Reading: Privacy by Design, Homomorphic Encryption (before group presentations 29/9/21)
- Due 29 Sep 2021 by 7:59
- Points None
- Available after 1 Sep 2021 at 8:00
Privacy by Design
Required Reading:
1. Understanding how to implement Privacy by Design
Cavoukian, Ann. "Understanding How to Implement Privacy by Design, One Step at a Time." IEEE Consumer Electronics Magazine 9.2 (2020): 78-82.
https://ieeexplore.ieee.org/document/8977606 Links to an external site.
2. Another perspective, the challenges with PbD
Spiekermann, Sarah. "The challenges of privacy by design." Communications of the ACM 55.7 (2012): 38-40.
Optional:
1. Cavoukian, Ann. "Privacy by design: The 7 foundational principles." Information and privacy commissioner of Ontario, Canada 5 (2009): 12.
Homomorphic Encryption
Required Reading:
1. Archer, David, et al. "Applications of homomorphic encryption." HomomorphicEncryption. org, Redmond WA, Tech. Rep. (2017).
2. Fontaine, Caroline, and Fabien Galand. "A survey of homomorphic encryption for nonspecialists." EURASIP Journal on Information Security 2007 (2007): 1-10.
https://link.springer.com/content/pdf/10.1155/2007/13801.pdf Links to an external site.
Optional:
1. Hirt, Martin, and Kazue Sako. "Efficient receipt-free voting based on homomorphic encryption." International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2000.
https://link.springer.com/content/pdf/10.1007%2F3-540-45539-6_38.pdf Links to an external site.