Don't miss our weekly PhD newsletter | Sign up now Don't miss our weekly PhD newsletter | Sign up now

  Privacy-Aware and Trusted AI with Post Quantum Cryptography and Homomorphic Encryption


   School of Computing, Engineering & the Built Environment

This project is no longer listed on FindAPhD.com and may not be available.

Click here to search FindAPhD.com for PhD studentship opportunities
  Prof B Buchanan, Dr NIKOLAOS Pitropakis  No more applications being accepted  Funded PhD Project (UK Students Only)

About the Project

One fully funded PhD position in the Blockpass Identity Lab at Edinburgh Napier University on a project titled “Privacy-Aware AI with Post Quantum Cryptography and Homomorphic Encryption”. 

At the present time, all of our public key encryption methods will be cracked with the use of Shor’s algorithm running on a quantum computer. The aim of this PhD project is to study algorithms and applied cryptography related to the integration of post-quantum cryptography methods within privacy-aware AI. This includes methods used for Zero Knowledge Proofs (ZKPs) and Homomorphic Encryption (HE), and applied in privacy-aware and trusted AI.

The project is co-funded by Acubed.IT – an innovative UK-based company which works in highly secure application areas. The successful applicant will thus have the opportunity to work with members of the research team and the company with the goal of producing high-quality papers in major conferences and journals in computer science.

The PhD position is only available to UK or NATO nationals and comes with a full stipend.

Essential attributes:

  • Strong analytical and programming skills.
  • A good Bachelor’s Hons degree (2.1 or above or international equivalent) and/or Master’s degree in a relevant subject (computer science, mathematics, economics, physics, engineering, or related subject).
  • Proficiency in English (both oral and written).
  • Strong motivation, with evidence of independent research skills relevant to the project.

Desirable attributes:

  • Good mathematical/analytical skills.
  • Knowledge of cryptography fundamentals and their application.

English language requirement

If your first language is not English, comply with the University requirements for research degree programmes in terms oEnglish language.

Application process

Prospective applicants are encouraged to contact the supervisor, Professor Bill Buchanan (Email: [Email Address Removed]) to discuss the content of the project and the fit with their qualifications and skills before preparing an application. 

The application must include: 

Research project outline of 2 pages (list of references excluded). The outline may provide details about:

  • Background and motivation, explaining the importance of the project, should be supported also by relevant literature. You can also discuss the applications you expect for the project results.
  • Research questions or
  • Methodology: types of data to be used, approach to data collection, and data analysis methods.
  • List of references

The outline must be created solely by the applicant. Supervisors can only offer general discussions about the project idea without providing any additional support.

  • Statement no longer than 1 page describing your motivations and fit with the project.
  • Recent and complete curriculum vitae. The curriculum must include a declaration regarding the English language qualifications of the candidate.
  • Supporting documents will have to be submitted by successful candidates.
  • Two academic references (but if you have been out of education for more than three years, you may submit one academic and one professional reference), on the form can be downloaded here.

Applications can be submitted here.

Computer Science (8)

Funding Notes

Tax-free stipend of GBP £18,622 per year. Full-time PhD tuition fees for a student with a Home fee status (£5,075 per annum). Only UK nationals can apply for this position.


References

Basu, K., Soni, D., Nabeel, M., & Karri, R. (2019). Nist post-quantum cryptography-a hardware evaluation study. Cryptology ePrint Archive.
Hasija, T., Ramkumar, K. R., Kaur, A., Mittal, S., & Singh, B. (2022, June). A Survey on NIST Selected Third Round Candidates for Post Quantum Cryptography. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 737-743). IEEE.
Selvarajan, S., Srivastava, G., Khadidos, A. O., Khadidos, A. O., Baza, M., Alshehri, A., & Lin, J. C. W. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing, 12(1), 38.
Sun, J., Xu, G., Zhang, T., Yang, X., Alazab, M., & Deng, R. H. (2023). Privacy-aware and security-enhanced efficient matchmaking encryption. IEEE Transactions on Information Forensics and Security.