Multiplication and Comparison Operations in Paillier

As is well known, the Paillier encryption system supports addition of two encrypted numbers and the scalar multiplication of a constant and an encrypted number. I learned recently one can compare two encrypted numbers and multiply two encrypted numbers in Paillier by making a trip to the private key holder. Let’s first look at comparison. … More Multiplication and Comparison Operations in Paillier

SJM Holdings: Hanging On or Cashing Out?

Back in Sep 2015, I wrote this¬†article¬†outlining the investment case for SJM Holdings. The story is simple: the Macau gaming revenue had more than halved by Sep 2015 from a peak in early 2014 because of the corruption crackdown in China, sending Macau gaming stocks crashing more than 70% in some cases; the long-term fundamentals … More SJM Holdings: Hanging On or Cashing Out?

A Framework to Detect Waste and Fraud in Health Insurance

A challenge with fraud-detection problems in many cases is the lack of any meaningful collection of labelled data for supervised-learning approaches to work. Two things practitioners do to tackle the problem are statistical profiling, usually via domain-specific business rules, and statistical outlier detection, sometimes augmented with non-trivial models of what constitute “normal” behaviour. There is … More A Framework to Detect Waste and Fraud in Health Insurance

Large-Scale Distributed Analytics: A Research Program

Since starting my part-time appointment as an associate professor at the Australian National University, I have been thinking about spending more time on fundamental research. As Don Knuth counsels, “if you find that you’re spending almost all your time on theory, start turning some attention to practical things; it will improve your theories. If you … More Large-Scale Distributed Analytics: A Research Program