Lectures and practice sessions
Compared to the last year, the schedule of the course has been slightly reworked. The content has also been somewhat reworked.
The information in this page gives the materials for the lectures and practice sessions, as well as references to similar lectures in past years (where relevant). This information includes the lecture slides, as well as instructions to download and/or install tools that will be used in the practice sessions.
Weeks 2-16 (19.02-28.05.2025, various lecturers): see the content for previous year
- Week 2 (19.02.2025) Dan Bogdanov:
- Week 3 (26.02.2025) Kristjan Krips: Attacks on privacy
- Week 4 (05.03.2025) Jan Willemson: introduction to cryptography, in a non-technical way.
- Week 5 (12.03.2025) Triin Siil: Legal status of privacy technologies.(Cancelled due to lecturer illness, please listen to the recording from 2024)
- Week 6 (19.03.2025) Raimundas Matulevičius: Designing privacy-preserving systems (part 1), focusing on GDPR.
- Lecture slides
- BPMN principles: quick guide, cheat sheet
- Tools: BPMN.io tool, DPO tool (best with Google Chrome )
- Tollgate example privacyless,storing
- Read these articles: 01, 02
- Exercises during the lecture
- Homework assignment (part 1)
- Week 7 (26.03.2025) Raimundas Matulevičius: Designing privacy-preserving systems (part 2), focusing on modelling of business processes using PETs.
- Week 8 (02.04.2025) Liina Kamm: Introduction to data subject privacy enhancing techniques. Pseudonymisation.
- Lecture slides: Categorisation and overview of PETs
- Lecture slides: Pseudonymisation
- Lecture recording
- Week 9 (09.04.2025) Liina Kamm, Fedor Stomakhin: Anonymisation. Practice session on anonymisation.
- Lecture slides: Anonymisation.
- Lecture recording
- Practice session recording
- Get the ARX tool here
- Practice session example dataset
- Homework 4: data anonymization.
- Week 10 (16.04.2025) Fedor Stomakhin, Liina Kamm: Privacy-Preserving AI. Data synthesis.
- Lecture slides: AI privacy
- Lecture slides: Federated learning. Data synthesis
- Lecture recording
- Week 11 (23.04.2025) Alisa Pankova: Differential privacy.
- Lecture slides (last update: 22.04.25).
- Exercise sheet (last update: 21.04.25).
- The initial Pyton code for experiments (last update: 24.04.25).
- The final Pyton code for experiments (last update: 24.04.25).
- The example dataset (last update: 21.04.25).
- Lecture recording
- Exercise session recording
- Homework 5.
- Week 12 (30.04.2025) Nikita Snetkov and Peeter Laud: Cryptography for privacy preservation; privacy-preserving crypto primitives. Ring signatures, attribute-based encryption, zero-knowledge proofs, proxy re-encryption, etc. As non-technically as possible.
- Lecture slides
- The recording of the lecture
- Week 13 (07.05.2025) Pille Pullonen-Raudvere: privacy-preserving protocols for specific and general computational tasks.
- Lecture slides
- The lecture is recorded in BBB.
- Week 14 (14.05.2025) Riivo Talviste: Privacy-preserving computations. We will use Sharemind as technology for instruction.
- Week 15 (21.05.2025) Jan Willemson and Dan Bogdanov: example / exemplary use-cases for privacy-preserving cryptography.
- Week 16 (28.05.2025) Liina Kamm, Peeter Laud: Concluding seminars, and problem-solving. Group work that is similar to the individual work in the exam. The plan for the meeting is the following:
- The meeting takes place at both in-person, and in Zoom.
- Form groups (ca. 4 persons / group). The students in the lecture room will form groups among themselves, and will find their places in different corners of the room. The students in Zoom will be assigned to breakout rooms more-or-less randomly.
- The students will discuss the previous years' exam tasks among their group. Do not try to cover all of them, but pick 1-2 that look more interesting, and focus on these.
- For the chosen task(s), try to formulate an answer, i.e. fix an architecture. When discussing the architecture, the following may be worthy of discussing:
- How to set up computation? E.g. what parties are there? Should we perhaps introduce more parties? Who sends which data to whom?
- Which PETs to use? How to select their parameters?
- Which PETs probably do not help?
- Users' wishes? Laws?
- Create some slides, summarizing the discussion
- Everybody converges again. This probably happens ca. two hours into the meeting
- Present your discussion to everyone; everybody will discuss
- In the seminar, the attending students formed four groups. The groups studied the following problems.
- One group considered the information system for preparing and releasing opinion polls. They prepared slides. Based on their slides, we drew a picture.
- Second group considered the information system for public transportation. They had slides, and also a picture.
- Third group also considered the information system for public transportation. They prepared slides. We did not draw a picture based on this, but reminded everyone that if you consider using some PET with public and private keys, then you have to be clear on who controls the private key.
- Fourth group considered the drug-testing task. They prepared slides.