Seminars
Smoothing Techniques for Code Problems
Description
Smoothing is a technique that helps to study computational problems in cryptography. While it has been primarily applied to lattice-based problems, recent work has begun to explore its relevance in the context of coding problems.
In this seminar, you will learn about the different coding problems that appear in known reductions, as well as the techniques used to establish these reductions. Particular attention will be given to the challenges that arise when attempting to extend these techniques to more general classes of codes. These obstacles will be examined, discussed, and presented in detail.
Reference papers:
- Brakerski, Zvika, et al. "Worst-case hardness for LPN and cryptographic hashing via code smoothing." (https://eprint.iacr.org/2018/279)
- Yu, Yu, and Jiang Zhang. "Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN." (https://eprint.iacr.org/2020/870)
- Debris–Alazard, Thomas, and Nicolas Resch. "Worst and average case hardness of decoding via smoothing bounds." (https://eprint.iacr.org/2022/1744)
Supervisor:
Codes for Substring Edits
file synchronization, coding theory
Description
The document exchange problem considers the scenario where two parties have slightly different versions of the same file, and one of them wants to update their version to match the other. Instead of sending the whole file, the idea is to share only a small description of the changes. Substring edits, where changes happen locally within the file, are a natural way to model these differences. This seminar will examine how coding theory can be applied to enhance the efficiency of document exchange under substring edits.
Supervisor:
Post-Quantum Key Exchange
Description
Post-quantum cryptography (PQC) has been an active area of research since the seminal work of Shor.
Indeed, most public-key cryptography currently deployed (such as RSA and elliptic-curve-based schemes) is vulnerable to quantum adversaries.
This applies in particular to public-key encryption (PKE) schemes.
An attacker could record encrypted traffic and later decrypt it once a sufficiently capable quantum computer becomes available - a strategy known as "harvest now, decrypt later."
Post-quantum secure alternatives can be constructed from hard problems on codes and lattices. The recently standardized Kyber and HQC follow an encryption-based approach, while, e.g., NewHope is based on a key reconciliation mechanism:
Alice and Bob obtain noise variants of a common secret, and error correction removes this noise, allowing them to agree on the same shared key.
This project will survey constructions for exchanging a key in code-based and lattice-based cryptography. These constructions are to be categorized based on key properties, such as underlying metric, bandwidth requirements, and underlying assumptions.
An overview of the key techniques is to be developed, with particular focus on the question of whether they can be transferred from codes to lattices and vice versa. The project requires reading and understanding several references; a good starting point can be the following works:
Aguilar-Melchor, Carlos, et al. "Efficient encryption from random quasi-cyclic codes." IEEE Transactions on Information Theory 64.5 (2018): 3927-3943.
Bos, Joppe, et al. "CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM." 2018 IEEE European symposium on security and privacy (EuroS&P). IEEE, 2018.
Alkim, Erdem, et al. "Post-quantum Key Exchange — A new hope." 25th USENIX security symposium (USENIX Security 16). 2016.
Supervisor:
Understanding a Fully Homomorphic Encryption Scheme
fully homomorphic encryption
Description
Fully Homomorphic Encryption (FHE) enables computations on encrypted data without decryption, providing a powerful tool for privacy-preserving applications.
In this seminar, the student will study the BFV scheme, a widely used homomorphic encryption construction. The main goal is to understand the underlying mathematics, the design rationale of BFV, and how it fits into the broader landscape of lattice-based cryptography.
The student is expected to:
- Review the foundational works by Brakerski and by Fan–Vercauteren.
- Summarize the scheme’s construction, security assumptions, and noise management.
- Present connections to applications and implementations.
References:
[1] Z. Brakerski, "Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP," Advances in Cryptology – CRYPTO 2012, Lecture Notes in Computer Science, vol. 7417, Springer, 2012, pp. 868–886. doi: 10.1007/978-3-642-32009-5_50
[2] J. Fan and F. Vercauteren, "Somewhat Practical Fully Homomorphic Encryption," IACR Cryptology ePrint Archive, vol. 2012/144, 2012. Available:
Supervisor:
Membership Inference Attacks against Machine Learning Models
Description
It has been widely acknowledged that machine learning models can leak a significant amount of (potentially private) information about their training data. Analyzing the amount of information leaked about the training data is important to judge the model's privacy. In practice, so-called membership inference attacks [1,2] are employed for such a privacy audit. A membership inference attack tries to predict whether a particular data sample was used in the training of a machine learning model. Besides empirical research, membership inference attacks have been put on a theoretical foundation through a Bayesian decision framework [3].
The goal of this seminar topic is to understand state-of-the-art membership inference attacks [1,2] and the Bayesian decision framework [3]. Students are encouraged to produce their own results using openly available implementations.
[1] N. Carlini, S. Chien, M. Nasr, S. Song, A. Terzis and F. Tramèr, "Membership Inference Attacks From First Principles," 2022 IEEE Symposium on Security and Privacy (SP), 2022.
[2] S. Zarifzadeh, P. Liu, R. Shokri, "Low-Cost High-Power Membership Inference Attacks," ICML 2024.
[3] A. Sablayrolles, M. Douze, C. Schmid, Y. Ollivier, H. Jegou, "White-box vs Black-box: Bayes Optimal Strategies for Membership Inferenc," Proceedings of the 36th International Conference on Machine Learning, 2019.
Prerequisites
Compulsory:
- Solid background in probability theory and hypothesis testing
- Basic knowledge about machine learning methods and neural networks
Optional:
- Implementations of machine learning methods in python
Contact
E-mail: luis.massny@tum.de
Supervisor:
Ordered Statistics Decoder: A Review
Ordered Statistics Decoder (OSD), universal decoders, short blocklength coding
The student is expected to provide an overview of the way of working of the decoder, its strengths and its limitations.
Description
5G and beyond wireless communication systems gave/are expected to give rise to many new applications with stringent requirements that were not achievable with 4G or earlier systems. These requirements are: low latency, high reliability, battery life maximization among others.
To this extent, short blocklength coding has gained particular interest, and new research on efficient coding schemes is emerging. An idea previously discussed in the literature is the Ordered Statistics Decoder (OSD) [1]. Recent works in literature are addressing its strengths, its shortcomings and are suggesting ways to make this decoder more practical and efficient in the short blocklength regime.
The objective of the student is to study the seminal paper [1], that introduces the idea of ordered statistics decoding and be able to describe how the decoder works, what are its strengths, what are its limitations. Then, the student is expected to understand and explain the way of working of newer algorithms [2] [3] and explain if and how they improve performance.
[3] Box and match techniques applied to soft-decision decoding | IEEE Journals & Magazine | IEEE Xplore
Prerequisites
It is nice for the student to have some background knowledge on linear algebra and channel coding, e.g., what is a channel code, how it is represented, how it is used etc. However, introductory material can be provided if a student is eager to learn, and questions on topics that are unclear to the student are always welcome.
In general, this is a student-driven task, therefore it is the student's job to plan and execute the review of the given paper. Support and guidance will be gladly provided if requested. There will also be a clear discussion of what is required in the final presentation as well as evaluation points, directly after the topic assignment.