- Cryptography and Data Security
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- Biometric Identification and Security
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Privacy, Security, and Data Protection
- Blockchain Technology Applications and Security
- RFID technology advancements
- Physical Unclonable Functions (PUFs) and Hardware Security
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Steganography and Watermarking Techniques
- Security and Verification in Computing
- COVID-19 Digital Contact Tracing
- Chaos-based Image/Signal Encryption
- Digital Rights Management and Security
- Advanced Data Storage Technologies
- Network Security and Intrusion Detection
- Algorithms and Data Compression
- Advanced Image and Video Retrieval Techniques
- Electric Vehicles and Infrastructure
- Bluetooth and Wireless Communication Technologies
University of Surrey
2022-2024
Osaka University
2019-2021
Singapore Management University
2018-2020
University of Wollongong
2016-2017
Zhengzhou University
2013
NEC (China)
2009
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and smartphones to physical world for improving efficiency accuracy while reducing production cost. However, there are tremendous security threats IIoT, such as IIoT device hijacking data leaks. Therefore, a lightweight authenticated key agreement (AKA) protocol commonly applied establish session securing communication between devices. To...
With the development of Internet Things, communication and computer technology, significance realizing vehicular ad hoc networks (VANETs) become more important. Due to wireless communication, VANETs suffer cyber attacks in practice. Many anonymous authentication schemes have been proposed literature. Li et al. an efficient scheme called CL-CPPA. However, failed realize claimed un-linkability anonymity. In this work, we a new certificateless conditional privacy-preserving with enhanced...
We introduce MobiCeal, the first practical Plausibly Deniable Encryption (PDE) system for mobile devices that can defend against strong coercive multi-snapshot adversaries, who may examine storage medium of a user's device at different points time and force user to decrypt data. MobiCeal relies on "dummy write" obfuscate differences between multiple snapshots due existence hidden By incorporating PDE in block layer, supports broad deployment any block-based file systems devices. More...
Recently, Roy et al. proposed a physically unclonable function (PUF)-based authentication and key exchange protocol for Internet of Things (IoT) devices. The PUF is efficient, because it integrates both the Node-to-Node (N2N) Node-to-Server (N2S) into standalone protocol. In this paper, we therefore examine security under assumption an insider attack. Our cryptanalysis findings are following. (1) A legitimate but malicious IoT node can monitor secure communication among server any other...
Cyber-Physical Systems (CPS) provide the foundation of our critical infrastructures, which form basis emerging and future smart services improve quality life in many areas. In such CPS, sensor data is transmitted over network to controller, will make real-time control decisions according received data. Due existence spoofing attacks (more specifically false injection attacks), one has protect authenticity integrity For example, a digital signature can be used solve this issue. However,...
Biometric-based remote user authentication (BRUA) is a useful primitive that allows an authorized to remotely authenticate cloud server using biometrics. However, the existing BRUA solutions in client-server setting lack certain privacy considerations. For example, user's multiple sessions should not be linked while his identity remains anonymous server. In this work, we introduce identity-concealed and unlinkable biometric-based framework, such users honest-but-curious manner. particular,...
Recently, Zerrouki et al. proposed a Physically Unclonable Function (PUF) mutual authentication and session key establishment protocol for IoT (Internet of Things) devices. al.’s PUF is interesting because it does not require the storage any sensitive information on local memory device, which avoids many potential attacks, especially side-channel attacks. Therefore, we carefully investigate security under leakage assumption key. Our findings are in following. First, fails to provide...
Proxy signature is a useful cryptographic primitive that has been widely used in many applications. It attracted lot of attention since it was introduced. There have lots works constructing efficient and secure proxy schemes. In this paper, we identify new attack neglected by existing proven We demonstrate launching against an identity‐based scheme which secure. then propose one method can effectively prevent attack. The weakness some other schemes also be fixed applying the same method.
Bluetooth low energy (LE) devices have been widely used in the Internet of Things (IoT) and wireless personal area networks (WPAN). However, attackers may compromise user privacy by tracking addresses LE device. The resolvable private address (RPA) mechanism provides protection for Similar to Zhang Lin’s work CCS 2022, we investigate RPA this paper. Our contributions are threefold. First, discover that has a weakness. attacker can track targeted device exploiting runs when he intercepts...
This paper proposes an inverted-index-based, practical, encrypted search engine, including index creation, search, and maintenance methods. Recently, more patients are placing their medical data at online third-party services, such as Google Health. If sensitive stored a semi-trusted third-party, security guarantee is necessary for assurance of confidentiality access pattern privacy. However, most service providers only provide by policy means. The new method proposed in this can efficiently...
Abstract In this paper, we introduce a new construction for unlinkable secret handshake that allows group of users to perform handshakes anonymously. We define formal security models the proposed and prove it can achieve session key security, anonymity affiliation hiding. particular, ensures (i) against protocol participants (including authority) is achieved since hierarchical identity-based signature used in generating user’s pseudonym-credential pairs (ii) revocation using sharing-based mechanism.
Attribute-Based Encryption (ABE) provides fine-grained access control to encrypted data and finds applications in various domains. The practicality of ABE schemes hinges on the balance between security efficiency. state-of-the-art adaptive secure scheme, proven be adaptively under standard assumptions (FAME, CCS'17), is less efficient compared fastest one (FABEO, CCS'22) which only Generic Group Model (GGM). These traditional focus solely message privacy. To address scenarios where attribute...
Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional does not fit well where an intermediate entity (editor) is required modify the authenticated provided by source/data owner before sending other recipients. To ask for authenticating each modified can lead higher communication overhead. In this article, we introduce notion of editing-enabled signatures choose any set modification operations applicable on still restrict...
In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability signature, and prove schemes provide biometrics (aka. signature). define formal security models for proposed construction, it achieves authenticity privacy. The ensures: 1) user’s can be securely reused in authentication; 2) third party having access to communication channel between server cannot identify user.