Development, Analysis, and AI-Augmentation of Steganographic Blockchain Protocols in Conjunction with Secure Multi-party Computation for Enhanced Privacy and Security
About the Project
The aim of this project is to develop and analyse novel steganographic blockchain protocols integrated with Secure Multi-party Computation (SMPC) and Artificial Intelligence (AI) privacy-preserving approaches that emphases on developing a robust framework for strengthened privacy and security in decentralised systems. The synthesis of these techniques is aimed towards solving the requirement for enhanced security solutions in the ever-progressive landscape of the digital world.
The foremost aspect of this project is to develop novel steganographic protocols that incorporate covert techniques for embedding transaction details or confidential information. The unique security characteristics such as immutability enables the blockchain to be a fundamental candidate for such improvement, allowing a synthesis of confidentiality and integrity of information. Through this approach, information can be hidden securely and free from authorised disclosure within the blockchain.
Secure Multi-party Computation (SMPC) complements the steganographic blockchain by enabling secure computations on concealed data by various participating entities. The fundamental goal of SMPC within this framework is to facilitate collaborative computations while keeping individual inputs private, adding an extra layer of security in multi-party environments, where revealing sensitive data is not an option.
In order to improve hidden transaction and privacy optimisation within the blockchain domain, the project will utilise Artificial Intelligence (AI) to develop adaptive steganographic algorithms and privacy-preserving methods that aim at contributing to the undetectability of confidential information and also refining the steganographic techniques continuously to mitigate new threats.
The latter aspects of this project will involve an extensive security analysis with the use of established cryptographic and mathematical formal approaches to verify the security of the developed protocols against different attack types.
Unlock this job opportunity
View more options below
View full job details
See the complete job description, requirements, and application process


