Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

publications

Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.

Published in Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, 2014

Recommended citation: Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu: Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. ESORICS (1) 2014: 130-147 https://doi.org/10.1007/978-3-319-11203-9_8

Continuous Non-malleable Key Derivation and Its Application to Related-Key Security.

Published in Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings, 2015

Recommended citation: Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen: Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Public Key Cryptography 2015: 557-578 https://doi.org/10.1007/978-3-662-46447-2_25

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.

Published in Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I, 2016

Recommended citation: Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen: An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. ESORICS (1) 2016: 154-172 https://doi.org/10.1007/978-3-319-45744-4_8

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.

Published in Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II, 2017

Recommended citation: Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen: RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 https://doi.org/10.1007/978-3-319-66399-9_25

Securely Perturb Big Data by Using Inner Product Encryption.

Published in The 2019 IEEE Conference on Dependable and Secure Computing (DSC 2019), Hangzhou, China, 18-20 November 2019, 2019

Recommended citation: Mingli Wu and Tsz Hon Yuen: Securely Perturb Big Data by Using Inner Product Encryption. IEEE DSC 2019, pp. 1-8.

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.

Published in The 24-th International Conference on Financial Cryptography and Data Security (FC 2020). Kota Kinabalu, Sabah, Malaysia. February 10–14, 2020, 2020

Recommended citation: Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu: RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. In FC 2020, 464-483. https://doi.org/10.1007/978-3-030-51280-4_25

Address-based Signature.

Published in The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Guangzhou, China, December 29, 2020 - January 1, 2021, 2020

Recommended citation: Handong Cui and Tsz Hon Yuen: Address-based Signature. In IEEE TrustCom 2020: 884-891. https://doi.org/10.1109/TrustCom50675.2020.00119

Hash Proof System with Auxilary Inputs and Its Applications.

Published in The 21th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (IEEE TrustCom 2022) Wuhan, China, October 28-30, 2022, 2022

Recommended citation: Cailing Cai, Tsz Hon Yuen and Siu-Ming Yiu: Hash Proof System with Auxiliary Inputs and Its Applications. To appear in IEEE TrustCom 2022.

GCD-Filter: Private Set Intersection Without Encryption

Published in The 17th International Conference on Wireless Algorithms, Systems, and Applications, (WASA 2022) Dalian, China, October 28-30, 2022, 2022

Recommended citation: Mingli Wu and Tsz Hon Yuen: GCD-Filter: Private Set Intersection Without Encryption. To appear in WASA 2022.

BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.

Published in 44th IEEE Symposium on Security and Privacy, San Francisco, USA. May 22-25, 2023., 2023

Recommended citation: Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, Tsz Hon Yuen: BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts. To appear in IEEE S&P 2023. https://eprint.iacr.org/2022/1735

Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.

Published in The 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023. Copenhagen, Denmark. November 26-30, 2023, 2023

Recommended citation: Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang: Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 https://doi.org/10.1145/3576915.3616595

zkMatrix: Batched Short Proof for Committed Matrix Multiplication.

Published in The 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024). Singapore. July 1-5, 2024, 2024

Recommended citation: Mingshu Cong, Tsz Hon Yuen, Siu-Ming Yiu: zkMatrix: Batched Short Proof for Committed Matrix Multiplication. To appear in AsiaCCS 2024.

talks

Blockchain: How crypto meets the industry?

Published:

Blockchain, the core component of Bitcoin, has been extremely popular among the finance, supply chain and many other industries in the last few years. Many governments and companies are experimenting blockchain with proof of concepts. The growing interest in blockchain drives a lot of new security research areas, including security model and analysis of blockchain, consensus algorithms built from cryptographic primitives, privacy enhancing technologies in blockchain (e.g. linkable ring signatures, zk-SNARKs), etc. There are still some gap between the research community and the blockchain applications. In this talk, we will introduce some challenges we faced, such as implementation difficulties, research problems and application level challenges. We present our views and some solutions on these issues.

Privacy-Enhancing Consortium Blockchain

Published:

Blockchain provides an immutable, global transaction history in distributed system. All transactions can be seen by all of the nodes on the network. However, it may not be desirable in business use cases that require strong privacy. In public blockchain, several cryptographic techniques are used to provide anonymity of users and confidentiality of transaction amount (such as linkable ring signature in Monero, and zk-SNARK in ZCash). However, they are not efficient enough for systems with high throughput. Therefore, we propose and implement some new privacy-enhancing techniques which can be used in consortium blockchain.

zkMatrix: Batched Short Proof for Committed Matrix Multiplication

Published:

Matrix multiplication is a common operation in applications like machine learning and data analytics. To demonstrate the correctness of such an operation in a privacy-preserving manner, we propose zkMatrix, a zero-knowledge proof for the multiplication of committed matrices. Among the succinct non-interactive zero-knowledge protocols that have an O(log n) transcript size and O(log n) verifier time, zkMatrix stands out as the first to achieve O(n^2) prover time and O(n^2) RAM usage for multiplying two n×n matrices. Significantly, zkMatrix distinguishes itself as the first zk-SNARK protocol specifically designed for matrix multiplication. By batching multiple proofs together, each additional matrix multiplication only necessitates O(n) group operations in prover time.

teaching

COMP4801. Final Year Project 2018-19

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2018

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

COMP3320. Electronic Commerce Technology. [2018 - 2022]

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019

This course aims to help students to understand the technical and managerial challenges they will face as electronic commerce becomes a new locus of economics activities. Topics include Internet and WWW technology, information security technologies, public-key crypto-systems, public-key infrastructure, electronic payment systems, and electronic commerce activities in different sectors.

FITE 1010. Introduction to Financial Technologies. [2019 - 2023]

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019

This course introduces the basic concepts of financial technologies, including money and payment, digital finance and alternative finance. Major technological trends, such as e-payment system, cryptocurrency, blockchain, data mining and artificial intelligence, are introduced. Students are expected to understand recent FinTech developments and its impact in the financial industries.

COMP4801. Final Year Project 2019-20

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2019

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

ECOM 7001. MSc(ECom&IComp) Case Study Project [2020 - 2022]

Graduate course, Department of Computer Science, The University of Hong Kong, 2020

The case study project is to provide an opportunity for the student to dive in depth into either a business case or a technology development in the e-commerce and Internet computing, and apply their body of knowledge learned in the programme to understand and critically analysis the particular case. This would involve substantive research into the “Subject”, collect appropriate data by suitable means, research into reports and publicly available information, and consolidate their findings and conclusion in a case study report.

FITE 7001. MSc(FTDA) Project [2022]

Graduate course, Department of Computer Science, The University of Hong Kong, 2020

This project-based course aims to provide students with capstone experience to work on a real-world problem and carry out a substantial fintech project which requires integration of the knowledge they have learnt in the curriculum. Students will work in small groups under the guidance of their supervisor(s). A substantial written report is required.

COMP4801. Final Year Project 2020-21

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2020

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

DASC7600. MDASC Data science project. [2020 - 2023]

Graduate course, Department of Statistics and Actuarial Science, The University of Hong Kong, 2020

This course is designed for students of the Master of Data Science Programme. Students enrolled in DASC7600 Data Science Project are expected to work in a small group on a provided or self-proposed project under the supervision of their supervisor.

COMP7705. MSc(CompSc) Project [2020 - 2022]

Graduate course, Department of Computer Science, The University of Hong Kong, 2020

Candidate will be required to carry out independent work on a major project under the supervision of individual staff member. A written report is required.

COMP4801. Final Year Project 2021-22

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2021

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

COMP4801/FITE4801. Final Year Project 2022-23

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

COMP4805. CS 2nd Major Project 2022

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022

Student individuals or groups, during the final year of their studies, undertake full end-to-end development of a substantial project, taking it from initial concept through to final delivery. Topics range from applied software development to assignments on basic research. In case of a team project, significant contribution is required from each member and students are assessed individually, such that each student is given a separate project title. Strict standards of quality will be enforced throughout the project development.

FITE2010. Distributed Ledger & Blockchain. [2022]

Undergraduate course, Department of Computer Science, The University of Hong Kong, 2022

This course aims to help students to identify key components behind the design of a distributed ledger (and blockchain) and evaluate different designs/solutions for implementing a distributed ledger. The student will understand the types of applications that best fit the model of distributed ledger; program applications on some popular platforms; understand the technologies behind different cryptocurrencies, their applications, and related issues (e.g. Regulations).

FITE7409 Blockchain and cryptocurrency. [2022-2023]

Postgraduate course, Department of Computer Science, The University of Hong Kong, 2023

Identify key components behind the design of blockchain and to understand the types of applications that best fit the model of blockchain. Understand why blockchain is considered “secure” and “immutable” and the design of Bitcoin and other cryptocurrencies. Understand the limitations, pros and cons of blockchains and cryptocurrencies, their downsides, and possible enhancements.

FIT9130 - Systems analysis and design. [2024]

Postgraduate course, Department of Software Systems and Cybersecurity, Monash University, 2024

This unit introduces students to the key principles which underlie the analysis and design of information systems to support business and other organisational undertakings. It covers design and design thinking, requirements elicitation, consulting skills and conceptual and logical systems modelling.