Restricted Research - Award List, Note/Discussion Page

Fiscal Year: 2021

173  University of North Texas  (84469)

Principal Investigator: Dantu,Ramanamurthy

Total Amount of Contract, Award, or Gift (Annual before 2011): $ 154,588

Exceeds $250,000 (Is it flagged?): No

Start and End Dates: - 9/9/22

Restricted Research: YES

Academic Discipline: Computer Science & Engineering

Department, Center, School, or Institute: College of Engineering

Title of Contract, Award, or Gift: 2020 University of North Texas NCAE- C Research Grant

Name of Granting or Contracting Agency/Entity: National Security Agency
CFDA Link: DOD
12.902

Program Title: N/A
CFDA Linked: Information Security Grant Program

Note:

The innovations we propose can potentially revolutionize the creation, sharing, and use of contact networks. First, our framework will facilitate the fast deployment of new algorithms in real-world scenarios by enabling collaborations between scientists and administrators. Second, we propose a novel k-core decomposition-based anonymization scheme, where more aggressive anonymization techniques can be used on important core vertices, and less aggressive but cheaper methods can be used on the peripheral vertices. Third, our hierarchical framework for homomorphic graph encryption will be one of the first systems that allow processing large sparse matrices in an encrypted form. Our project will pioneer cross-disciplinary interaction between graph theory and cryptography, as new graph algorithms will be developed to match the requirements/constraints imposed by the existing cryptosystems, and the new cryptosystems will be designed taking into account potential graph analysis applications. Our framework can be used beyond contact network analysis in a broad range of data applications, including social networks, recommendation networks, and telecommunication networks. The encryption schemes developed through this project will be integrated into software libraries, such as PALISADE and contributing to the standardization of homomorphic encryption functions.

Discussion: No discussion notes

 

Close Window