Hardening Bloom Filters using Paillier Encryption

Bloom FiltersĀ is a popular technique for privacy-preserving record linkage. However, recent work by Christen et al [1] and others have shown that Bloom Filters (BF) are susceptible to different forms of frequency attack. There are many ideas on hardening BF to protect against frequency attacks, and one idea we will explore in this blog article … More Hardening Bloom Filters using Paillier Encryption

Multiplication and Comparison Operations in Paillier

As is well known, the Paillier encryption system supports addition of two encrypted numbers and the scalar multiplication of a constant and an encrypted number. I learned recently one can compare two encrypted numbers and multiply two encrypted numbers in Paillier by making a trip to the private key holder. Let’s first look at comparison. … More Multiplication and Comparison Operations in Paillier

Cyber Security Cooperative Research Centre

Congratulations to the ACSRI-led team for winning $50-million in funding from the Department of Industry, Innovation and Science to set up a new Cyber Security Cooperative Research Centre in Australia. It’s great to see the Australian government putting resources into a key research area that is increasing in importance as the world becomes more and … More Cyber Security Cooperative Research Centre

How to Quickly and Meaningfully Improve the Financial System’s Collective Ability to Detect Crimes

Complex financial crimes are hard to detect primarily because data related to different pieces of the overall puzzle are usually distributed across a network of financial institutions, regulators, and law-enforcement agencies. The problem is also rapidly increasing in complexity because new platforms are emerging all the time that facilitate the transfer of value across a … More How to Quickly and Meaningfully Improve the Financial System’s Collective Ability to Detect Crimes