Topics in Computer Systems: Privacy-Enhancing Technologies
CSC2231 Winter 2025
Overview
Personal information is central to our identity, and protecting it is crucial to preserving our fundamental right to privacy. Yet, rapid advances in technology often challenge our ability to safeguard it. In this course, we will explore how privacy can be formally defined and protected. We will examine how techniques from cryptography and statistics can be applied to build systems that enable data-driven applications while protecting individual privacy.
The first part of the course introduces key cryptographic concepts, including secure multiparty computation (MPC), fully homomorphic encryption (FHE), zero-knowledge proofs (ZKPs), private information retrieval, oblivious RAM, and anonymous communication protocols. The second part covers statistical approaches to privacy, with a particular focus on differential privacy. Toward the end of the course, we will discuss real-world applications of these privacy-enhancing technologies.
Course Information
- Instructor: Anwar Hithnawi
- E-mail: ahithnawi@cs.toronto.edu
- Location: Zoom (link on Quercus)
- Time: Tuesday 9:00 AM – 11:00 AM
- Office hours: Tuesday 11:00 AM – 12:00 PM or by appointment (Zoom link on Quercus)
Lecture Structure
This course is run as a reading and discussion seminar. With the exception of the first week, each week, students will read and present two papers selected from the topics in the course schedule. Every student will present a paper once during the course.
Important Links
- Course website: https://pps-lab.com/teaching/pets
- Quercus (announcements): https://q.utoronto.ca/courses/385469
- Paper Reviews: https://toronto-csc25.hotcrp.com/
All course materials, including the schedule, lecture slides, and readings, will be available on the course website.
Prerequisites
A general background in computer systems and cryptography is required. There is no required textbook for this course. For a refresher on security concepts, you can consult the Berkeley Introduction to Security Textbook and for cryptography, see A Graduate Course in Applied Cryptography.
Course Evaluation
- 30% – Paper presentation (slides due at the start of your presentation)
- 20% – Participation and paper reviews (reviews due at the start of class)
- 10% – Project proposal (due Feb 11)
- 40% – Final project (due April 8)
Deliverables
Presentations and Reviews: All students are required to read both papers assigned for each class before the session. You must submit a written review for one of those two papers (of your choice) by 9:00 AM on the day of the lecture. Each paper will be presented by a designated student in a 30-minute conference-style talk. The presenter will then lead a discussion lasting about 55 minutes in total for both presentation and Q&A. We will have a 10-minute break at the midpoint of class. One week before your scheduled presentation, please meet with me during office hours to get feedback on your slides and talk. In addition to the two assigned papers per class, recommended readings will sometimes be posted. You are encouraged to read as many of these additional materials as possible to get the most out of the course.
Projects: Students will work in pairs on a research project related to privacy-enhancing technologies. Each pair must submit a proposal to the instructor no later than Feb 11 at 9:00 AM. Near the end of the term, you will present your work to the class in a 30-minute (including Q&A) conference-style presentation. In addition, by April 8, you must submit a workshop-quality paper of 8--10 pages describing your project. We encourage you to consult with the instructor regularly to ensure you are making progress. If you have difficulty finding a project topic, please reach out early; we can provide a list of suggested topics.
Format
Please submit your presentation slides, project proposal, and final project write-up in PDF format via email. We strongly encourage typesetting your deliverables in LaTeX. Use the course’s HotCRP submission system to submit paper reviews for assigned readings.
Late Policy
Paper reviews: No reviews are accepted once the class has started. You may skip reviews for two papers without penalty.
Project proposal and final report: If your project proposal or final report is submitted late, 20% will be deducted from the grade for each day it is overdue.
Policy on the Use of Artificial Intelligence
Large-language model-based tools (e.g., ChatGPT) can be very helpful, and you are encouraged to leverage them. However, please do not use them in any way that trivializes the assignments or bypasses the course's learning objectives. If you have doubts about permissible usage, please check with the instructor first.
Schedule and Readings
The schedule may be adjusted as the semester progresses; any changes will be announced in class and on Quercus. If you have questions, please contact the instructor.
# | Date | Topics | Readings |
---|---|---|---|
1 | Jan 14 | Logistics & Overview | Recommended: |
2 | Jan 21 | Societal & Ethical Considerations of PETs | Assigned Papers:In-Class Case Study: E2E Encryption and Client-Side ScanningRecommended: |
3 | Jan 28 | Secure Multiparty Computation | Assigned Papers:
|
4 | Feb 4 | Zero-Knowledge Proofs | Assigned Papers:
|
5 | Feb 11 | Private Information Retrieval | Assigned Papers:
|
- | Feb 18 | Reading Week - No Class | - |
6 | Feb 25 | Differential Privacy | Assigned Reading:
|
7 | March 4 | Private Statistics Collection | Assigned Papers:
| 8 | March 11 | Privacy, Anonymity, & Censorship | Assigned Papers:
|
9 | March 18 | Anonymous Authorization | Assigned Papers:
|
10 | March 25 | Privacy Preserving ML & Private ML Auditing | Assigned Papers:
|
11 | April 1 | Research Project Presentations | - |