proposal commit
This commit is contained in:
commit
573a01c4b7
5
proposal/compile_latex.irb
Normal file
5
proposal/compile_latex.irb
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
`pdflatex proposal.tex`
|
||||||
|
`bibtex proposal`
|
||||||
|
`pdflatex proposal.tex`
|
||||||
|
`pdflatex proposal.tex`
|
||||||
|
`open proposal.pdf`
|
42
proposal/proposal.bib
Normal file
42
proposal/proposal.bib
Normal file
|
@ -0,0 +1,42 @@
|
||||||
|
@article{Chor:1998:PIR:293347.293350,
|
||||||
|
author = {Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu},
|
||||||
|
title = {Private Information Retrieval},
|
||||||
|
journal = {J. ACM},
|
||||||
|
issue_date = {Nov. 1998},
|
||||||
|
volume = {45},
|
||||||
|
number = {6},
|
||||||
|
month = nov,
|
||||||
|
year = {1998},
|
||||||
|
issn = {0004-5411},
|
||||||
|
pages = {965--981},
|
||||||
|
numpages = {17},
|
||||||
|
url = {http://doi.acm.org/10.1145/293347.293350},
|
||||||
|
doi = {10.1145/293347.293350},
|
||||||
|
acmid = {293350},
|
||||||
|
publisher = {ACM},
|
||||||
|
address = {New York, NY, USA},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{Gasarch04asurvey,
|
||||||
|
author = {William Gasarch},
|
||||||
|
title = {A Survey on Private Information Retrieval},
|
||||||
|
journal = {Bulletin of the EATCS},
|
||||||
|
year = {2004},
|
||||||
|
volume = {82},
|
||||||
|
pages = {72--107}
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{DBLP:journals/corr/DvirG14,
|
||||||
|
author = {Zeev Dvir and
|
||||||
|
Sivakanth Gopi},
|
||||||
|
title = {2-Server {PIR} with sub-polynomial communication},
|
||||||
|
journal = {CoRR},
|
||||||
|
volume = {abs/1407.6692},
|
||||||
|
year = {2014},
|
||||||
|
url = {http://arxiv.org/abs/1407.6692},
|
||||||
|
archivePrefix = {arXiv},
|
||||||
|
eprint = {1407.6692},
|
||||||
|
timestamp = {Mon, 13 Aug 2018 16:47:41 +0200},
|
||||||
|
biburl = {https://dblp.org/rec/bib/journals/corr/DvirG14},
|
||||||
|
bibsource = {dblp computer science bibliography, https://dblp.org}
|
||||||
|
}
|
46
proposal/proposal.tex
Normal file
46
proposal/proposal.tex
Normal file
|
@ -0,0 +1,46 @@
|
||||||
|
\documentclass{article}
|
||||||
|
\usepackage{bm}
|
||||||
|
\usepackage{amsmath}
|
||||||
|
\usepackage{graphicx}
|
||||||
|
\usepackage{amsfonts}
|
||||||
|
\usepackage{newpxtext,newpxmath}
|
||||||
|
\usepackage{scrextend}
|
||||||
|
\usepackage{seqsplit}
|
||||||
|
\usepackage{cite}
|
||||||
|
\usepackage[autostyle]{csquotes}
|
||||||
|
|
||||||
|
\newcommand{\horrule}[1]{\rule{\linewidth}{#1}} % Create horizontal rule command with 1 argument of height
|
||||||
|
\newcommand{\tP}[0]{\texttt{P}}
|
||||||
|
\newcommand{\tV}[0]{\texttt{V}}
|
||||||
|
|
||||||
|
\author{Alexander Munch-Hansen, 201505956 \\ Casper Vestergaard Kristensen, 201509411 \\ Thomas Carlsen, 201509613 \\ \\ Group one}
|
||||||
|
|
||||||
|
\title{
|
||||||
|
\normalfont \normalsize
|
||||||
|
\textsc{Aarhus University} \\ [20pt] % Your university, school and/or department name(s)
|
||||||
|
\horrule{0.5pt} \\[0.4cm] % Thin top horizontal rule
|
||||||
|
\huge Cryptographic Computing \\ project proposal \\ % The assignment title
|
||||||
|
\horrule{2pt} \\[0.5cm] % Thick bottom horizontal rule
|
||||||
|
}
|
||||||
|
|
||||||
|
\date{\today}
|
||||||
|
\begin{document}
|
||||||
|
\maketitle
|
||||||
|
\section*{Project Description}
|
||||||
|
The project will revolve around assisting the Alexandra Institute in analysing and implementing oblivious querying of a distributed database. Specifically, we will be looking at the implementation and performance of private information retrieval protocols, which will be used as a primitive in the complete system. As such, we will be implementing multiple protocols which they currently consider in an undecided language of their choosing. We expect that the project will draw upon our knowledge of protocols acquired in the \emph{Protocol Theory} course taught at Aarhus University, as well as require knowledge of cryptographic primitives from the \emph{Cryptology} course (also taught at Aarhus University) and finally, as \emph{PIR} protocols tend to use \emph{Oblivious Transfer}, we will be using \emph{Cryptographic Computing}. Oftentimes, a nice theoretical time complexity won't necessarily guarantee a nice time complexity when used practically, as such, it is of utmost interest to test the implementations, to decide upon which one to use.
|
||||||
|
|
||||||
|
\section*{Todo}
|
||||||
|
\begin{itemize}
|
||||||
|
\item We must read the survey paper given to us by the Alexandra Institute \cite{Chor:1998:PIR:293347.293350, Gasarch04asurvey, DBLP:journals/corr/DvirG14}
|
||||||
|
\item Consult Alexandra Institute regarding the specifics of the project.
|
||||||
|
\item Decide upon which language to implement the protocols in.
|
||||||
|
\item Benchmark each protocol in regards to both memory and time complexity.
|
||||||
|
\item Conclude if scope of the project should be extended, based on when we complete previous step.
|
||||||
|
\end{itemize}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
\bibliography{proposal}{}
|
||||||
|
\bibliographystyle{plain}
|
||||||
|
\end{document}
|
Loading…
Reference in New Issue
Block a user