Research Directory Entry
The code here is used by the department to generate the
research directory. This page is purposefully formatted like this because that is the format we have to submit it in.
<group_id/> CrySP
<group/> Cryptography, Security, and Privacy (CrySP)
<url/> http://crysp.uwaterloo.ca
<contact/> Urs Hengartner (<em> <a
href="mailto:crysp@cs.uwaterloo.ca"> crysp@cs.uwaterloo.ca </a> </em> )
<members/> Ian Goldberg, Urs Hengartner, Ian McKillop, Doug Stinson
<overview/>
The Cryptography, Security, and Privacy (CrySP) research group carries
out research in a wide variety of topics, from designing cryptographic
protocols to the evaluation of their effectiveness and usability in
deployed systems. Some examples are:
<ul>
<li> (Distributed) cryptographic protocols. Designing interactive
protocols to enable secure communication, such as key agreement
protocols, key distribution schemes, secret sharing schemes,
identification schemes, broadcast encryption, private information
retrieval, and oblivious transfer.
<li> Efficient cryptographic algorithms and their implementation.
Designing and analyzing cryptographic primitives such as block and
stream ciphers, public-key encryption schemes, signature schemes, and
message authentication codes.
<li> Cryptographic hash functions. Analyzing the security of iterated
design techniques and the random oracle model and constructing families
of universal hash functions.
<li> Useful security and privacy technologies. Producing security and
privacy technologies which have a real effect on people's lives,
following the principles of usability, deployability, effectiveness,
and robustness.
<li> Effectiveness of security measures. Analyzing proposed and deployed
cryptographic and security systems in order to measure their effectiveness.
<li> Privacy on the Internet. Giving both users and providers of
Internet services the ability to control who gets access to their data
and other personal information.
<li> Security and usability. Making security systems which are easy for
people to use correctly, but which also maintain as much security as
possible when things go wrong.
<li> Location privacy: Developing privacy-preserving technologies for
users of location-based services.
<li> Privacy for (mobile) social networking: Designing privacy-preserving
technologies for users of (mobile) online social networking sites.
<li> Cryptographic and online voting. Designing and analyzing voting
protocols with high usability and voter-verifiable correctness.
<li> Response and recovery strategies. Evaluating and designing effective
incident response strategies to ensure business continuity.
<li> Security assessment and audit. Applying system vulnerability and risk
assessment techniques with a particular focus on the financial services
and health sectors.
</ul>
CrySP is part of the Centre For Applied Cryptographic Research (CACR) at
the University of Waterloo and collaborates with other groups within the
Cheriton School of Computer Science, such as Algorithms and Complexity,
Human-Computer Interaction, Networks and Distributed Systems, and
Databases.
<interests/>
#
# Please describe, in the following section,
# any major awards that your group has received.
#
<awards/>
#
# Please include from 3 to 7 keywords or phrases,
# ONE PER LINE, in the following "keywords" section,
# that describe the group's research.
# They will be used to construct the index.
#
<keywords/>
Cryptography
Security
Privacy