• kth.se
  • Student web
  • Intranet
  • kth.se
  • Student web
  • Intranet
Login
DD2496/FDD3344HT211
Reading: Privacy by Design, Homomorphic Encryption (before group presentations 29/9/21)
Skip to content
Dashboard
  • Login
  • Dashboard
  • Calendar
  • Inbox
  • History
  • Help
Close
  • Min översikt
  • DD2496/FDD3344HT211
  • Assignments
  • Reading: Privacy by Design, Homomorphic Encryption (before group presentations 29/9/21)
  • Home
  • Syllabus
  • Modules
  • Assignments
  • Course Evaluation

Reading: Privacy by Design, Homomorphic Encryption (before group presentations 29/9/21)

  • Due 29 Sep 2021 by 7:59
  • Points None
  • Available after 1 Sep 2021 at 8:00

Privacy by Design

Required Reading:

1.  Understanding how to implement Privacy by Design 

Cavoukian, Ann. "Understanding How to Implement Privacy by Design, One Step at a Time." IEEE Consumer Electronics Magazine 9.2 (2020): 78-82.

https://ieeexplore.ieee.org/document/8977606 Links to an external site. 

2. Another perspective, the challenges with PbD

Spiekermann, Sarah. "The challenges of privacy by design." Communications of the ACM 55.7 (2012): 38-40.

https://www.researchgate.net/publication/254004794_The_Challenges_of_Privacy_by_Design Links to an external site. 

 

Optional:

1. Cavoukian, Ann. "Privacy by design: The 7 foundational principles." Information and privacy commissioner of Ontario, Canada 5 (2009): 12.

https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf Links to an external site. 

 

Homomorphic Encryption

Required Reading:

1. Archer, David, et al. "Applications of homomorphic encryption." HomomorphicEncryption. org, Redmond WA, Tech. Rep. (2017).

http://homomorphicencryption.org/white_papers/applications_homomorphic_encryption_white_paper.pdf Links to an external site. 

2. Fontaine, Caroline, and Fabien Galand. "A survey of homomorphic encryption for nonspecialists." EURASIP Journal on Information Security 2007 (2007): 1-10.

https://link.springer.com/content/pdf/10.1155/2007/13801.pdf Links to an external site. 

 

Optional: 

1. Hirt, Martin, and Kazue Sako. "Efficient receipt-free voting based on homomorphic encryption." International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2000.

https://link.springer.com/content/pdf/10.1007%2F3-540-45539-6_38.pdf Links to an external site. 

1632895199 09/29/2021 07:59am
Please include a description
Additional comments:
Rating max score to > Pts
Please include a rating title

Rubric

Find rubric
Please include a title
Find a rubric
Title
You've already rated students with this rubric. Any major changes could affect their assessment results.
 
 
 
 
 
 
 
     
Can't change a rubric once you've started using it.  
Title
Criteria Ratings Pts
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
This criterion is linked to a learning outcome Description of criterion
threshold: 5 pts
Edit criterion description Delete criterion row
5 to >0 Pts Full marks blank
0 to >0 Pts No marks blank_2
This area will be used by the assessor to leave comments related to this criterion.
pts
  / 5 pts
--
Additional comments
Total points: 5 out of 5
Previous
Next
Reading: Zero-Knowledge Proofs, Location Privacy (before group presentation 22/9/21) Reading: IoT Privacy, Anonymous Routing (before group presentations 6/10/21)