Accurate and Efficient Privacy-Preserving String Matching

A few ANU colleagues and I have just completed a paper on a suffix-tree-based algorithm for computing the longest common substring of two strings in a privacy-preserving manner. Here’s the abstract: The task of calculating similarities between strings held by different organizations without revealing these strings is an increasingly important problem in areas such as … More Accurate and Efficient Privacy-Preserving String Matching

The Success Formula

The Networks scientist Albert-Laszlo Barabasi’s latest book The Formula: The Science Behind Why People Succeed or Fail is a cracker. His six laws of success summarise more than a decade of research into the science of success, in particular how the social network in which we live and operate, with its many kinds of relationships … More The Success Formula

Linking Integer Records: The Simplest Case of PPRL

Privacy-Preserving Record Linkage (PPRL) is one of those problems that still doesn’t have a solid and widely accepted mathematical definition, perhaps because the problem of Record Linkage itself, especially the kind that doesn’t reduce to supervised learning through an abundance of labelled matches, still doesn’t have a solid mathematical definition despite thousands of papers published … More Linking Integer Records: The Simplest Case of PPRL

Legislation as Code

Apparently, everything that has the word Blockchain attached to it is now news-worthy. Or at least that’s how I think this relatively small R&D collaboration between AUSTRAC and Swinburne University of Technology got a mention a couple of days ago in ZDNet, a pretty respectable technology site that has been around forever. https://www.zdnet.com/article/austrac-trialling-blockchain-to-automate-funds-transfer-instructions/ Coding the … More Legislation as Code

Useful Technical Tutorials on Fully Homomorphic Encryption

I have gone through quite a few articles over the last 12 months in my attempt to get a proper understanding of fully homomorphic encryption (FHE) schemes. The process was somewhat frustrating because most of the articles are either too basic, giving just very high-level intuitions, or too deep, assuming too much background on the … More Useful Technical Tutorials on Fully Homomorphic Encryption