Reading: Provable Privacy (before group presentation 14/10/21, 10-12h)
- Due 14 Oct 2021 by 9:59
- Points None
- Available after 1 Sep 2021 at 8:00
Provable Privacy
Required Reading:
- Why do we need provable privacy? Easy to read blog post introducing the
field of research.
Kaafar, Dali, et al. "From Probably Private to Provable Privacy: On the
Need for Rigorous Privacy Treatment for data-driven organisations."
Optus Macquarie University Cyber Security Hub, 4 Mar 2019,
(html) - Longer paper, but first half is a repetition of things already discussed
in class. Then discusses formal methods that could be used to verify
privacy properties, and challenges with these approaches.
Tschantz, Michael Carl, and Jeannette M. Wing. "Formal Methods for
Privacy." FM 2009: Formal Methods, Lecture Notes in Computer Science,
vol 5850, Springer, 2009, pp 1–15.
(pdf)
Optional:
- Formal definition of privacy goals in the context of anonymous
communication. (And winner of best student paper award, presented when PETS was at KTH)
Kuhn, Christiane, et al. "On Privacy Notions in Anonymous
Communication." Proceedings on Privacy Enhancing Technologies 2,
Sciendo, 2019, pp 105–125.
(pdf) - Using behavioural equivalences to analyse privacy properties of e.g.
RFID protocols.
Delaune, Stéphanie. "Analysing Privacy-Type Properties in Cryptographic
Protocols." 3rd International Conference on Formal Structures for
Computation and Deduction, Leibniz International Proceedings in
Informatics 108, Leibniz-Zentrum fuer Informatik, 2018, pp 1–20.
(pdf)