From 573a01c4b7115c9e2089c7a45b676d2f556001f5 Mon Sep 17 00:00:00 2001 From: Alexander Munch-Hansen Date: Thu, 24 Oct 2019 13:41:06 +0200 Subject: [PATCH] proposal commit --- proposal/compile_latex.irb | 5 +++++ proposal/proposal.bib | 42 ++++++++++++++++++++++++++++++++++ proposal/proposal.tex | 46 ++++++++++++++++++++++++++++++++++++++ 3 files changed, 93 insertions(+) create mode 100644 proposal/compile_latex.irb create mode 100644 proposal/proposal.bib create mode 100644 proposal/proposal.tex diff --git a/proposal/compile_latex.irb b/proposal/compile_latex.irb new file mode 100644 index 0000000..3dba201 --- /dev/null +++ b/proposal/compile_latex.irb @@ -0,0 +1,5 @@ +`pdflatex proposal.tex` +`bibtex proposal` +`pdflatex proposal.tex` +`pdflatex proposal.tex` +`open proposal.pdf` diff --git a/proposal/proposal.bib b/proposal/proposal.bib new file mode 100644 index 0000000..8c9f014 --- /dev/null +++ b/proposal/proposal.bib @@ -0,0 +1,42 @@ +@article{Chor:1998:PIR:293347.293350, + author = {Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu}, + title = {Private Information Retrieval}, + journal = {J. ACM}, + issue_date = {Nov. 1998}, + volume = {45}, + number = {6}, + month = nov, + year = {1998}, + issn = {0004-5411}, + pages = {965--981}, + numpages = {17}, + url = {http://doi.acm.org/10.1145/293347.293350}, + doi = {10.1145/293347.293350}, + acmid = {293350}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{Gasarch04asurvey, + author = {William Gasarch}, + title = {A Survey on Private Information Retrieval}, + journal = {Bulletin of the EATCS}, + year = {2004}, + volume = {82}, + pages = {72--107} +} + +@article{DBLP:journals/corr/DvirG14, + author = {Zeev Dvir and + Sivakanth Gopi}, + title = {2-Server {PIR} with sub-polynomial communication}, + journal = {CoRR}, + volume = {abs/1407.6692}, + year = {2014}, + url = {http://arxiv.org/abs/1407.6692}, + archivePrefix = {arXiv}, + eprint = {1407.6692}, + timestamp = {Mon, 13 Aug 2018 16:47:41 +0200}, + biburl = {https://dblp.org/rec/bib/journals/corr/DvirG14}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} \ No newline at end of file diff --git a/proposal/proposal.tex b/proposal/proposal.tex new file mode 100644 index 0000000..5159fca --- /dev/null +++ b/proposal/proposal.tex @@ -0,0 +1,46 @@ +\documentclass{article} +\usepackage{bm} +\usepackage{amsmath} +\usepackage{graphicx} +\usepackage{amsfonts} +\usepackage{newpxtext,newpxmath} +\usepackage{scrextend} +\usepackage{seqsplit} +\usepackage{cite} +\usepackage[autostyle]{csquotes} + +\newcommand{\horrule}[1]{\rule{\linewidth}{#1}} % Create horizontal rule command with 1 argument of height +\newcommand{\tP}[0]{\texttt{P}} +\newcommand{\tV}[0]{\texttt{V}} + +\author{Alexander Munch-Hansen, 201505956 \\ Casper Vestergaard Kristensen, 201509411 \\ Thomas Carlsen, 201509613 \\ \\ Group one} + +\title{ + \normalfont \normalsize + \textsc{Aarhus University} \\ [20pt] % Your university, school and/or department name(s) + \horrule{0.5pt} \\[0.4cm] % Thin top horizontal rule + \huge Cryptographic Computing \\ project proposal \\ % The assignment title + \horrule{2pt} \\[0.5cm] % Thick bottom horizontal rule +} + +\date{\today} +\begin{document} +\maketitle +\section*{Project Description} +The project will revolve around assisting the Alexandra Institute in analysing and implementing oblivious querying of a distributed database. Specifically, we will be looking at the implementation and performance of private information retrieval protocols, which will be used as a primitive in the complete system. As such, we will be implementing multiple protocols which they currently consider in an undecided language of their choosing. We expect that the project will draw upon our knowledge of protocols acquired in the \emph{Protocol Theory} course taught at Aarhus University, as well as require knowledge of cryptographic primitives from the \emph{Cryptology} course (also taught at Aarhus University) and finally, as \emph{PIR} protocols tend to use \emph{Oblivious Transfer}, we will be using \emph{Cryptographic Computing}. Oftentimes, a nice theoretical time complexity won't necessarily guarantee a nice time complexity when used practically, as such, it is of utmost interest to test the implementations, to decide upon which one to use. + +\section*{Todo} +\begin{itemize} +\item We must read the survey paper given to us by the Alexandra Institute \cite{Chor:1998:PIR:293347.293350, Gasarch04asurvey, DBLP:journals/corr/DvirG14} +\item Consult Alexandra Institute regarding the specifics of the project. +\item Decide upon which language to implement the protocols in. +\item Benchmark each protocol in regards to both memory and time complexity. +\item Conclude if scope of the project should be extended, based on when we complete previous step. +\end{itemize} + + + + +\bibliography{proposal}{} +\bibliographystyle{plain} +\end{document} \ No newline at end of file