

ECE598DA Topics in Information-Theoretic Cryptography

Description

In this course, we will study foundational and recent work on the use of information theory to design and analyze cryptographic protocols. We will begin by studying privacy attacks which motivate strong privacy and security definitions. Then, we will explore the basics of differential privacy and study some core works on zero-knowledge proofs. Finally, we will explore various applications, including watermarking of generative models.

Meeting Times/Days

1hr 20 mins (9:30AM - 10:50AM) on Tuesdays and Thursdays

Location

Room 2015 in the Electrical & Computer Engineering Building

Instructor

Daniel Alabi

Office Hours: 11AM-12PM on Tuesdays (CSL 118) and by appointment

Prerequisites

Prerequisite overrides will be considered by the instructor on a case-by-case basis.

Schedule

Week 1: Introduction: motivations, one-time pad review, talking drums, probability theory review

Readings:

Exercises for Week 1

Week 2: Attacks on Privacy, Security, Valuation

Readings:

Exercises for Week 2

Week 3: Standard Mechanisms for Differential Privacy and Composition

Readings:

Exercises for Week 3

Week 4: Information-Theoretic Lower Bounds for Differential Privacy

Readings:

Week 5: Differentially Private Statistical Estimation and Testing

Readings:

Week 6: Privacy for Distributed Computing

Readings:

Week 7: Zero-Knowledge Proofs

Readings:

Week 8: Statistical Zero-Knowledge Proofs: Part I

Readings:

Week 9: Statistical Zero-Knowledge Proofs: Part II

Readings:

Week 10: Multi-Party Computation

Readings:

Week 11: Multi-Party Differential Privacy

Readings:

Week 12: Computational Differential Privacy

Readings:

Week 13: More Applications and Project Topics

Week 14: Project Presentations

Grading Policy

Class Participation (30%)

Exercises (0%)

Quiz (10%)

Project (60%)

Students will work on projects related to one or more of the covered topics. The project is divided into four components: