• kth.se
  • Student web
  • Intranet
  • kth.se
  • Student web
  • Intranet
Login
DD2496/FDD3344HT211
Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)
Skip to content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • Min översikt
  • DD2496/FDD3344HT211
  • Assignments
  • Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)
  • Home
  • Syllabus
  • Modules
  • Assignments
  • Course Evaluation

Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21)

  • Due 22 Sep 2021 by 7:59
  • Points None
  • Available after 1 Sep 2021 at 8:00

Zero-Knowledge Proofs

Required Reading:

1.  Quisquater, Jean-Jacques, et al. "How to explain zero-knowledge protocols to your children." Conference on the Theory and Application of Cryptology. Springer, New York, NY, 1989.

https://link.springer.com/chapter/10.1007/0-387-34805-0_60 Links to an external site. 

2. Hasan, Jahid. "Overview and Applications of Zero Knowledge Proof (ZKP)." Nanjing: Nanjing University of Posts and Telecommunications (2019).

https://www.researchgate.net/publication/342011338_Overview_andApplications_of_Zero_Knowledge_Proof_ZKP Links to an external site. 

 

Optional:

1. Goldwasser, Shafi, Silvio Micali, and Charles Rackoff. "The knowledge complexity of interactive proof systems." SIAM Journal on computing 18.1 (1989): 186-208. 

https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Proof%20Systems/The_Knowledge_Complexity_Of_Interactive_Proof_Systems.pdf Links to an external site. 

 

Location Privacy 

Required Reading:

1. Wernke, Marius, et al. "A classification of location privacy attacks and approaches." Personal and ubiquitous computing 18.1 (2014): 163-175.

https://link.springer.com/content/pdf/10.1007/s00779-012-0633-z.pdf Links to an external site. 

2. Wicker, Stephen B. "The loss of location privacy in the cellular age." Communications of the ACM 55.8 (2012): 60-68.

https://dl.acm.org/doi/pdf/10.1145/2240236.2240255 Links to an external site. 

 

Optional: 

1. How I was able to track the location of any Tinder user. Max Veytsman. Include Security Team Research Blog. 2014. 

https://blog.includesecurity.com/2014/02/how-i-was-able-to-track-the-location-of-any-tinder-user/ Links to an external site. 

2.  Vulnerability in Bumble dating app reveals any user's exact location. Robert Heaton. robertheaton.com. 2021. 

https://robertheaton.com/bumble-vulnerability/ Links to an external site. 

3.  Fitness tracking app Strava gives away the location of secret US army bases. Alex Hern. The Guardian. 2018.

https://www.theguardian.com/world/2018/jan/28/fitness-tracking-app-gives-away-location-of-secret-us-army-bases Links to an external site. 

1632290399 09/22/2021 07:59am
Please include a description
Additional comments:
Rating max score to > Pts
Please include a rating title

Rubric

Find rubric
Please include a title
Find a rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
Total points: 5 out of 5
Previous
Next
Reading: GDPR info and case studies, terminology (before class with Liane Colonna 20/9/21) Reading: Privacy by Design, Homomorphic Encryption (before group presentations 29/9/21)