Overview: The emergence of data-mining applications that utilize sensitive or private data has re-ignited interest in information-theoretic privacy/security within the CS community. A major opportunity in this area is interpreting and addressing new paradigms such as differential privacy in the context of classical information theory.
Canonical Problems: How can we achieve security with minimal randomness and complexity? How can we enable aggregation and computation on information without compromising the privacy of individual elements?
Keywords: security, cryptography, extractors, pseudorandomness, and pseudoentropy, privacy.