Compression of distributed data: bridging the gap between theory and practice. In bushfire and tsunami early warning systems, environmental monitoring and healthcare applications, distributed sensors collect and transmit correlated data. This project will design novel data compression algorithms that exploit this correlation to dramatically increase the performance of existing networks and enable new applications.
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies ....Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies which realise efficient MKHEs, together with their cryptographic libraries and practical applications in solving industry problems. This will provide direct economic benefits to Australian industry through the enablement of advanced technologies and low-cost business solutions which are developed in Australia.Read moreRead less
Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The e ....Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The expected outcomes of this project include innovative technologies, as well as secure and practical post-quantum protocols for protecting future blockchain applications. This will provide economic and social benefits to Australian industry through the enablement of advanced technologies which are developed in Australia.Read moreRead less
Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expecte ....Data sharing with strong privacy against inference attacks. This project aims to develop theories and techniques for strong protection of personal information in sharing large datasets such as national health data or census records. It intends to achieve this through developing new information theoretic methods for synthesising datasets with proven high fidelity and protection against re-identification and inference attacks, where attackers try to learn probability of sensitive data. The expected outcomes are algorithms for public and private sector data curators to dial up or down their data access arrangements based on privacy risks and fidelity demands linked with different data types and uses. This project intends to enable Australians to securely benefit from valuable data in decision making.Read moreRead less
Achieving security and privacy in radio frequency identification (RFID) with lightweight security technologies. Secure RFID technology to achieve reliable identification is essential for protecting critical information infrastructures. However, they are prone to security attacks due to difficulties in protecting RFID systems. This project will develop new lightweight security techniques to achieve practical security solutions for RFID.
Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our ....Private Information Retrieval. The deliverables of this project will enhance information protection which is essential for rapidly expanding e-commerce applications and network communication. It will maintain and strengthen national capability of protecting the confidential integrity of digital systems and the network infrastructure in Australia. It will contribute to maintaining Australia's leading position in telecommunications and information industries. It will enhance the quality of our culture by protecting individual's privacy and providing security for sensitive data. Read moreRead less
Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of inf ....Construction methods and analysis tools for repeat-accumulate error correction codes. Error correction codes play an integral role in digital communications systems, enabling technologies such as compact-disk players, hard-disk drives, high-speed modems, digital audio broadcasting and deep-space communications. This project develops the techniques which underlie the success of next-generation error correction technologies and thus addresses an important and fundamental problem in the area of information and communications technology (ICT). The nature of the project presents significant potential for project outcomes to be beneficial to the Australian telecommunications industry in a wide range of application areas including wireless networks, mobile communications, and data storage.
Read moreRead less
Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Inter ....Optimising Cooperation in Multiterminal Wireless Networks. With more and more of our communications networks becoming wireless, new technologies are required to ensure optimal use of limited resources. This project develops and optimises cooperation for multiterminal wireless networks to increase the transmission rate and / or lower the power consumption of wireless networks. Benefits of this research are efficient deployment and operation of high-speed wireless networks such as broadband Internet and digital television, and improved lower-power wireless sensor networks for applications such as remote monitoring bushfire early warning systems.Read moreRead less
Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will un ....Iterative coding for next generation networks. The demands on next generation telecommunication networks can be extrapolated from the increasing use of Voice Over IP (e.g., Skype), real-time streaming media (e.g., live sporting events), and downloaded movies (e.g., the iTunes Music Store). In this data-rich environment, it is necessary to utilise the network itself intelligently. This project draws together ideas from error correction and network coding to provide the technologies that will underpin next generation communication networks. With a focus on implementable technologies, this project presents significant potential for project outcomes to impact the Australian information economy, spawning new businesses, transforming established industries, and creating new jobs. Read moreRead less