joined the Department of Information Engineering at the Chinese
University of Hong Kong in November 2012.
He was a
research fellow at Department of
Combinatorics and Optimization,
University of Waterloo, a position he
commenced after receiving his Ph.D. degree from the
Courant Institute of
Mathematical Sciences, New York University.
He interned at
NTT Research and Development (Tokyo),
Microsoft Research (Redmond) and
Fuji Xerox Palo Alto Laboratory,
and has made research visits to U. Maryland,
U. Calgary, U. Texas, HKU,
Queensland University of Technology.
These visits resulted in US patent and also in publications
at major conferences such as CCS, EUROCRYPT, and ITCS.
He serves on the program committees of 120+
on cryptography, security, privacy, network, cloud, fintech, access
IoT, PKI, and forensics,
Financial Crypt. 2015,
ACM CCS 2014,
He has served as a program co-chair of
Security in Cloud Computing
He will be a program co-chair of CANS 2017 to
held in Hong Kong.
He serves on the editorial boards of
IEEE Trans. Information Forensics and Security (TIFS),
Intl. J. Information Security (IJIS)
J. of Information Security and Applications (JISA),
and as a lead guest-editor
of Pervasive and Mobile Computing (Special Issue on
Security and Privacy in Mobile Clouds).
He has received the Early
Career Award 2013/14 by the Hong Kong Research Grant Council.
Full list of PC duties during '10-'17 can be found at here.
Computer Science and Communications
Selected Funded Projects:
- Accountable Privacy in Online Communications, HKD 916K
(e.g., Scored Anonymous Credentials)
- Searchable Encryption, HKD 692K
(e.g., Asymmetric Searchable Encryption, Multi-Writer Searchable Encryption)
- Reset-secure Identity-Based Identification Schemes, RM85K (Overseas
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in my research areas
(especially anonymous credentials and searchable
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in network coding
(co-mentored with Raymond Yeung)
- Research Assistants / Visiting Students
with strong interest(s)
in searchable encryption (or information retrieval),
anonymous credentials, privacy-enhancing technologies,
- Undergraduate student helpers for part-time security-related projects
(you are either strong in Mathematics, or hands-on
PhD students with strong interest(s) in my research
a funded Summer Workshop for HK PhD Fellowship.
One participant got PhD offer in Crypto group.)
(CUHK is ranked 18th in Computer Science and Information
QS world rankings 2015)
- I enjoy working with motivated students.
I co-authored with students and published in
ACNS, AsiaCCS, CT-RSA, ESORICS, EUROCRYPT, FC, ICDCS, Infocom, ITCS, PETS, IEEE
Trans. on Computers,
- Impress me with your papers in
reputable venues and your own research statement.
- If you are a CUHK (undergrad / master / PhD) student
and would like to explore cyber security with me,
send me an email.
Current PhD Students:
Tao Zhang, BEng(CUHK) // interned at I2R, A.B.D.
Structure-Preserving Signatures and Encryption,
TPM 2.0 Signature, etc.)
Yongjun Zhao, BEng(CUHK), A.B.D.
threshold PSI, Cloud Crypto,
Universal Composability (e.g., OpenID),
(working on CCA Security, Privacy-Preserving System, Searchable
Jack P. K. Ma, BSc(CUHK)
(working on Anonymous Credentials)
Jiafan Wang, BSc(CSU)
(working on secure spectrum auction)
Harry W. H. Wong, BSc(CUHK)
(working on Lattice-Based Signatures)
Current Research Assistant:
W. F. Lai, MPhil, BEng+BSc(CUHK)
Current MPhil Student:
- Permissions-Oriented Android Apps Store: King Ng, Edwin Sin
- e-Voting: Edmond Lau
- Blockchain for e-Voting: Oscar Law, William Wong
- Message-Locked Encryption: Yuchuan Huang
- Revocable-Storage Attribute-Based Encryption: Huangting Wu
- Order-Preserving Encryption: Xiaolei Yuan
Current Part-Time RA:
Past Post-Doctoral Research Fellow:
Hu (PhD student at Kyushu University)
Cong Zhang (previously RA at HKU, now PhD student at
Past Research Interns:
- Jack Ma (MIE)
- Wenjie Zhao (MIE)
- Jianhan Song (IE)
- Angela Xuan (MIE)
- Russell Lai (MATH+IERG,
Best Project Award winner)
- Luke Wang (IBBA+IERG)
Privacy Preserving Machine Learning Classification:
Jack Ma, Raymond Tai
- Lattice-Based Homomorphic Signatures: Harry Wong, Franklin Yu
- Searchable Encryption: Terry Ng
- Building a Mobile Spyware: Lok-Sun Chan, John Lui
- Privacy-Enhancing Electronic Toll-Pricing: Pak-Hei Lin, Patrick Yik
Leakage-Resilient Message-Locked Deduplication: Frank Hu, Luke Wang
- Lattice-based Cryptography: Russell Lai
- Lattice-based Cryptography: Leon Yam
Alumni (with research project supervision):
- Zhenjie Song
- Yisong Wu
- Rachel Zhu
- Hua Tong, MSc(CUHK)
- Muren Zhang, MSc(CUHK)
- Teresa Dermawan, MSc(CUHK) (co-supervised with
C. C. Loy)
- Weiyi Mao, MSc(CUHK)
- Yingkai Tang, MSc(CUHK)
- Rongbin Li, MSc(CUHK)
- Huirui Han, MSc(CUHK)
Recent Invited Talks:
Upcoming Conferences to Attend:
IoT Privacy, Trust, and Security (May '16,
Next-generation Cryptography (Sept. '15, IMI, Kyushu
University; and ISIT, Japan)
Security Leading Edge Forum" (July '15, Guangzhou University, China)
Intl. Cryptology and Information Security Conference
(June '14, Putrajaya, Malaysia)
Recent Conferences Attended:
- ('16 :)
- ('15 :)
- ('14 :)
- ('13 :)
- ('12 :)
Secure Software Engineering
IERG 4130 or ESTR 4306
Intro. to Cyber Security
(Fall 2016, Spring 2016, Fall 2014, Fall 2013)
(Fall 2015, Spring 2014, Spring 2013)
Consider you are confessing your love, how can you sign a love letter such that
only your crush knows it is from you, yet no one else will be convinced?
Cryptography can help achieving these seemingly conflicting goals.
It is not just about ensuring you are browsing a legitimate
shopping website and no one else can see your credit card number.
It is an inter-disciplinary subject with applications ranging
from secure routing to anonymous reputation system.
You will understand the
magic under the hood of currently deployed systems.
Special topics include privacy-enhancing cryptography and
Security & Privacy in Cyber Systems
This course discusses the design and realization of security and privacy
services in practical large-scale systems.
Additional cyber security
services/applications such as
- online identity and authentication management;
- mobile payment systems with Smartcard / near field communications
best privacy practices for online social networks and mobile
- safe browsing; geolocation privacy;
cloud computing security and privacy: trustworthy cloud
secure outsourcing of data and computation;
- data provenance;
- virtual machine security.
will also be covered.
secure and anonymous routing systems,
- digital rights management
- ACM Team
- Member of U/G Admission Committee
- Member of Work Study Committee
- Member of U/G Summer Research Internship Committee (15-16)
- Faculty representative member of Task Force on Cyber Security
- Department representative member of Task Force on Learning Commons
People from different background can do different research in
Also check this and
of papers which will be the potential projects for students
in my crypto class.
- Complexity theory gives the foundation of cryptography.
- Coding theory and information theory both play important roles.
- Physicists can do quantum cryptography.
- Various branches of mathematics found applications in cryptography,
- algebraic geometry,
group/number theory, etc.
Treating these structures as black-box primitives one can design
which achieve various sets of
- e.g., balancing accountability and privacy,
without trusting any third party. (Who can you trust in the
- Leveraging these properties one may design a larger
secure e-commerce/financial applications such as e-cash or
- One may also utilize cryptographic schemes to build
protocols for securing distributed systems,
cloud environments, the Internet, etc.
computing paradigm has different constraints.
Systems that work under one
specific setting may require extra
system design or engineering
effort for another scenario.
- You may wear a black hat to hack into
a system by finding its weakest link.
- A white hat, on the other hand, needs to apply
prudent practice when building a system
and make sure its
deployment and implementation are vulnerability-free.
- Connections with other fields may go beyond your imagination, e.g.,
game theory, machine learning, biometrics, etc.
So, you must have found something interesting :)
Topics in Cryptography
- Cantonese (Native), English (Fluent), Mandarin (Fluent), Japanese
C++, Java, ...