Applied Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior. My reseach in applied cryptogrpahy includes:

  • Searchable encryption: Outsourcing data storage to the Clouds is becoming more and more popular. However, data confidentiality is a major concern. One way to address the concern is to encrypt the data at the client side before uploading it to the Cloud. But this makes it difficult to retrieve the data. Searchable data encryption allows an untrusted server to store encrypted data and to retrieve data based on encrypted keywords without decrypting the data.

  • Cryptographic protocol design: A cryptographic protocol is a set of algorithms performing a security-related function that employ cryptographic methods. Designing a protocol also includes details about data structures, representations and so on.

  • Formal analysis of cryptographic protocols: The increasing complexity in the design of such protocols leads to more complex and longer proofs. For this reason, employing formal methods to mechanise the mathematical reasoning has been an active research area.

Searchable encryption

  1. Sci. China Inf. Sci.
    Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
    Yanyu Huang, Siyi Lv, Zheli Liu, Xiangfu Song, Jin Li, Yali Yuan, and Changyu Dong
    Sci. China Inf. Sci., 2021
  2. TDSC
    Searchable Symmetric Encryption with Forward Search Privacy
    Jin Li, Yanyu Huang, Yu Wei, Siyi Lv, Zheli Liu,  Changyu Dong, and Wenjing Lou
    IEEE Trans. Dependable Secur. Comput., 2021
  3. TDSC
    Eurus: Towards an Efficient Searchable Symmetric Encryption with Size Pattern Protection
    Zheli Liu, Yanyu Huang, Xiangfu Song, Bo Li, Jin Li, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  4. TDSC
    Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency
    Xiangfu Song,  Changyu Dong, Dandan Yuan, Qiuliang Xu, and Minghao Zhao
    IEEE Trans. Dependable Secur. Comput., 2020
  5. JCS
    Shared and searchable encrypted data for untrusted servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    J. Comput. Secur., 2011
  6. DBSec
    Shared and Searchable Encrypted Data for Untrusted Servers
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, 2008

Cryptographic protocol design

  1. TOPS
    Sphinx-in-the-Head: Group Signatures from Symmetric Primitives
    Liqun Chen,  Changyu Dong, Christopher J. P. Newton, and Yalan Wang
    ACM Trans. Priv. Secur., 2024
  2. PQCrypto
    Hash-Based Direct Anonymous Attestation
    Liqun Chen,  Changyu Dong, Nada El Kassem, Christopher J. P. Newton, and Yalan Wang
    In 14th International Symposium on Post-Quantum Cryptography (PQCrypto 2023), 2023
  3. AINA
    Zero-Knowledge Multi-transfer Based on Range Proofs and Homomorphic Encryption
    Emanuele Scala,  Changyu Dong, Flavio Corradini, and Leonardo Mostarda
    In 37th International Conference on Advanced Information Networking and Applications (AINA-2023), 2023
  4. TIFS
    VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
    Xiaojie Guo, Zheli Liu, Jin Li, Jiqiang Gao, Boyu Hou,  Changyu Dong, and Thar Baker
    IEEE Trans. Inf. Forensics Secur., 2021
  5. TSC
    Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format
    Peng Jiang, Jianting Ning, Kaitai Liang,  Changyu Dong, Jiageng Chen, and Zhenfu Cao
    IEEE Trans. Serv. Comput., 2021
  6. TDSC
    EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption
    Zheli Liu, Jin Li, Siyi Lv, Yanyu Huang, Liang Guo, Yali Yuan, and Changyu Dong
    IEEE Trans. Dependable Secur. Comput., 2020
  7. ICC
    Information Flow Control with Minimal Tag Disclosure
    Hajoon Ko, Jatinder Singh, Thomas F. J.-M. Pasquier,  Changyu Dong, David M. Eyers, and Jean Bacon
    In International Conference on Internet of Things and Cloud Computing, 2016
  8. CANS
    Secure Set-Based Policy Checking and Its Application to Password Registration
    Changyu Dong, and Franziskus Kiefer
    In 14th International Conference on Cryptology and Network Security, 2015
  9. IFIPTM
    Longitude: A Privacy-Preserving Location Sharing Protocol for Mobile Applications
    Changyu Dong, and Naranker Dulay
    In 5th IFIP WG 11.11 International Conference on Trust Management, 2011
  10. PUC
    Context-based authentication and transport of cultural assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    Pers. Ubiquitous Comput., 2010
  11. SCP
    Providing data confidentiality against malicious hosts in Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    Sci. Comput. Program., 2010
  12. COORDINATION
    Encrypted Shared Data Spaces
    Giovanni Russello,  Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, and Maarten Steen
    In 10th International Conference on Coordination Models and Languages, 2008
  13. IFIPTM
    Place and Time Authentication of Cultural Assets
    Leonardo Mostarda,  Changyu Dong, and Naranker Dulay
    In Joint iTrust and PST Conferences on Privacy, Trust Management and Security, 2008
  14. MMM-ACNS
    Privacy-Preserving Credential Verification for Non-monotonic Trust Management Systems
    Changyu Dong, Giovanni Russello, and Naranker Dulay
    In International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security, 2007

Formal analysis

  1. TIFS
    Analyzing and Patching SPEKE in ISO/IEC
    Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong
    IEEE Trans. Inf. Forensics Secur., 2018
  2. MMM-ACNS
    Automated Cryptographic Analysis of the Pedersen Commitment Scheme
    Roberto Metere, and Changyu Dong
    In 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2017