Beijing Institute of Mathematical Sciences and Applications Beijing Institute of Mathematical Sciences and Applications

  • About
    • President
    • Governance
    • Partner Institutions
    • Visit
  • People
    • Management
    • Faculty
    • Postdocs
    • Visiting Scholars
    • Staff
  • Research
    • Research Groups
    • Courses
    • Seminars
  • Join Us
    • Faculty
    • Postdocs
    • Students
  • Events
    • Conferences
    • Workshops
    • Forum
  • Life @ BIMSA
    • Accommodation
    • Transportation
    • Facilities
    • Tour
  • News
    • News
    • Announcement
    • Downloads
About
President
Governance
Partner Institutions
Visit
People
Management
Faculty
Postdocs
Visiting Scholars
Staff
Research
Research Groups
Courses
Seminars
Join Us
Faculty
Postdocs
Students
Events
Conferences
Workshops
Forum
Life @ BIMSA
Accommodation
Transportation
Facilities
Tour
News
News
Announcement
Downloads
Qiuzhen College, Tsinghua University
Yau Mathematical Sciences Center, Tsinghua University (YMSC)
Tsinghua Sanya International  Mathematics Forum (TSIMF)
Shanghai Institute for Mathematics and  Interdisciplinary Sciences (SIMIS)
BIMSA > Special Topics in Cryptography 2025 Spring \(ICBS\)
Special Topics in Cryptography 2025 Spring
We will focus on the studies of special variants of Private Set Intersection, Private Set Union, and Multi-party Private Set Union, which allow two or more parties to compute set intersections or unions without revealing any additional information.

PSI has found numerous applications including privacy-preserving location sharing, private contact discovery, DNA testing and pattern matching. Similarly, PSU also has many applications in practice, such as cyber risk assessment and management, IP blacklist and vulnerability data aggregation, private DB supporting full join and private ID.

The most efficient PSI protocols [KKRT16, PRTY19, CM20, GPR+21, RS21] mainly rely on symmetric-key operations, except O(κ) public-key operations (where κ is a computational security parameter) in base Oblivious Transfer(OT) used in the OT extension protocol. There are also many variations of PSI, such as PSI-CA [IKN+20], Fuzzy PSI [BP24], Updatable PSI [BMS24] et al. Existing PSU protocols can be broadly divided into two categories based on the underlying cryptographic techniques used. The first category mainly relies on public-key techniques [KS05, Fri07, HN10, DC17], while the second category mainly relies on symmetric key techniques [KRTW19, GMR+21, JSZ+22]. Also depending on the usage scenario, the PSU protocols can be divided into balanced [CZZ+24,ZCL+23] and unbalanced [JSZ22,TCL+23,ZCL+24]. This course will track and incorporate the latest developments in the state-of-the-art research discussed above.
Lecturer
Bei Liang
Date
27th March ~ 17th July, 2025
Location
Weekday Time Venue Online ID Password
Thursday 08:50 - 11:25 A3-2-201 Tencent 48 510 7513 8638 -
Audience
Undergraduate , Advanced Undergraduate , Graduate , Postdoc , Researcher
Video Public
No
Notes Public
Yes
Language
Chinese , English
Lecturer Intro
Dr. Bei Liang received Ph.D. in information security from the Institute of Information Engineering, Chinese Academy of Sciences. She was a postdoc researcher at Chalmers University of Technology, Sweden. Currently, she is an assistant researcher at the BIMSA. Her main research interest is theoretical cryptography. She has published more than 20 papers in international journals or conferences, and won the ISC2019 Best Paper Award and the ProvSec2015 Best Student Paper Award. She participated in two National Key Research and Development Programs and undertook one Beijing Natural Science Foundation.
Beijing Institute of Mathematical Sciences and Applications
CONTACT

No. 544, Hefangkou Village Huaibei Town, Huairou District Beijing 101408

北京市怀柔区 河防口村544号
北京雁栖湖应用数学研究院 101408

Tel. 010-60661855
Email. administration@bimsa.cn

Copyright © Beijing Institute of Mathematical Sciences and Applications

京ICP备2022029550号-1

京公网安备11011602001060 京公网安备11011602001060