Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The e ....Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The expected outcomes of this project include innovative technologies, as well as secure and practical post-quantum protocols for protecting future blockchain applications. This will provide economic and social benefits to Australian industry through the enablement of advanced technologies which are developed in Australia.Read moreRead less
Reconfigurable System-on-Chip for Computer Network Appliances. As Internet connectivity becomes ubiquitous, so does the need for computer network security. As algorithms become more sophisticated, and network speeds increase, software-only implementations of network security applications become less feasible on small, embedded network appliances. This project investigates new computer architectures, based on reconfigurable System-on-Chip technology, which can improve algorithm speed through sp ....Reconfigurable System-on-Chip for Computer Network Appliances. As Internet connectivity becomes ubiquitous, so does the need for computer network security. As algorithms become more sophisticated, and network speeds increase, software-only implementations of network security applications become less feasible on small, embedded network appliances. This project investigates new computer architectures, based on reconfigurable System-on-Chip technology, which can improve algorithm speed through specialised instruction sets, hardware accelerators, and parallel processing. Research outcomes will be commercialised by the project's industry partner - a global leader in low-cost network security appliances.Read moreRead less
Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wire ....Software Defined Networking: Transforming Emergency Operations. The project aims to improve the effectiveness and efficiency of Australia's emergency operations, for example, bushfire and rescue missions, by providing robust and integrated communications systems for police and the emergency services. Emergency communications systems are currently fragmented by the different technologies, creating disconnected islands of information. The project aims to provide techniques that allow multiple wireless technologies to communicate seamlessly using modern software-defined networking solutions.Read moreRead less
Reconstructing land tenure maps of Australia in 3D. Existing land tenure maps of above and below ground, such as apartment ownership, tunnels, and mining, are maintained using 2D drawings. However, the drawings are not structured and valuable for detailed and advanced visualisation, analytics, and simulation, which are essential for testing potential interventions and policy development. This project aims to develop a data validation framework for transforming current drawings and reconstructing ....Reconstructing land tenure maps of Australia in 3D. Existing land tenure maps of above and below ground, such as apartment ownership, tunnels, and mining, are maintained using 2D drawings. However, the drawings are not structured and valuable for detailed and advanced visualisation, analytics, and simulation, which are essential for testing potential interventions and policy development. This project aims to develop a data validation framework for transforming current drawings and reconstructing them into 3D models. The outcomes include validation principles, formal mathematical terms, and computational algorithms. Benefits include a cost-effective onshore alternative to offshore 3D reconstruction practices, efficient land development and infrastructure planning, and fewer property disputes.Read moreRead less
Tools and models for measuring and predicting growth in internet addressing and routing complexity. We analyse patterns in the allocation and actual use of Internet Protocol version 4 (IPv4) addresses to predict the technical and market pressures for deployment of IPv6. The utilisation models will help evaluate the potential for emerging markets in scarce IPv4 address prefixes to increase costs to the end-users of Australia's future national broadband network.
Multi-Modal Dictionary Learning for Smart City Operation and Management. This Project aims to provide new digital asset management tools for city councils to improve city services by utilising new sensing and automated learning technologies for recognising, tracking and auditing of assets. Currently, there are no digital tools available to handle these services. This project proposes new multi-modal sensing and mapping of city asset techniques by building new multi-modal dictionary learning proc ....Multi-Modal Dictionary Learning for Smart City Operation and Management. This Project aims to provide new digital asset management tools for city councils to improve city services by utilising new sensing and automated learning technologies for recognising, tracking and auditing of assets. Currently, there are no digital tools available to handle these services. This project proposes new multi-modal sensing and mapping of city asset techniques by building new multi-modal dictionary learning procedures. The new framework will recognise different conditions of city assets in real-time to make decisions. Expected outcomes of this Project include integration and easy access of assets with unique digital identities to help city councils, governments, and navigation services for real-time asset monitoring.Read moreRead less
Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level arch ....Audit Security Models for Multiparty Internet Transactions. The aim of this project is to conduct the study for a secure, low overhead means of auditing secure transactions between two parties over the Internet, especially where some doubt surrounds the trustfulness of the other party.
A study will be conducted in this project by investigating security models for multiparty secure transactions in order to identify a number of likely applications for the technology, to develop a high level architecture of the solution.Read moreRead less