Applied Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. My reseach in applied cryptogrpahy includes:

  • Searchable encryption: Outsourcing data storage to the Clouds is becoming more and more popular. However, data confidentiality is a major concern. One way to address the concern is to encrypt the data at the client side before uploading it to the Cloud. But this makes it difficult to retrieve the data. Searchable data encryption allows an untrusted server to store encrypted data and to retrieve data based on encrypted keywords without decrypting the data.

  • Cryptographic protocol design: A cryptographic protocol is a set of algorithms performing a security-related function that employ cryptographic methods. Designing a protocol also includes details about data structures, representations and so on.

  • Formal analysis of cryptographic protocols: The increasing complexity in the design of such protocols leads to more complex and longer proofs. For this reason, employing formal methods to mechanise the mathematical reasoning has been an active research area.

Searchable encryption

  1. Sci. China Inf. Sci.
    Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, and Changyu Dong
    Sci. China Inf. Sci., 2021
  2. TDSC
    Searchable Symmetric Encryption with Forward Search Privacy
    Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu,  Changyu Dong, and Wenjing Lou
    IEEE Trans. Dependable Secur. Comput., 2021
  3. TDSC
    Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection
    Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  4. TDSC
    Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
    Xiangfu Song,  Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao
    IEEE Trans. Dependable Secur. Comput., 2020
  5. JCS
    Shared and searchable encrypted data for untrusted servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    J. Comput. Secur., 2011
  6. DBSec
    Shared and Searchable Encrypted Data for Untrusted Servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008

Cryptographic protocol design

  1. JISP
    ZeroMT: Towards Multi-Transfer transactions with privacy for account-based blockchain
    Emanuele Scala,  Changyu Dong, Flavio Corradini, and Leonardo Mostarda
    J. Inf. Secur. Appl., 2024
  2. TVT
    Heterogeneous Broadcast Signcryption Scheme With Equality Test for IoVs
    Yingzhe Hou, Yue Cao, Hu Xiong, Jiawen Kang, Chuan Heng Foh, and Changyu Dong
    IEEE Trans. Veh. Technol., 2024
  3. AsiaCCS
    DISCO: Dynamic Searchable Encryption with Constant State
    Xiangfu Song, Yu Zheng, Jianli Bai,  Changyu Dong, Zheli Liu, and Ee-Chien Chang
    In 19th ACM Asia Conference on Computer and Communications Security, 2024
  4. PQCrypto
    A New Hash-Based Enhanced Privacy ID Signature Scheme
    Liqun Chen,  Changyu Dong, Nada El Kassem, Christopher J. P. Newton, and Yalan Wang
    In 15th International Conference on Post-Quantum Cryptography, 2024
  5. TOPS
    Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
    Liqun Chen,  Changyu Dong, Christopher J. P. Newton, and Yalan Wang
    ACM Trans. Priv. Secur., 2024
  6. PQCrypto
    Hash-Based Direct Anonymous Attestation
    Liqun Chen,  Changyu Dong, Nada El Kassem, Christopher J. P. Newton, and Yalan Wang
    In 14th International Symposium on Post-Quantum Cryptography, 2023
  7. AINA
    Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption
    Emanuele Scala,  Changyu Dong, Flavio Corradini, and Leonardo Mostarda
    In 37th International Conference on Advanced Information Networking and Applications, 2023
  8. TIFS
    VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
    Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou,  Changyu Dong, and Thar Baker
    IEEE Trans. Inf. Forensics Secur., 2021
  9. TSC
    Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
    Peng Jiang, Jianting Ning, Kaitai Liang,  Changyu Dong, Jiageng Chen, and Zhenfu Cao
    IEEE Trans. Serv. Comput., 2021
  10. TDSC
    EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
    Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  11. ICC
    Information Flow Control with Minimal Tag Disclosure
    Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier,  Changyu Dong, David M. Eyers, and Jean Bacon
    In International Conference on Internet of Things and Cloud Computing, 2016
  12. CANS
    Secure Set-Based Policy Checking and Its Application to Password Registration
    Changyu Dong, and Franziskus Kiefer
    In 14th International Conference on Cryptology and Network Security, 2015
  13. IFIPTM
    Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications
    Changyu Dong, and Naranker Dulay
    In 5th IFIP WG 11.11 International Conference on Trust Management, 2011
  14. PUC
    Context-based authentication and transport of cultural assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    Pers. Ubiquitous Comput., 2010
  15. SCP
    Providing data confidentiality against malicious hosts in Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    Sci. Comput. Program., 2010
  16. COORDINATION
    Encrypted Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    In 10th International Conference on Coordination Models and Languages, 2008
  17. IFIPTM
    Place and Time Authentication of Cultural Assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008
  18. MMM-ACNS
    Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, 2007

Formal analysis

  1. TIFS
    Analyzing and Patching SPEKE in ISO/IEC
    Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong
    IEEE Trans. Inf. Forensics Secur., 2018
  2. MMM-ACNS
    Automated Cryptographic Analysis of the Pedersen Commitment Scheme
    Roberto Metere, and Changyu Dong
    In 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2017