Seminar Secure Computation
How can an algorithm be executed such that the computing device does not get to see what it computes? How can privacy in online services be maintained? Can one compute with encrypted data? What does it take to carry out an auction with secret inputs, a distributed voting application, private bidding schemes and sealed-bid auctions without a trusted party? This seminar will cover fundamental techniques and protocols that answer these questions. The topics range from secure multiparty computation protocols that rely on cryptography to trusted execution environments based on secure hardware processors.
T1 – Distributed Systems |
T4 – Logic
The seminar will start with an overview of the topic, where some basic principles are introduced. The main content consists of interactive presentations by the participants, on the basis of the existing literature, ranging from classic research papers to recently developed systems. In addition, students as well as members of the cryptology and data security research group will present their own current work.
Christian Cachin |
The course page in ILIAS can be found at https://ilias.unibe.ch/goto_ilias3_unibe_crs_1531306.html.
Schedules and Rooms
|Schedule||Wednesday, 10:15 - 12:00|
|Location||UniBE, Schützenmattstrasse 14|
|Evaluation type||continuous evaluation|