{"id":2080,"date":"2025-10-03T00:03:11","date_gmt":"2025-10-03T06:03:11","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=2080"},"modified":"2025-10-03T01:38:13","modified_gmt":"2025-10-03T07:38:13","slug":"teaching-aide-privacy-preserving-cryptography","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2025\/10\/03\/teaching-aide-privacy-preserving-cryptography\/","title":{"rendered":"Teaching Aide &#8211; Privacy Preserving Cryptography"},"content":{"rendered":"\n<p><em>By Azeezat Lawal, Dami Ogunnupebi, Tarun Sidhu, Pradip Ghimire, Abdul-Hafis Osuwa<\/em><\/p>\n\n\n\n<p><strong>Walkthrough<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Walkthrough-Audio.m4a\"><\/audio><figcaption class=\"wp-element-caption\">Privacy Preserving Cryptography Walkthrough Audio<\/figcaption><\/figure>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Walkthrough Transcript<\/strong><\/summary>\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Walkthrough.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Walkthrough Transcript.\"><\/object><a id=\"wp-block-file--media-b188a232-9b4c-401a-b0bd-2da8ac67e3d3\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Walkthrough.pdf\">Walkthrough Transcript<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Walkthrough.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b188a232-9b4c-401a-b0bd-2da8ac67e3d3\">Download<\/a><\/div>\n<\/details>\n\n\n\n<p><strong>Teaching Aide<\/strong><\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/Teaching-Aide-Final-Powerpoint.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Privacy Preserving Cryptography Teaching Aide.\"><\/object><a id=\"wp-block-file--media-4e3685f6-4df2-449c-9a68-9ddf147f9c0a\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/Teaching-Aide-Final-Powerpoint.pdf\">Privacy Preserving Cryptography Teaching Aide<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/Teaching-Aide-Final-Powerpoint.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4e3685f6-4df2-449c-9a68-9ddf147f9c0a\">Download<\/a><\/div>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-c0d2d436-580e-434d-ba67-8dc282ad526c\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Powerpoint.pptx\">PPC Powerpoint<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Powerpoint.pptx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c0d2d436-580e-434d-ba67-8dc282ad526c\">Download<\/a><\/div>\n\n\n\n<p><strong>Supplementary Documentation<\/strong><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Supplementary-Documentation.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Supplementary Documentation.\"><\/object><a id=\"wp-block-file--media-091bd589-a5d4-41aa-bbf7-4b18a36659b2\" href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Supplementary-Documentation.pdf\">Supplementary Documentation<\/a><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/PPC-Supplementary-Documentation.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-091bd589-a5d4-41aa-bbf7-4b18a36659b2\">Download<\/a><\/div>\n\n\n\n<p><strong>Questions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What are some real life applications of Homomorphic Encryption (HE) that you can think of?<\/li>\n\n\n\n<li>What factors must be true for Secure Multi-Party Computation to take place?<\/li>\n\n\n\n<li>In a world where deepfakes and AI can imitate anyone online, how can we use anonymous credentials to prove what&#8217;s real and who&#8217;s trustworthy, without giving away our personal information?<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Azeezat Lawal, Dami Ogunnupebi, Tarun Sidhu, Pradip Ghimire, Abdul-Hafis Osuwa Walkthrough Teaching Aide Supplementary Documentation Questions<\/p>\n","protected":false},"author":740,"featured_media":2081,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[8],"tags":[64,63],"class_list":["post-2080","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-isec-601","tag-privacy-preserving-cryptography","tag-teaching-aide","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/IMG_8611-600x400.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2025\/10\/IMG_8611-600x600.png","author_info":{"display_name":"Azeezat Lawal","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/azeezat-lawal\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/740"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=2080"}],"version-history":[{"count":8,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2080\/revisions"}],"predecessor-version":[{"id":2110,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/2080\/revisions\/2110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/2081"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=2080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=2080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=2080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}