Institute of Computer Science
  1. Courses
  2. 2024/25 spring
  3. Privacy-preserving technologies (LTAT.04.007)
ET
Log in

Privacy-preserving technologies 2024/25 spring

  • Homepage
  • Lectures and Practice sessions
  • Homework
  • Links

Lectures and practice sessions

Compared to the last year, the schedule of the course has been slightly reworked. The content has also been somewhat reworked.

The information in this page gives the materials for the lectures and practice sessions, as well as references to similar lectures in past years (where relevant). This information includes the lecture slides, as well as instructions to download and/or install tools that will be used in the practice sessions.

Weeks 2-16 (19.02-28.05.2025, various lecturers): see the content for previous year

  • Week 2 (19.02.2025) Dan Bogdanov:
    • Lecture: Course introduction. Introduction to privacy, data protection and Privacy Enhancing Technologies. Analysis of existing systems.
    • Seminar: Analysis of the intended and emergent effects of new services.
    • Homework: Analysis of the intended and emergent effects of new services.
  • Week 3 (26.02.2025) Kristjan Krips: Attacks on privacy
    • Lecture notes: Attacks on privacy, slides
    • Lab tasks
    • Recording of the lecture & lab
    • OSINT homework
  • Week 4 (05.03.2025) Jan Willemson: introduction to cryptography, in a non-technical way.
    • The slides are here and here.
  • Week 5 (12.03.2025) Triin Siil: Legal status of privacy technologies.(Cancelled due to lecturer illness, please listen to the recording from 2024)
    • Lecture slides: Legal status of privacy technologies
    • Recording of the lecture
  • Week 6 (19.03.2025) Raimundas Matulevičius: Designing privacy-preserving systems (part 1), focusing on GDPR.
    • Lecture slides
    • BPMN principles: quick guide, cheat sheet
    • Tools: BPMN.io tool, DPO tool (best with Google Chrome )
    • Tollgate example privacyless,storing
    • Read these articles: 01, 02
    • Exercises during the lecture
    • Homework assignment (part 1)
  • Week 7 (26.03.2025) Raimundas Matulevičius: Designing privacy-preserving systems (part 2), focusing on modelling of business processes using PETs.
    • Lecture slides: 01, 02, 03
    • Read these articles: 03, 04
    • Ride handling models
    • Pulsar model
    • Homework assignment (part 2)
  • Week 8 (02.04.2025) Liina Kamm: Introduction to data subject privacy enhancing techniques. Pseudonymisation.
    • Lecture slides: Categorisation and overview of PETs
    • Lecture slides: Pseudonymisation
    • Lecture recording
  • Week 9 (09.04.2025) Liina Kamm, Fedor Stomakhin: Anonymisation. Practice session on anonymisation.
    • Lecture slides: Anonymisation.
    • Lecture recording
    • Practice session recording
    • Get the ARX tool here
    • Practice session example dataset
    • Homework 4: data anonymization.
  • Week 10 (16.04.2025) Fedor Stomakhin, Liina Kamm: Privacy-Preserving AI. Data synthesis.
    • Lecture slides: AI privacy
    • Lecture slides: Federated learning. Data synthesis
    • Lecture recording
  • Week 11 (23.04.2025) Alisa Pankova: Differential privacy.
    • Lecture slides (last update: 22.04.25).
    • Exercise sheet (last update: 21.04.25).
      • The initial Pyton code for experiments (last update: 24.04.25).
      • The final Pyton code for experiments (last update: 24.04.25).
      • The example dataset (last update: 21.04.25).
    • Lecture recording
    • Exercise session recording
    • Homework 5.
  • Week 12 (30.04.2025) Nikita Snetkov and Peeter Laud: Cryptography for privacy preservation; privacy-preserving crypto primitives. Ring signatures, attribute-based encryption, zero-knowledge proofs, proxy re-encryption, etc. As non-technically as possible.
    • Lecture slides
    • The recording of the lecture
  • Week 13 (07.05.2025) Pille Pullonen-Raudvere: privacy-preserving protocols for specific and general computational tasks.
    • Lecture slides
    • The lecture is recorded in BBB.
  • Week 14 (14.05.2025) Riivo Talviste: Privacy-preserving computations. We will use Sharemind as technology for instruction.
    • Lecture slides, recording of lecture and lab
    • Lab instructions
    • Homework 6
  • Week 15 (21.05.2025) Jan Willemson and Dan Bogdanov: example / exemplary use-cases for privacy-preserving cryptography.
  • Week 16 (28.05.2025) Liina Kamm, Peeter Laud: Concluding seminars, and problem-solving. Group work that is similar to the individual work in the exam. The plan for the meeting is the following:
    • The meeting takes place at both in-person, and in Zoom.
    • Form groups (ca. 4 persons / group). The students in the lecture room will form groups among themselves, and will find their places in different corners of the room. The students in Zoom will be assigned to breakout rooms more-or-less randomly.
    • The students will discuss the previous years' exam tasks among their group. Do not try to cover all of them, but pick 1-2 that look more interesting, and focus on these.
    • For the chosen task(s), try to formulate an answer, i.e. fix an architecture. When discussing the architecture, the following may be worthy of discussing:
      • How to set up computation? E.g. what parties are there? Should we perhaps introduce more parties? Who sends which data to whom?
      • Which PETs to use? How to select their parameters?
      • Which PETs probably do not help?
      • Users' wishes? Laws?
    • Create some slides, summarizing the discussion
    • Everybody converges again. This probably happens ca. two hours into the meeting
    • Present your discussion to everyone; everybody will discuss
    • In the seminar, the attending students formed four groups. The groups studied the following problems.
      • One group considered the information system for preparing and releasing opinion polls. They prepared slides. Based on their slides, we drew a picture.
      • Second group considered the information system for public transportation. They had slides, and also a picture.
      • Third group also considered the information system for public transportation. They prepared slides. We did not draw a picture based on this, but reminded everyone that if you consider using some PET with public and private keys, then you have to be clear on who controls the private key.
      • Fourth group considered the drug-testing task. They prepared slides.
  • Institute of Computer Science
  • Faculty of Science and Technology
  • University of Tartu
In case of technical problems or questions write to:

Contact the course organizers with the organizational and course content questions.
The proprietary copyrights of educational materials belong to the University of Tartu. The use of educational materials is permitted for the purposes and under the conditions provided for in the copyright law for the free use of a work. When using educational materials, the user is obligated to give credit to the author of the educational materials.
The use of educational materials for other purposes is allowed only with the prior written consent of the University of Tartu.
Terms of use for the Courses environment