Yangguang Tian

ORCID: 0000-0002-6624-5380
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data
  • Biometric Identification and Security
  • Internet Traffic Analysis and Secure E-voting
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Security in Wireless Sensor Networks
  • Privacy, Security, and Data Protection
  • Blockchain Technology Applications and Security
  • RFID technology advancements
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Steganography and Watermarking Techniques
  • Security and Verification in Computing
  • COVID-19 Digital Contact Tracing
  • Chaos-based Image/Signal Encryption
  • Digital Rights Management and Security
  • Advanced Data Storage Technologies
  • Network Security and Intrusion Detection
  • Algorithms and Data Compression
  • Advanced Image and Video Retrieval Techniques
  • Electric Vehicles and Infrastructure
  • Bluetooth and Wireless Communication Technologies

University of Surrey
2022-2024

Osaka University
2019-2021

Singapore Management University
2018-2020

University of Wollongong
2016-2017

Zhengzhou University
2013

NEC (China)
2009

Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and smartphones to physical world for improving efficiency accuracy while reducing production cost. However, there are tremendous security threats IIoT, such as IIoT device hijacking data leaks. Therefore, a lightweight authenticated key agreement (AKA) protocol commonly applied establish session securing communication between devices. To...

10.1109/tii.2019.2963328 article EN IEEE Transactions on Industrial Informatics 2019-12-31

With the development of Internet Things, communication and computer technology, significance realizing vehicular ad hoc networks (VANETs) become more important. Due to wireless communication, VANETs suffer cyber attacks in practice. Many anonymous authentication schemes have been proposed literature. Li et al. an efficient scheme called CL-CPPA. However, failed realize claimed un-linkability anonymity. In this work, we a new certificateless conditional privacy-preserving with enhanced...

10.1109/tvt.2022.3194060 article EN IEEE Transactions on Vehicular Technology 2022-07-26

We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for mobile devices that can defend against strong coercive multi-snapshot adversaries, who may examine storage medium of a user's device at different points time and force user to decrypt data. MobiCeal relies on "dummy write" obfuscate differences between multiple snapshots due existence hidden By incorporating PDE in block layer, supports broad deployment any block-based file systems devices. More...

10.1109/dsn.2018.00054 article EN 2018-06-01

Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF is efficient, because it integrates both the Node-to-Node (N2N) Node-to-Server (N2S) into standalone protocol. In this paper, we therefore examine security under assumption an insider attack. Our cryptanalysis findings are following. (1) A legitimate but malicious IoT node can monitor secure communication among server any other...

10.3390/s23146559 article EN cc-by Sensors 2023-07-20

Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form basis emerging and future smart services improve quality life in many areas. In such CPS, sensor data is transmitted over network to controller, will make real-time control decisions according received data. Due existence spoofing attacks (more specifically false injection attacks), one has protect authenticity integrity For example, a digital signature can be used solve this issue. However,...

10.1145/3320269.3372195 article EN 2020-10-05

Biometric-based remote user authentication (BRUA) is a useful primitive that allows an authorized to remotely authenticate cloud server using biometrics. However, the existing BRUA solutions in client-server setting lack certain privacy considerations. For example, user's multiple sessions should not be linked while his identity remains anonymous server. In this work, we introduce identity-concealed and unlinkable biometric-based framework, such users honest-but-curious manner. particular,...

10.1109/desec.2018.8625169 article EN 2018-12-01

Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. al.’s PUF is interesting because it does not require the storage any sensitive information on local memory device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate security under leakage assumption key. Our findings are in following. First, fails to provide...

10.3390/math10224310 article EN cc-by Mathematics 2022-11-17

Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It attracted lot of attention since it was introduced. There have lots works constructing efficient and secure proxy schemes. In this paper, we identify new attack neglected by existing proven We demonstrate launching against an identity‐based scheme which secure. then propose one method can effectively prevent attack. The weakness some other schemes also be fixed applying the same method.

10.1155/2018/6925019 article EN cc-by Wireless Communications and Mobile Computing 2018-01-01

Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking addresses LE device. The resolvable private address (RPA) mechanism provides protection for Similar to Zhang Lin’s work CCS 2022, we investigate RPA this paper. Our contributions are threefold. First, discover that has a weakness. attacker can track targeted device exploiting runs when he intercepts...

10.3390/math10224346 article EN cc-by Mathematics 2022-11-19

This paper proposes an inverted-index-based, practical, encrypted search engine, including index creation, search, and maintenance methods. Recently, more patients are placing their medical data at online third-party services, such as Google Health. If sensitive stored a semi-trusted third-party, security guarantee is necessary for assurance of confidentiality access pattern privacy. However, most service providers only provide by policy means. The new method proposed in this can efficiently...

10.1109/iccw.2009.5208080 article EN IEEE International Conference on Communications workshops 2009-06-01

Abstract In this paper, we introduce a new construction for unlinkable secret handshake that allows group of users to perform handshakes anonymously. We define formal security models the proposed and prove it can achieve session key security, anonymity affiliation hiding. particular, ensures (i) against protocol participants (including authority) is achieved since hierarchical identity-based signature used in generating user’s pseudonym-credential pairs (ii) revocation using sharing-based mechanism.

10.1093/comjnl/bxaa181 article EN The Computer Journal 2020-11-26

Attribute-Based Encryption (ABE) provides fine-grained access control to encrypted data and finds applications in various domains. The practicality of ABE schemes hinges on the balance between security efficiency. state-of-the-art adaptive secure scheme, proven be adaptively under standard assumptions (FAME, CCS'17), is less efficient compared fastest one (FABEO, CCS'22) which only Generic Group Model (GGM). These traditional focus solely message privacy. To address scenarios where attribute...

10.1145/3658644.3670321 article EN 2024-12-02

Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional does not fit well where an intermediate entity (editor) is required modify the authenticated provided by source/data owner before sending other recipients. To ask for authenticating each modified can lead higher communication overhead. In this article, we introduce notion of editing-enabled signatures choose any set modification operations applicable on still restrict...

10.1109/jiot.2020.2972741 article EN IEEE Internet of Things Journal 2020-02-11

In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability signature, and prove schemes provide biometrics (aka. signature). define formal security models for proposed construction, it achieves authenticity privacy. The ensures: 1) user’s can be securely reused in authentication; 2) third party having access to communication channel between server cannot identify user.

10.3233/jcs-191370 article EN Journal of Computer Security 2021-02-03
Coming Soon ...