DD2496/FDD3344HT211
    Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)
    Skip to content
    Dashboard
    • Login
    • Dashboard
    • Calendar
    • Inbox
    • Help
    Close
    • Min översikt
    • DD2496/FDD3344HT211
    • Assignments
    • Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)
    • Home
    • Syllabus
    • Modules
    • Assignments

    Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)

    • Due 22 Sep 2021 by 7:59
    • Points None
    • Available after 1 Sep 2021 at 8:00

    Zero-Knowledge Proofs

    Required Reading:

    1.  Quisquater, Jean-Jacques, et al. "How to explain zero-knowledge protocols to your children." Conference on the Theory and Application of Cryptology. Springer, New York, NY, 1989.

    https://link.springer.com/chapter/10.1007/0-387-34805-0_60 

    2. Hasan, Jahid. "Overview and Applications of Zero Knowledge Proof (ZKP)." Nanjing: Nanjing University of Posts and Telecommunications (2019).

    https://www.researchgate.net/publication/342011338_Overview_andApplications_of_Zero_Knowledge_Proof_ZKP 

     

    Optional:

    1. Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. "The knowledge complexity of interactive proof systems." SIAM Journal on computing 18.1 (1989): 186-208. 

    https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Proof%20Systems/The_Knowledge_Complexity_Of_Interactive_Proof_Systems.pdf 

     

    Location Privacy 

    Required Reading:

    1. Wernke, Marius, et al. "A classification of location privacy attacks and approaches." Personal and ubiquitous computing 18.1 (2014): 163-175.

    https://link.springer.com/content/pdf/10.1007/s00779-012-0633-z.pdf 

    2. Wicker, Stephen B. "The loss of location privacy in the cellular age." Communications of the ACM 55.8 (2012): 60-68.

    https://dl.acm.org/doi/pdf/10.1145/2240236.2240255 

     

    Optional: 

    1. How I was able to track the location of any Tinder user. Max Veytsman. Include Security Team Research Blog. 2014. 

    https://blog.includesecurity.com/2014/02/how-i-was-able-to-track-the-location-of-any-tinder-user/ 

    2.  Vulnerability in Bumble dating app reveals any user's exact location. Robert Heaton. robertheaton.com. 2021. 

    https://robertheaton.com/bumble-vulnerability/ 

    3.  Fitness tracking app Strava gives away the location of secret US army bases. Alex Hern. The Guardian. 2018.

    https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases 

    1632290399 09/22/2021 07:59am
    Additional comments:
    Rating max score to > Pts

    Rubric

     
     
     
     
     
     
     
         
    Can't change a rubric once you've started using it.  
    Find a rubric
    Find rubric
    Title
    You've already rated students with this rubric. Any major changes could affect their assessment results.
    Title
    Criteria Ratings Pts
    Edit criterion description Delete criterion row
    This criterion is linked to a learning outcome Description of criterion
    threshold: 5 pts
    Edit rating Delete rating
    5 to >0 Pts
    Full marks
    blank
    Edit rating Delete rating
    0 to >0 Pts
    No marks
    blank_2
    This area will be used by the assessor to leave comments related to this criterion.
    pts
      / 5 pts
    --
    Additional comments
    Total points: 5 out of 5