Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. My reseach in applied cryptogrpahy includes:
-
Searchable encryption: Outsourcing data storage to the Clouds is becoming more and more popular. However, data confidentiality is a major concern. One way to address the concern is to encrypt the data at the client side before uploading it to the Cloud. But this makes it difficult to retrieve the data. Searchable data encryption allows an untrusted server to store encrypted data and to retrieve data based on encrypted keywords without decrypting the data.
-
Cryptographic protocol design: A cryptographic protocol is a set of algorithms performing a security-related function that employ cryptographic methods. Designing a protocol also includes details about data structures, representations and so on.
-
Formal analysis of cryptographic protocols: The increasing complexity in the design of such protocols leads to more complex and longer proofs. For this reason, employing formal methods to mechanise the mathematical reasoning has been an active research area.
Searchable encryption
-
Sci. China Inf. Sci.
Cetus: an efficient symmetric searchable encryption against file-injection
attack with SGX
Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, and Changyu Dong
Sci. China Inf. Sci., 2021
-
TDSC
Searchable Symmetric Encryption with Forward Search Privacy
Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu,
Changyu Dong, and Wenjing Lou
IEEE Trans. Dependable Secur. Comput., 2021
-
TDSC
Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection
Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong
IEEE Trans. Dependable Secur. Comput., 2020
-
TDSC
Forward Private Searchable Symmetric Encryption with Optimized I/O
Efficiency
Xiangfu Song,
Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao
IEEE Trans. Dependable Secur. Comput., 2020
-
JCS
Shared and searchable encrypted data for untrusted servers
Changyu Dong, Giovanni Russello, and Naranker Dulay
J. Comput. Secur., 2011
-
Shared and Searchable Encrypted Data for Untrusted Servers
Changyu Dong, Giovanni Russello, and Naranker Dulay
In 22nd Annual IFIP WG 11.3
Working Conference on Data and Applications Security, 2008
Cryptographic protocol design
-
TOPS
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
Liqun Chen,
Changyu Dong, Christopher J. P. Newton, and Yalan Wang
ACM Trans. Priv. Secur., 2024
-
Hash-Based Direct Anonymous Attestation
Liqun Chen,
Changyu Dong, Nada El Kassem, Christopher J. P. Newton, and Yalan Wang
In 14th International Symposium on Post-Quantum Cryptography (PQCrypto
2023), 2023
-
Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic
Encryption
Emanuele Scala,
Changyu Dong, Flavio Corradini, and Leonardo Mostarda
In 37th International Conference on Advanced Information Networking
and Applications (AINA-2023), 2023
-
TIFS
VeriFL: Communication-Efficient and Fast Verifiable Aggregation for
Federated Learning
Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou,
Changyu Dong, and Thar Baker
IEEE Trans. Inf. Forensics Secur., 2021
-
TSC
Encryption Switching Service: Securely Switch Your Encrypted Data
to Another Format
Peng Jiang, Jianting Ning, Kaitai Liang,
Changyu Dong, Jiageng Chen, and Zhenfu Cao
IEEE Trans. Serv. Comput., 2021
-
TDSC
EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, and Changyu Dong
IEEE Trans. Dependable Secur. Comput., 2020
-
Information Flow Control with Minimal Tag Disclosure
Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier,
Changyu Dong, David M. Eyers, and Jean Bacon
In International Conference on Internet of Things
and Cloud Computing, 2016
-
Secure Set-Based Policy Checking and Its Application to Password Registration
Changyu Dong, and Franziskus Kiefer
In 14th International Conference on Cryptology and Network Security, 2015
-
Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile
Applications
Changyu Dong, and Naranker Dulay
In 5th IFIP WG 11.11 International Conference on Trust Management, 2011
-
PUC
Context-based authentication and transport of cultural assets
Leonardo Mostarda,
Changyu Dong, and Naranker Dulay
Pers. Ubiquitous Comput., 2010
-
SCP
Providing data confidentiality against malicious hosts in Shared Data
Spaces
Giovanni Russello,
Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
Sci. Comput. Program., 2010
-
Encrypted Shared Data Spaces
Giovanni Russello,
Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
In 10th International Conference on Coordination Models and Languages, 2008
-
Place and Time Authentication of Cultural Assets
Leonardo Mostarda,
Changyu Dong, and Naranker Dulay
In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008
-
Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
Changyu Dong, Giovanni Russello, and Naranker Dulay
In International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, 2007
Formal analysis
-
TIFS
Analyzing and Patching SPEKE in ISO/IEC
Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong
IEEE Trans. Inf. Forensics Secur., 2018
-
Automated Cryptographic Analysis of the Pedersen Commitment Scheme
Roberto Metere, and Changyu Dong
In 7th International Conference on Mathematical
Methods, Models, and Architectures for Computer Network Security, 2017