CORE

group_project

Visible to the public SaTC-BSF: CORE: Small: Foundations of Lattice-based Cryptography

Over the last two decades, lattices have emerged as a powerful mathematical basis for cryptography. For one, Lattice-based Cryptography has resisted quantum attacks while conventional crypto systems succumbed to it in the mid-90s. Secondly, Lattice-based Cryptography has been instrumental in realizing new and exciting functionality which is beyond the reach of conventional cryptography.

group_project

Visible to the public SaTC-BSF: CORE: Small: Examining the Impact of Cybersecurity Shocks on Cryptocurrency Platforms

Cryptocurrency platforms facilitate trade, currency exchange, payments and other advanced financial instruments for Bitcoin and other emerging cryptocurrencies. Although there has been an explosion of innovation over the past several years, frequent security lapses threaten the viability of these new technologies. This project investigates how cybersecurity shocks affect the operation of cryptocurrency platforms. It has three main parts.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: An Algebraic Approach to Secure Multilinear Maps for Cryptography

The project is an interdisciplinary collaboration between mathematicians and computer scientists in an intensive focused research effort to solve a central challenge in cryptography, namely constructing a family of secure and efficient algebraic multilinear maps. Multilinear maps have remarkable applications in cryptography, such as multiuser non-interactive key-exchange, general functional encryption, fully-homomorphic encryption, and indistinguishability obfuscation. The results of the project are expected to enable a new age of cryptographic systems and open new directions in the field.

group_project

Visible to the public SaTC: CORE: Small: Efficient Hardware-Aware and Hardware-Enabled Algorithms for Secure In-Memory Databases

Many big-data workloads are hosted on the cloud to facilitate sharing and low cost. Many of these workloads deal with sensitive data, e.g., electronic health records. Cloud infrastructures are vulnerable to attacks from untrusted operators with physical access to the computers. These attacks can take many forms and may compromise privacy or integrity. To guarantee the security of sensitive data and ensure the cost-effectiveness of shared cyberinfrastructure, it is vital that these attacks be thwarted while not incurring a significant penalty in terms of performance, energy, or cost.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Measuring the Value of Anonymous Online Participation

Many ordinary people desire anonymous communication for good reason, such as to keep their medical histories confidential or their finances to themselves. People in totalitarian countries may want to communicate about their views anonymously. This project could enable anonymous participation in spaces like Wikipedia and Reddit, while avoiding the negative social behaviors for these online communities of such participation.

group_project

Visible to the public SaTC: CORE: Small: Multi-Party High-dimensional Machine Learning with Privacy

Individuals and organizations can frequently benefit from combining their data to learn collective models. However, combining data to enable multi-party learning is often not possible. It may not be permitted due to privacy policies, or may be considered too risky for a business to expose its own data to others. In addition, high-dimensional data are prevalent in modern data-driven applications. Learning from high-dimensional data owned by differential organizations is even more challenging, due to the bias introduced by the high-dimensional machine learning methods.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: A Linguistically-Informed Approach for Measuring and Circumventing Internet Censorship

Internet censorship consists of restrictions on what information can be publicized or viewed on the Internet. According to Freedom House's annual Freedom on the Net report, more than half the world's Internet users now live in a place where the Internet is censored or restricted. However, members of the Internet Freedom community lack comprehensive real-time awareness of where and how censorship is being imposed. The challenges to achieving such a solution include but are not limited to coverage, scalability, adoption, and safety.

group_project

Visible to the public SaTC: CORE: Small: Crypto-for-Privacy

The collection, retention, and misuse of private information can pose threats to individuals, institutions, and collective values. Cryptography can be a useful tool to help address these concerns, enhancing our security and our ability to feel secure. Historically, however, this potential benefit has been largely unrealized, perhaps because most of the research in cryptography have gone to securing electronic commerce and to investigating foundational questions in the field.

group_project

Visible to the public SaTC: CORE: Medium: Collaborative: Energy-Harvested Security for the Internet of Things

The Internet of Things integrates the virtual world of computers into real-world applications, leading to better efficiency, economy and an improved quality of life. This requires a huge amount of tiny computers, and this project addresses the challenge of powering those computers in a sustainable manner. Tiny computers can run off harvested energy sources such as solar, vibration and/or temperature gradient. The project objective is to show how such energy-constrained devices can support secure and full Internet connectivity.

group_project

Visible to the public SaTC: CORE: Small: Eye Movement Biometrics in Virtual and Augmented Reality

Virtual and augmented reality (VR/AR) applications are expected to play an increasingly important role in many aspects of everyday life; however, we do not yet have effective methods for protecting VR/AR systems from cybersecurity threats. The goal of this research is to make VR/AR systems more secure via the development of highly accurate and counterfeit-resistant biometric techniques based on eye movements. These techniques are based on the computational modeling of multiple characteristics of the way individuals move their eyes.