Applied Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. My reseach in applied cryptogrpahy includes:

  • Searchable encryption: Outsourcing data storage to the Clouds is becoming more and more popular. However, data confidentiality is a major concern. One way to address the concern is to encrypt the data at the client side before uploading it to the Cloud. But this makes it difficult to retrieve the data. Searchable data encryption allows an untrusted server to store encrypted data and to retrieve data based on encrypted keywords without decrypting the data.

  • Cryptographic protocol design: A cryptographic protocol is a set of algorithms performing a security-related function that employ cryptographic methods. Designing a protocol also includes details about data structures, representations and so on.

  • Formal analysis of cryptographic protocols: The increasing complexity in the design of such protocols leads to more complex and longer proofs. For this reason, employing formal methods to mechanise the mathematical reasoning has been an active research area.

Searchable encryption

  1. Sci. China Inf. Sci.
    Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, and Changyu Dong
    Sci. China Inf. Sci., 2021
  2. TDSC
    Searchable Symmetric Encryption with Forward Search Privacy
    Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu,  Changyu Dong, and Wenjing Lou
    IEEE Trans. Dependable Secur. Comput., 2021
  3. TDSC
    Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection
    Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  4. TDSC
    Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
    Xiangfu Song,  Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao
    IEEE Trans. Dependable Secur. Comput., 2020
  5. JCS
    Shared and searchable encrypted data for untrusted servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    J. Comput. Secur., 2011
  6. DBSec
    Shared and Searchable Encrypted Data for Untrusted Servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008

Cryptographic protocol design

  1. TIFS
    VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
    Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou,  Changyu Dong, and Thar Baker
    IEEE Trans. Inf. Forensics Secur., 2021
  2. TSC
    Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
    Peng Jiang, Jianting Ning, Kaitai Liang,  Changyu Dong, Jiageng Chen, and Zhenfu Cao
    IEEE Trans. Serv. Comput., 2021
  3. TDSC
    EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
    Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  4. ICC
    Information Flow Control with Minimal Tag Disclosure
    Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier,  Changyu Dong, David M. Eyers, and Jean Bacon
    In International Conference on Internet of Things and Cloud Computing, 2016
  5. CANS
    Secure Set-Based Policy Checking and Its Application to Password Registration
    Changyu Dong, and Franziskus Kiefer
    In 14th International Conference on Cryptology and Network Security, 2015
  6. IFIPTM
    Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications
    Changyu Dong, and Naranker Dulay
    In 5th IFIP WG 11.11 International Conference on Trust Management, 2011
  7. PUC
    Context-based authentication and transport of cultural assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    Pers. Ubiquitous Comput., 2010
  8. SCP
    Providing data confidentiality against malicious hosts in Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    Sci. Comput. Program., 2010
  9. COORDINATION
    Encrypted Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    In 10th International Conference on Coordination Models and Languages, 2008
  10. IFIPTM
    Place and Time Authentication of Cultural Assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008
  11. MMM-ACNS
    Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, 2007

Formal analysis

  1. TIFS
    Analyzing and Patching SPEKE in ISO/IEC
    Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong
    IEEE Trans. Inf. Forensics Secur., 2018
  2. MMM-ACNS
    Automated Cryptographic Analysis of the Pedersen Commitment Scheme
    Roberto Metere, and Changyu Dong
    In 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2017