Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applic ....Practical Identity-Based Cryptography: Efficient and Secure Elliptic Curve Pairings. Bilinear pairings on elliptic curves are a new cryptographic tool and allow novel and improved applications in information security. For example, they have been proposed as a substitute of existing public key infrastructures, an essential element in electronic commerce and a secure Internet. The research will lead to an increase in fundamental knowledge in the area of practical implementation and secure applications of pairings. The results will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users. It will also support many new product opportunities aligned with Motorola's business markets.Read moreRead less
Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algo ....Efficient and Secure Word-Based Stream Ciphers for Wireless Communications. Wireless networks are increasingly being used for communication, and to manage and control Australia's critical infrastructure. However, current methods of securing wireless networks are flawed, putting the country's economy, environment, and citizens at risk. The most reliable method for protecting wireless communications requires secure and efficient encryption algorithms. However, flaws have been found in most algorithms proposed to date. This project will examine existing algorithms and attacks to determine design criteria for secure encryption algorithms for use in a wireless environment. An algorithm which meets these criteria and can be implemented efficiently in hardware and software will be proposed.Read moreRead less
A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucr ....A Novel Optical Network Security and Encryption Device. The project falls within two of the desginated National Research Priorities, namely Frontier Technologies for Building and Transforming Australian Industries and Safeguarding Australia. The project will generate high quality graduates and will result in a novel photonic device. The outcome of this project would be an optical encryption device that will safeguard Australia through superior secure data communications. It will also create lucrative opportunity for expanding the export capabilities of Australian ICT industry.Read moreRead less
Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approac ....Secure and Efficient Electronic Auctions. For the first time in history electronic commerce promises the possibility of auctions to decide the correct market price for a widespread variety of everyday goods and services. Security and efficiency are critical factors in making this a reality, but almost all the many protocols for secure auctions proposed to date suffer from extreme computational requirements. This project will develop efficient and secure auction protocols using innovative approaches based on advanced cryptographic techniques. In particular we will pioneer the exploration of secure microauctions suitable for negotiating the price of small value goods and utilities in almost real time.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contr ....XML Views of Relational Databases: Semantics and Update Problems. XML is the standard for representing, publishing and exchanging data over the Internet and relational database is the dominant technology for data management. Updating XML views over relational data is fundamental to bring these two technologies together to serve Internet-based applications. Australia has been a leading country in both developing and applying internet technologies. The theoretic outcomes of this project will contribute to the advance in database and web research communities and establish us as an internationally leading group in this research area. The technological outcomes will help organisations in Australia effectively and efficiently conduct e-Business on the Internet. Read moreRead less
Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integ ....Constraints in XML Schema Integration. This project will produce worldwide leading technologies for designing XML data integration system. With the technologies, the well designed integration systems will be able store data with rich semantics and thus provide accurate and understandable information to users. In this way, Australia and communities will be benefited both financially and informatively. The research of this project will also add to the research reputation of Australia in data integration areas. At the same time, the knowledge capacity of Australia on data integration will be enlarged which further improves frontier research activities in the area. Through the research of the project, PhD students will be trained.Read moreRead less