PI: Michael T. Goodrich
The project is directed at a subject area of critical importance to society--methods for efficiently maintaining the security of computations and computational resources, including the networks that communicate vital data. In addition, the work involves an important educational mission to integrate cyber-security algorithms into the undergraduate computer science curriculum.
The research focuses on developing efficient algorithms for performing trusted computations in a networked environment. Themes to be investigated include:
* Authenticated data structures and algorithms: The project places special emphasis on methods for authenticating the results of data structures and algorithms, even when those computations are performed by an untrusted third party on behalf of a trusted source.
* Audited algorithms: The project will explore a new computational framework in which computations are performed by a community of untrusted users, but this computation is checked by an external auditor with limited computational resources.
* Democratic Trust Assurance: The project is also directed at infrastructures for a community of peers who want to establish trust within their group. Specific interest is in solutions that are practical and potentially applicable to grid computing, while allowing for multiple clients and servers.