Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ ....Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ secret keys. The expected outcomes will bridge theory and practice, providing economic benefits to industry by enabling practical mechanisms to store confidential user’s information in the cloud, hence lowering the infrastructure cost for industry.Read moreRead less
Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practi ....Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practical cryptographic solutions that provide protection against malicious senders, in contrast to the existing knowledge that can only cope with malicious receivers. The expected outcomes are innovative technologies, which will lower infrastructure costs and provide cybersecurity for cloud storage.Read moreRead less
Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become realit ....Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade. This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles. It begs exploring, for the truly spectacular outcomes likely to ensue.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies ....Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies which realise efficient MKHEs, together with their cryptographic libraries and practical applications in solving industry problems. This will provide direct economic benefits to Australian industry through the enablement of advanced technologies and low-cost business solutions which are developed in Australia.Read moreRead less