Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in Advances in Cryptology - EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings, 2012
Recommended citation: Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu: Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134 https://doi.org/10.1007/978-3-642-29011-4_9
Published in Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings, 2012
Recommended citation: Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui: PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696 https://doi.org/10.1007/978-3-642-33167-1_39
Published in 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, Hangzhou, China - May 08 - 10, 2013, 2013
Recommended citation: Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He: Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 http://doi.acm.org/10.1145/2484313.2484321
Published in The Computer Journal, 2013
Recommended citation: Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou: Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013) https://doi.org/10.1093/comjnl/bxs115
Published in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, 2014
Recommended citation: Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 https://doi.org/10.1007/978-3-319-11203-9_8
Published in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015
Recommended citation: Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 https://doi.org/10.1007/978-3-662-46447-2_25
Published in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015, Singapore, April 14-17, 2015, 2015
Recommended citation: Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu: Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 http://doi.acm.org/10.1145/2714576.2714622
Published in IEEE Transactions on Computers, 2015
Recommended citation: Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou: k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) https://doi.org/10.1109/TC.2014.2366741
Published in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xian, China, May 30 - June 3, 2016, 2016
Recommended citation: Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen: Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. AsiaCCS 2016: 901-906 http://doi.acm.org/10.1145/2897845.2897921
Published in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I, 2016
Recommended citation: Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 https://doi.org/10.1007/978-3-319-45744-4_8
Published in The Computer Journal, 2016
Recommended citation: Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe L. Jiang, Jianying Zhou: Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) https://doi.org/10.1093/comjnl/bxv117
Published in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 2017
Recommended citation: Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 https://doi.org/10.1007/978-3-319-66399-9_25
Published in Journal of Computer and System Sciences, 2017
Recommended citation: Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe L. Jiang: A General Framework for Secure Sharing of Personal Health Records in Cloud System. J. Comput. Syst. Sci. 90: 46-62 (2017) https://doi.org/10.1016/j.jcss.2017.03.002
Published in Third International Congress on Information and Communication Technology (ICICT 2018), London, UK, February 27-28, 2018. Proceedings, 2018
Recommended citation: Tsz Hon Yuen and Swee-Huay Heng: Security-Mediated Certificateless Undeniable Signature Scheme. ICICT 2018 https://doi.org/10.1007/978-981-13-1165-9
Published in Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, 2018
Recommended citation: Joseph K. Liu, Tsz Hon Yuen, Peng Zhang, Kaitai Liang: Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List. ACNS 2018: 516-534. https://doi.org/10.1007/978-3-319-93387-0_27
Published in The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), Tokyo, Japan, September 25-27, 2018. Proceedings, 2018
Recommended citation: Hao Ren, Peng Zhang, Qingchun Shentu, Joseph K. Liu and Tsz Hon Yuen: Compact Ring Signature in the Standard Model for Blockchain. ISPEC 2018 https://doi.org/10.1007/978-3-319-99807-7_4
Published in The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), Fuzhou, China, December 14-17, 2018. Proceedings, 2018
Recommended citation: Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu and Tsz Hon Yuen: Anonymity Reduction Attacks To Monero. Inscrypt 2018: 86-100 https://doi.org/10.1007/978-3-030-14234-6_5
Published in The 18th International Conference on Cryptology and Network Security (CANS 2019), Fuzhou, China, 25-27 October 2019, 2019
Recommended citation: Tsz Hon Yuen: PAChain: Private, Authenticated Auditable Consortium Blockchain. CANS 2019: 214-234. Full version can be found in http://thyuen.github.io/files/cans.pdf https://doi.org/10.1007/978-3-030-31578-8_12
Published in The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, 18-20 November 2019, 2019
Recommended citation: Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.
Published in The 13th International Conference on Network and System Security (NSS 2019). Sapporo, Japan. 15-18 December 2019, 2019
Recommended citation: Tsz Hon Yuen and Siu-Ming Yiu: Strong Known Related-Key Attacks and the Security of ECDSA. NSS 2019: 130-145. https://doi.org/10.1007/978-3-030-36938-5_8
Published in Concurrency and Computation Practice and Experience, 2020
Recommended citation: Hui Cui, Tsz Hon Yuen, Robert H. Deng, Guilin Wang: Server-aided revocable attribute-based encryption for cloud computing services. Concurr. Comput. Pract. Exp. 32(14) (2020). https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.5680
Published in IEEE Transactions on Dependable and Secure Computing, 2020
Recommended citation: Shi-Feng Sun, Cong Zuo, Joseph Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu: Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. To appear in IEEE Transactions on Dependable and Secure Computing, 2020. https://ieeexplore.ieee.org/document/8998362
Published in The 24-th International Conference on Financial Cryptography and Data Security (FC 2020). Kota Kinabalu, Sabah, Malaysia. February 10–14, 2020, 2020
Recommended citation: Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483. https://doi.org/10.1007/978-3-030-51280-4_25
Published in Future Generation Computer Systems. Volume 112, November 2020, Pages 913-929, 2020
Recommended citation: Tsz Hon Yuen: PAChain: Private, Authenticated & Auditable Consortium Blockchain and its Implementation. Future Generation Computer Systems. Volume 112, November 2020, Pages 913-929. https://www.sciencedirect.com/science/article/abs/pii/S0167739X19328547
Published in The 16th International Conference on Information Security and Cryptology (Inscrypt 2020), Guangzhou, China, December 11-14, 2020, 2020
Recommended citation: Cailing Cai and Tsz Hon Yuen: LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social Networks. In Inscrypt 2020: 288-303. https://doi.org/10.1007/978-3-030-71852-7_19
Published in The 23rd Information Security Conference (ISC) 2020, 16–20 December 2020, 2020
Recommended citation: Rouzbeh Behnia, Attila Altay Yavuz, Muslum Ozgur Ozmen, and Tsz Hon Yuen: Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. In ISC 2020: 39-58. https://doi.org/10.1007/978-3-030-62974-8_3
Published in The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Guangzhou, China, December 29, 2020 - January 1, 2021, 2020
Recommended citation: Handong Cui and Tsz Hon Yuen: Address-based Signature. In IEEE TrustCom 2020: 884-891. https://doi.org/10.1109/TrustCom50675.2020.00119
Published in The 24th International Conference on Practice and Theory of Public-Key Cryptography, (PKC 2021) Virtual Event, May 10-13, 2021, 2021
Recommended citation: Tsz Hon Yuen, Handong Cui and Xiang Xie: Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup. In PKC 2021: 481-511. https://eprint.iacr.org/2021/205
Published in Crypto 2021, Virtual, Aug 15-19, 2021, 2021
Recommended citation: Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au and Zhimin Ding: DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. In CRYPTO 2021: 251-281. https://github.com/thyuen/dualring
Published in The 20th IEEE International Conference On Trust, Security and Privacy in Computing and Communications, (Trustcom 2021) Shenyang, Chinaa, August 18-20, 2021, 2021
Recommended citation: Handong Cui, Xianrui Qin, Cailing Cai and Tsz Hon Yuen : Security on SM2 and GOST Signatures against Related Key Attacks. In IEEE Trustcom 2021: 155-163. https://doi.org/10.1109/TrustCom53373.2021.00038
Published in The 26th European Symposium on Research in Computer Security, (ESORICS 2021), Virtual, October 4-8, 2021, 2021
Recommended citation: Xianrui Qin, Cailing Cai and Tsz Hon Yuen: One-more Unforgeability of Blind ECDSA. In ESORICS 2021: 313-331. https://doi.org/10.1007/978-3-030-88428-4_16
Published in The ACM Conference on Computer and Communications Security, (CCS 2021), Seoul, South Korea, November 15-19, 2021, 2021
Recommended citation: Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen and Handong Cui: Efficient Online-friendly Two-Party ECDSA Signature. In CCS 2021: 558-573. https://eprint.iacr.org/2022/318
Published in The 26th Australasian Conference on Information Security and Privacy, (ACISP 2021) Perth, Australia, December 1-3, 2021, 2021
Recommended citation: Handong Cui and Tsz Hon Yuen: A Trustless GQ Multi-Signature Scheme with Identifiable Abort. In ACISP 2021: 673-693. https://doi.org/10.1007/978-3-030-90567-5_34
Published in International Conference on Information Security Practice and Experience (ISPEC 2021). Nanjing , China, December 17-19, 2021., 2021
Recommended citation: Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li: Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. In ISPEC 2021, 327-344. https://eprint.iacr.org/2020/528
Published in The ACM Asia Conference on Computer and Communications Security, (AsiaCCS 2022) Nagasaki, Japan, May 30 - June 3, 2022, 2022
Recommended citation: Cailing Cai, Xianrui Qin, Tsz Hon Yuen and Siu-Ming Yiu: Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting. In AsiaCCS 2022: 42-53. https://doi.org/10.1145/3488932.3517422
Published in Heliyon. Volume 8, Issue 6, June 2022., 2022
Recommended citation: Michael Co, Tsz Hon Yuen and Ho Hung Cheung: Using clinical history taking chatbot mobile app for clinical bedside teachings - A prospective case control study. In Heliyon. Volume 8, Issue 6, June 2022. https://www.sciencedirect.com/science/article/pii/S2405844022010398
Published in The 20th International Conference on Applied Cryptography and Network Security, (ACNS 2022) Rome, Italy, June 20-23, 2022, 2022
Recommended citation: Tsz Hon Yuen, Cong Zhang and Sherman S. M. Chow: Don’t Tamper with Dual System Encryption (Beyond Polynomial Related-Key Security of IBE). In ACNS 2022: 419-439. https://doi.org/10.1007/978-3-031-09234-3_21
Published in The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom 2022) Wuhan, China, October 28-30, 2022, 2022
Recommended citation: Cailing Cai, Tsz Hon Yuen and Siu-Ming Yiu: Hash Proof System with Auxiliary Inputs and Its Applications. To appear in IEEE TrustCom 2022.
Published in The 17th International Conference on Wireless Algorithms, Systems, and Applications, (WASA 2022) Dalian, China, October 28-30, 2022, 2022
Recommended citation: Mingli Wu and Tsz Hon Yuen: GCD-Filter: Private Set Intersection Without Encryption. To appear in WASA 2022.
Published in The 21st International Conference on Cryptology and Network Security, (CANS 2022) Abu Dhabi, UAE, November 13-16, 2022, 2022
Recommended citation: Kwan Yin Chan and Tsz Hon Yuen: Attribute-based Anonymous Credential: Optimization for Single-Use and Multi-Use. In CANS 2022: 89-121. https://doi.org/10.1007/978-3-031-20974-1_5
Published in The 27th Australasian Conference on Information Security and Privacy, (ACISP 2022) Wollongong, Australia, November 28-30, 2022, 2022
Recommended citation: Shimin Pan, Kwan Yin Chan, Handong Cui and Tsz Hon Yuen: Multi-signatures for ECDSA and its Applications in Blockchain. In ACISP 2022: 265-285. https://doi.org/10.1007/978-3-031-22301-3_14
Published in The 21st IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (Trustcom 2022) Wuhan, China, December 9-11, 2022, 2022
Recommended citation: Cailing Cai, Tsz Hon Yuen and Siu Ming Yiu: Hash Proof System With Auxiliary Inputs and Its Application. In IEEE Trustcom 2022, 52-59. https://ieeexplore.ieee.org/document/10063697
Published in Blockchain. Volume 1, March 2023, 2023
Recommended citation: Zi Zheng Fong Hu, Tsz Hon Yuen: A Critique on Decentralized Finance from a Social, Political, and Economic Perspective. Blockchain 2023(1): 0006. https://elspub.com/papers/j/1597124912186978304
Published in Future Generation Computer Systems. Volume 141, April 2023, Pages 448-461, 2023
Recommended citation: Cailing Cai, Shimin Pan, Tsz Hon Yuen, Siu-Ming Yiu: Practical fully leakage resilient signatures with auxiliary inputs. Future Generation Computer Systems. Volume 141, April 2023, Pages 448-461. https://www.sciencedirect.com/science/article/abs/pii/S0167739X2200396X?via%3Dihub
Published in 44th IEEE Symposium on Security and Privacy, San Francisco, USA. May 22-25, 2023., 2023
Recommended citation: Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen: BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. To appear in IEEE S&P 2023. https://eprint.iacr.org/2022/1735
Published in The Computer Journal. bxad057, 2023
Recommended citation: Handong Cui, Kwan Yin Chan, Tsz Hon Yuen, Xin Kang, Cheng-Kang Chu: Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA. In the Computer Journal. bxad057. https://academic.oup.com/comjnl/advance-article/doi/10.1093/comjnl/bxad057/7188842
Published in 21st International Conference on Applied Cryptography and Network Security (ACNS 2023). Kyoto, Japan. June 19-22, 2023, 2023
Recommended citation: Sherman S. M. Chow, Jack P. K. Ma and Tsz Hon Yuen: Scored Anonymous Credentials. In ACNS 2023: 484-515. https://link.springer.com/chapter/10.1007/978-3-031-33491-7_18
Published in 28th Australasian Conference on Information Security and Privacy, ACISP 2023. Brisbane, Australia, July 5–7, 2023., 2023
Recommended citation: Tsz Hon Yuen, Shimin Pan, Sheng Huang and Xiaoting Zhang: Practical Verifiable Random Function with RKA Security. In ACISP 2023: 503-522. https://link.springer.com/chapter/10.1007/978-3-031-33491-7_18
Published in The 32nd USENIX Security Symposium (USENIX 2023). Anaheim, US. August 9-11, 2023, 2023
Recommended citation: Mingli Wu and Tsz Hon Yuen: Efficient Unbalanced Private Set Intersection Cardinality and User-friendly Privacy-preserving Contact Tracing. In USENIX 2023. https://www.usenix.org/conference/usenixsecurity23/presentation/wu-mingli
Published in Information Security Practice and Experience - 18th International Conference, ISPEC 2023. Copenhagen, Denmark. August 24-25, 2023, 2023
Recommended citation: Kwan Yin Chan, Handong Cui, Tsz Hon Yuen: DIDO: Data Provenance from Restricted TLS 1.3 Websites. ISPEC 2023: 154-169 [https://doi.org/10.1145/3576915.3616595](https://doi.org/10.1007/978-981-99-7032-2\_10)
Published in The 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023. Copenhagen, Denmark. November 26-30, 2023, 2023
Recommended citation: Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang: Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 https://doi.org/10.1145/3576915.3616595
Published in IEEE Transactions on Dependable and Secure Computing. March 2024, 2024
Recommended citation: Yingjiu Li, Binanda Sengupta, Yangguang Tian, Jiaming Yuan, Tsz Hon Yuen: Message Control for Blockchain Rewriting. In IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/TDSC.2024.3372631. https://ieeexplore.ieee.org/document/10458322
Published in The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). Singapore. July 1-5, 2024, 2024
Recommended citation: Kwan Yin Chan, Liqun Chen, Yangguang Tian, and Tsz Hon Yuen: Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. To appear in AsiaCCS 2024. https://github.com/kychancf/CCTY24_cham_hash
Published in The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). Singapore. July 1-5, 2024, 2024
Recommended citation: Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu: zkMatrix: Batched Short Proof for Committed Matrix Multiplication. To appear in AsiaCCS 2024.
Published in 33rd USENIX Security Symposium. USENIX Security 2024, Philadelphia, PA, USA, August 14-16, 2024, 2024
Recommended citation: Mingli Wu, Tsz Hon Yuen: O-Ring and K-Star: Efficient Multi-party Private Set Intersection. To appear in USENIX Security 2024.
Published in IACR Communications in Cryptology. Volume 1, Number 3, October 2024, 2024
Recommended citation: Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu: Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Communications in Cryptology, vol. 1, no. 3, Oct 07, 2024, doi: 10.62056/ahsdkmp-3y https://cic.iacr.org//p/1/3/48
Published:
Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.
Published:
Blockchain provides an immutable, global transaction history in distributed system. All transactions can be seen by all of the nodes on the network. However, it may not be desirable in business use cases that require strong privacy. In public blockchain, several cryptographic techniques are used to provide anonymity of users and confidentiality of transaction amount (such as linkable ring signature in Monero, and zk-SNARK in ZCash). However, they are not efficient enough for systems with high throughput. Therefore, we propose and implement some new privacy-enhancing techniques which can be used in consortium blockchain.
Published:
Matrix multiplication is a common operation in applications like machine learning and data analytics. To demonstrate the correctness of such an operation in a privacy-preserving manner, we propose zkMatrix, a zero-knowledge proof for the multiplication of committed matrices. Among the succinct non-interactive zero-knowledge protocols that have an O(log n) transcript size and O(log n) verifier time, zkMatrix stands out as the first to achieve O(n^2) prover time and O(n^2) RAM usage for multiplying two n×n matrices. Significantly, zkMatrix distinguishes itself as the first zk-SNARK protocol specifically designed for matrix multiplication. By batching multiple proofs together, each additional matrix multiplication only necessitates O(n) group operations in prover time.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2018
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019
This course aims to help students to understand the technical and managerial challenges they will face as electronic commerce becomes a new locus of economics activities. Topics include Internet and WWW technology, information security technologies, public-key crypto-systems, public-key infrastructure, electronic payment systems, and electronic commerce activities in different sectors.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019
This course introduces the basic concepts of financial technologies, including money and payment, digital finance and alternative finance. Major technological trends, such as e-payment system, cryptocurrency, blockchain, data mining and artificial intelligence, are introduced. Students are expected to understand recent FinTech developments and its impact in the financial industries.
Graduate course, Department of Computer Science, The University of Hong Kong, 2019
Candidate will be required to carry out independent work on a major project that will culminate in the writing of a dissertation.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Graduate course, Department of Computer Science, The University of Hong Kong, 2020
The case study project is to provide an opportunity for the student to dive in depth into either a business case or a technology development in the e-commerce and Internet computing, and apply their body of knowledge learned in the programme to understand and critically analysis the particular case. This would involve substantive research into the “Subject”, collect appropriate data by suitable means, research into reports and publicly available information, and consolidate their findings and conclusion in a case study report.
Graduate course, Department of Computer Science, The University of Hong Kong, 2020
This project-based course aims to provide students with capstone experience to work on a real-world problem and carry out a substantial fintech project which requires integration of the knowledge they have learnt in the curriculum. Students will work in small groups under the guidance of their supervisor(s). A substantial written report is required.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2020
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Graduate course, Department of Statistics and Actuarial Science, The University of Hong Kong, 2020
This course is designed for students of the Master of Data Science Programme. Students enrolled in DASC7600 Data Science Project are expected to work in a small group on a provided or self-proposed project under the supervision of their supervisor.
Graduate course, Department of Computer Science, The University of Hong Kong, 2020
Candidate will be required to carry out independent work on a major project under the supervision of individual staff member. A written report is required.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2021
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022
Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.
Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022
This course aims to help students to identify key components behind the design of a distributed ledger (and blockchain) and evaluate different designs/solutions for implementing a distributed ledger. The student will understand the types of applications that best fit the model of distributed ledger; program applications on some popular platforms; understand the technologies behind different cryptocurrencies, their applications, and related issues (e.g. Regulations).
Postgraduate course, Department of Computer Science, The University of Hong Kong, 2023
Identify key components behind the design of blockchain and to understand the types of applications that best fit the model of blockchain. Understand why blockchain is considered “secure” and “immutable” and the design of Bitcoin and other cryptocurrencies. Understand the limitations, pros and cons of blockchains and cryptocurrencies, their downsides, and possible enhancements.
Postgraduate course, Department of Software Systems and Cybersecurity, Monash University, 2024
This unit introduces students to the key principles which underlie the analysis and design of information systems to support business and other organisational undertakings. It covers design and design thinking, requirements elicitation, consulting skills and conceptual and logical systems modelling.