Special Topics in Cryptography 2025 Spring
We will focus on the studies of special variants of Private Set Intersection, Private Set Union, and Multi-party Private Set Union, which allow two or more parties to compute set intersections or unions without revealing any additional information.
PSI has found numerous applications including privacy-preserving location sharing, private contact discovery, DNA testing and pattern matching. Similarly, PSU also has many applications in practice, such as cyber risk assessment and management, IP blacklist and vulnerability data aggregation, private DB supporting full join and private ID.
The most efficient PSI protocols [KKRT16, PRTY19, CM20, GPR+21, RS21] mainly rely on symmetric-key operations, except O(κ) public-key operations (where κ is a computational security parameter) in base Oblivious Transfer(OT) used in the OT extension protocol. There are also many variations of PSI, such as PSI-CA [IKN+20], Fuzzy PSI [BP24], Updatable PSI [BMS24] et al. Existing PSU protocols can be broadly divided into two categories based on the underlying cryptographic techniques used. The first category mainly relies on public-key techniques [KS05, Fri07, HN10, DC17], while the second category mainly relies on symmetric key techniques [KRTW19, GMR+21, JSZ+22]. Also depending on the usage scenario, the PSU protocols can be divided into balanced [CZZ+24,ZCL+23] and unbalanced [JSZ22,TCL+23,ZCL+24]. This course will track and incorporate the latest developments in the state-of-the-art research discussed above.
PSI has found numerous applications including privacy-preserving location sharing, private contact discovery, DNA testing and pattern matching. Similarly, PSU also has many applications in practice, such as cyber risk assessment and management, IP blacklist and vulnerability data aggregation, private DB supporting full join and private ID.
The most efficient PSI protocols [KKRT16, PRTY19, CM20, GPR+21, RS21] mainly rely on symmetric-key operations, except O(κ) public-key operations (where κ is a computational security parameter) in base Oblivious Transfer(OT) used in the OT extension protocol. There are also many variations of PSI, such as PSI-CA [IKN+20], Fuzzy PSI [BP24], Updatable PSI [BMS24] et al. Existing PSU protocols can be broadly divided into two categories based on the underlying cryptographic techniques used. The first category mainly relies on public-key techniques [KS05, Fri07, HN10, DC17], while the second category mainly relies on symmetric key techniques [KRTW19, GMR+21, JSZ+22]. Also depending on the usage scenario, the PSU protocols can be divided into balanced [CZZ+24,ZCL+23] and unbalanced [JSZ22,TCL+23,ZCL+24]. This course will track and incorporate the latest developments in the state-of-the-art research discussed above.
Lecturer
Date
27th March ~ 17th July, 2025
Location
Weekday | Time | Venue | Online | ID | Password |
---|---|---|---|---|---|
Thursday | 08:50 - 11:25 | A3-2-201 | Tencent 48 | 510 7513 8638 | - |
Audience
Undergraduate
, Advanced Undergraduate
, Graduate
, Postdoc
, Researcher
Video Public
No
Notes Public
Yes
Language
Chinese
, English
Lecturer Intro
Dr. Bei Liang received Ph.D. in information security from the Institute of Information Engineering, Chinese Academy of Sciences. She was a postdoc researcher at Chalmers University of Technology, Sweden. Currently, she is an assistant researcher at the BIMSA. Her main research interest is theoretical cryptography. She has published more than 20 papers in international journals or conferences, and won the ISC2019 Best Paper Award and the ProvSec2015 Best Student Paper Award. She participated in two National Key Research and Development Programs and undertook one Beijing Natural Science Foundation.