Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptogr ....Bridging the gap between Key-Evolving Signatures and Their Applications. This project aims to address the gap between cryptography primitives and their applications. Key-evolution signatures are effective in resolving secret key compromises. Theoretically, they can be adopted to secure Proof-of-Stake in blockchain against long-range attacks. Unfortunately, there are many remaining issues to address that make adoption insecure. This project is significant since it will enrich theoretical cryptography contributions and ensure their practical and secure applications. The expected outcomes are innovative technologies, guaranteeing security whilst solving real-life problems. The project will deliver significant and innovative technology for enabling effective and secure blockchain systems. Read moreRead less
Data Privacy Protection in Wireless Sensor Networks. This project aims to explore a comprehensive solution for the protection of privacy-sensitive data in wireless sensor networks (WSNs) that are vulnerable to hacking. The project expects to use an innovative approach involving multiple data servers to protect sensor data privacy from data collection to data access and analysis. Expected outcomes of this project include new security and privacy models for WSNs in the setting of multiple servers, ....Data Privacy Protection in Wireless Sensor Networks. This project aims to explore a comprehensive solution for the protection of privacy-sensitive data in wireless sensor networks (WSNs) that are vulnerable to hacking. The project expects to use an innovative approach involving multiple data servers to protect sensor data privacy from data collection to data access and analysis. Expected outcomes of this project include new security and privacy models for WSNs in the setting of multiple servers, new secure protocols, privacy-preserving access control and data analysis protocols, and a prototype of a privacy-preserving WSN system. This should provide significant benefits, such as improved security of sensitive data in the healthcare system, military, utilities and telecommunications.
Read moreRead less
Pseudorandomness in Number Theory, Dynamics and Cryptography. The aim of the project is to investigate various aspects of randomness, design new and analyse previously known constructions of randomness extractors of practical use. As a dual aim, we will also investigate the pseudorandomness of some classical number-theoretic objects. The significance of this project is in a large number of theoretical and practical applications and in new methods which will be developed. Expected outcomes includ ....Pseudorandomness in Number Theory, Dynamics and Cryptography. The aim of the project is to investigate various aspects of randomness, design new and analyse previously known constructions of randomness extractors of practical use. As a dual aim, we will also investigate the pseudorandomness of some classical number-theoretic objects. The significance of this project is in a large number of theoretical and practical applications and in new methods which will be developed. Expected outcomes include new cryptographically strong hash functions and progress towards several famous open conjectures such as Sarnak’s conjecture. These new results and methods will be highly beneficial for both theoretical mathematics and also for such practical areas as cryptography and information security.Read moreRead less