Professional Documents
Culture Documents
5383 23S 1 Intro
5383 23S 1 Intro
5383 23S 1 Intro
Applied Cryptography
Sherman Chow
Chinese University of Hong Kong
Spring 2023
Lecture 1: Introduction
Confident-
iality
Info.
Security
Integrity Availability
▪ Frequency analysis
▪ How to attack?
User Data
Flow
User
=
[“work”]
= “work, blah blah…”
Keyword( ) = “work”
= Enc( )
= Enc(“work …”)
Key 2
Key
Key
1 Key
1 Key 4
1
I have $x
I have $y
Is x > y ?
Secure comparison can be applied to, among many,
- Training over encrypted data (e.g., ReLU)
- Location-based services (e.g., who are near enough?)
13th January 2023 ENGG5383 Applied Cryptography 25/36
Private Set Intersection (PSI)
PSI can be applied to, among many,
- Privacy-preserving contact tracing
- CSAM detection (Apple PSI system)
- Advertisement efficacy (Google PSI sum)