Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will he ....Secure and Efficient Cryptographic Hashing. This project will enhance information security, which is absolutely crucial for rapidly growing e-commerce, e-government services and for national security (Priority 4 -Safeguarding Australia - Protection against Terrorism and Crime). The project will strengthen international collaboration by reciprocal exchange of researchers and postgraduate students leading to more attractive and productive research environment. At the same time, the project will help to maintain high research profile of Australian researchers, to increase the capacity for consultancy and contract work, and provide a cutting-edge information technology for the Australian telecommunications industry, business and government (Priority 3 - Frontier Technologies). Read moreRead less
Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is ....Exploring the Frontiers of Feasible Computation. The project aims to delineate the boundary between feasible and infeasible computational problems. A problem is considered feasible if there is an algorithm to solve it in worst-case time bounded by a polynomial in the input size. This is probably impossible for the important class of NP-complete problems. However, typical examples of NP-complete problems can often be solved in polynomial time, because worst-case problems are rare. The project is relevant to public-key cryptography, where breaking an encryption scheme should be infeasible, and to many real-life situations where NP-complete problems need to be solved, either exactly or approximately.Read moreRead less
Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a lar ....Efficient Pre-Processing of Hard Problems: New Approaches, Basic Theory and Applications. Computers store even larger amounts of data about all aspects of human and industrial activity. However, they have not become significantly better at solving common problems in optimization and search. Traditional complexity theory indicates many of these problems require algorithms that are very unlikely to exist. The Parameterized Complexity approach allows us to obtain very efficient algorithms for a large variety of problems, but the machinery required was diverse and complicated. This research will organize the machinery into a new approach that systematically finds good algorithms by applying simplifications around a parameter of the domain of the problem. As a result, efficient algorithms are obtained for many diverse areas.Read moreRead less
Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to ....Enhancing Privacy for Digital Communication. Protecting one's privacy in cyber world is a challenging task. Every contact to a Web server leaves a digital footprint that can be linked with other publicly available information to compile a profile of one's activities. Anonymous communication is a powerful tool for enhancing individuals' privacy and providing services such as electronic election where a person's vote must be unlinkable to him/her. However, anonymity may be misused by criminals to hide their identities and engage in illegal activities. The aim of this project is to design and analyse privacy enhancing communication systems that balance individuals' privacy and accountability, and develop criteria and metrics to compare performance of these systems.Read moreRead less
Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the proje ....Secure and Efficient Fair Exchange Protocols. Information security is becoming increasingly important in the rapidly growing field of e-commerce. This project will enable the development of secure fair exchange protocols and schemes, which will be absolutely crucial to Australia's national security. The project will also strengthen international collaboration through the reciprocal exchange of researchers leading to a more collaborative and productive research environment. Furthermore, the project will help to maintain the high research profile of Australian researchers and provide cutting-edge information technology for the Australian telecommunication industry, business and government.Read moreRead less
Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Austr ....Credential Systems and Their Applications in Securing Electronic Health Records. The expected result of this project will be frontier technologies that are essential in applications and services, whose acceptance and take-up will depend on users' assurance of their security in the cyber world. In particular, a service such as the EHR system, which is known to be a complex system, requires the use of new and innovative credential-based systems. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which has been recognised by increased government funding levels. The resulting applications of this project will place Australia as the first country able to design and implement a secure EHR system.Read moreRead less
Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the teleco ....Secure and Practical Anonymous Electronic Payment and Applications. The expected results of this project will be frontier technologies that are essential in applications and services whose acceptance and take-up will depend on users' assurance about their security in the cyber world. The project will contribute to the economic and social advancement of Australia by allowing effective usage of advanced IT technologies. This development will also maintain Australia's leading position in the telecommunication and IT industries, which is well recognised by increasing levels of government. The resulting application will place Australia as the first country able to design and implement a provably secure and practical e-payment system.Read moreRead less
Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy ....Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy. This impact will be particularly emphasised in Australia with its geographically disperse population. Securing vital electronic transactions will ultimately contribute to lowering costs and increasing productivity and so creating a more competitive economy.Read moreRead less
Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by ....Short Signatures: Tools for Securing Digital Transactions, and Their Applications. The expected result of this project will be frontier technologies that are essential in applications and services, eg. transactions over mobile devices, whose acceptance will be dependent on users' assurance about their security in the Cyber world. The result will also contribute to maintaining Australia's leading position in the telecommunication and information technology industries, which is well recognised by the government increasing funding levels. Using provably secure short signature schemes in the Internet world will ultimately contribute to lowering costs, increasing productivity and therefore, a more competitive economy. The project will produce high quality graduates by generating research opportunities for students.Read moreRead less
Collusion secure fingerprinting for dynamic groups. Digital fingerprinting systems make personalised copies of digital objects by embedding a unique mark in each copy so that pirate objects can be traced to those who make illegal copies of their objects. Key fingerprinting systems use a similar approach to trace pirate decoders in paid broadcast systems such as Pay-TV. Existing fingerprinting systems do not have the flexibility that is required in advanced applications such as secure tele-col ....Collusion secure fingerprinting for dynamic groups. Digital fingerprinting systems make personalised copies of digital objects by embedding a unique mark in each copy so that pirate objects can be traced to those who make illegal copies of their objects. Key fingerprinting systems use a similar approach to trace pirate decoders in paid broadcast systems such as Pay-TV. Existing fingerprinting systems do not have the flexibility that is required in advanced applications such as secure tele-collaboration. This project develops theories and techniques that can be used for fingerprinting in these applications, hence addressing one of the most challenging problems of today's content distribution systems.Read moreRead less