Secure Multi-Party Computation. The outcomes of this project will enhance information protection which is crucial fore rapidly growing e-commerce service and strengthen national safeguard capability of our digital systems and infrastructure. It will contribute to maintain Australia's leading position in the telecommunication and information industries. It will contribute to the quality of our culture by protecting individual's privacy and providing security for sensitive data.
Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software too ....Privacy preserving data sharing in data mining environments. Preserving privacy in data mining among various enterprises and organisations is essential for many real world applications in areas like health surveillance, business analysis, fraud detection and terror protection. Efficient and effective techniques are badly needed to protect privacy in data sharing and data mining. The developed cutting-edge techniques in this project will be implemented in freely available open source software tools, empowering Australian organisations to utilise the techniques to develop intelligent systems in data sharing environments. These techniques will ultimately lead to better utilisation of the information available in many enterprises and organisations.Read moreRead less
Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communic ....Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communication and providing accesses to group members for many database systems. The approach leads to a great understanding of advocating selective information sharing in role-based systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aim ....Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aims to develop techniques for purpose-based usage control and detecting possible conflicts between obligations. The approach leads to a great understanding of advocating limited disclosure in usage control systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less