joined the Department of Information Engineering at the Chinese
University of Hong Kong in November 2012,
and received the Early
Career Award 2013/14 by the Hong Kong Research Grant Council.
He is an LSCM Expert Review Panel member (Jan '15 to Dec '18).
Before CUHK, he was a
research fellow at Department of
Combinatorics and Optimization,
University of Waterloo, a position he
commenced after receiving his Ph.D. degree from the
Courant Institute of
Mathematical Sciences, New York University.
He interned at
NTT Research and Development (Tokyo),
Microsoft Research (Redmond) and
Fuji Xerox Palo Alto Laboratory,
and has made research visits to U. Maryland,
U. Calgary, U. Texas, HKU,
Queensland University of Technology.
He has published in
major conferences such as CCS, EUROCRYPT, ITCS, NDSS, and Usenix Security.
He serves on the program committees of 150+
on cryptography, security, privacy, network, cloud, fintech, access
IoT, PKI, and forensics,
AsiaCCS 2018, '17,
Financial Crypt. 2015,
ACM CCS 2014,
This year, he is serving as a program co-chair of
Workshop on Blockchain and Sharing Economy Applications (BlockSEA),
co-located with IEEE
International Conference on Data Mining (ICDM) 2018.
He has served as a program co-chair of
Security in Cloud Computing '15
and ISC '14
The full list of PC duties during '10-'18 can be found at here.
He serves on the editorial boards of
also as a lead guest-editor
Computer Science and Communications
Selected Funded Projects:
- Accountable Privacy in Online Communications, HKD 916K
(e.g., Scored Anonymous Credentials)
- Searchable Encryption, HKD 692K + HKD 700K
(e.g., Asymmetric Searchable Encryption, Multi-Writer Searchable Encryption)
- Reset-secure Identity-Based Identification Schemes, RM85K (Overseas
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in my research areas
(especially anonymous credentials and searchable
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in network coding
(co-mentored with Raymond Yeung)
- Research Assistants / Visiting Students
with strong interest(s)
in searchable encryption (or information retrieval),
anonymous credentials, privacy-enhancing technologies,
- Undergraduate student helpers for part-time security-related projects
(you are either strong in Mathematics, or hands-on
PhD students with strong interest(s) in my research
a funded Summer Workshop for HK PhD Fellowship.
So far, three participants got PhD offer in our group.)
(CUHK is ranked 18th in Computer Science and Information
QS world rankings 2015)
- I enjoy working with motivated students.
I co-authored with students and published in
ACNS, CT-RSA, ESORICS, EUROCRYPT, FC, ICDCS, Infocom, ITCS, PETS,
Usenix Security, WiSec, etc.
- Impress me with your papers in
reputable venues and your own research statement.
- If you are a CUHK (undergrad / master / PhD) student
and would like to explore cyber security with me,
send me an email.
Current PhD Students:
Yongjun Zhao, BEng(CUHK) // visited U. of Surrey, A.B.D.
threshold PSI, Cloud Crypto,
Universal Composability (e.g., OpenID),
(working on CCA Security, Privacy-Preserving System, Searchable
Jack P. K. Ma, BSc(CUHK)
(working on Anonymous Credentials, Secure Multi-party Computation)
Jiafan Wang, BSc(CSU)
(working on Secure Spectrum Auction, Searchable Encryption)
Harry W. H. Wong, BSc(CUHK)
(working on Lattice-Based Signatures)
Huangting Wu, BSc(CUHK)
(working on Pairing-Based Cryptography)
Current MPhil Student:
Yu Zheng (Final-year UG student at Northeastern University, China)
(Mar '18 - May '18)
Past Post-Doctoral Research Fellow:
Past Part-Time RA:
Hu (was a PhD student at Kyushu University)
Cong Zhang (previously RA at HKU, now PhD student at
Past Research Intern:
(Final-year UG student at Shanghai Jiaotong University)
(Oct '17 - Feb '18)
Past Summer Research Interns:
- Jack Ma (MIE)
- Wenjie Zhao (MIE)
- Jianhan Song (IE)
- Angela Xuan (MIE)
- Russell Lai (MATH+IERG,
Best Project Award winner)
- Luke Wang (IBBA+IERG)
Revocable-Storage Attribute-Based Encryption: Huangting Wu
- Permissions-Oriented Android Apps Store: King Ng, Edwin Sin
Privacy Preserving Machine Learning Classification:
Jack Ma, Raymond Tai (published in ESORICS 2017!)
- Lattice-Based Homomorphic Signatures: Harry Wong, Franklin Yu
- Searchable Encryption: Terry Ng
- Building a Mobile Spyware: Lok-Sun Chan, John Lui
- Privacy-Enhancing Electronic Toll-Pricing: Pak-Hei Lin, Patrick Yik
Leakage-Resilient Message-Locked Deduplication: Frank Hu, Luke Wang
- Lattice-based Cryptography: Russell Lai
- Lattice-based Cryptography: Leon Yam
MSc Alumni (with research project supervision):
- Zhenjie Song
- Yisong Wu
- Rachel Zhu
- Hua Tong
- Muren Zhang
- Teresa Dermawan (co-supervised with
C. C. Loy)
- Weiyi Mao
- Yingkai Tang
- Rongbin Li
- Huirui Han
Recent Invited Talks:
Upcoming Conferences to Attend:
Recent Conferences Attended:
9th IEEE Intl' Conf. on Cloud
Computing Technology and Science (Dec. '17, Hong Kong, also a
Cryptography and Security Frontier Forum (Aug. '17, State Key Laboratory
of Cryptology, Beijing, China,
3rd Cyber Security Workshop (June '17, Wuhan, China)
3rd Intl. Symposium on Mobile Security (Dec '16, Seoul, South Korea)
IoT Privacy, Trust, and Security (May '16,
Next-generation Cryptography (Sept. '15, IMI, Kyushu
University; and ISIT, Japan)
Security Leading Edge Forum" (July '15, Guangzhou University, China)
Intl. Cryptology and Information Security Conference
(June '14, Putrajaya, Malaysia)
- ('17 :)
- ('16 :)
- ('15 :)
- ('14 :)
- ('13 :)
- ('12 :)
CSCI5590 Advances in Blockchain (Spring 2019)
co-teach with Eric Lo of CSE
(Fall 2018, Fall 2017, Fall 2015, Spring 2014, Spring 2013)
Secure Software Engineering
(Springer 2018, Spring 2017)
IERG 4130 or ESTR 4306
Intro. to Cyber Security
(Fall 2017, Fall 2016, Spring 2016, Fall 2014, Fall 2013)
Consider you are confessing your love, how can you sign a love letter such that
only your crush knows it is from you, yet no one else will be convinced?
Cryptography can help achieving these seemingly conflicting goals.
It is not just about ensuring you are browsing a legitimate
shopping website and no one else can see your credit card number.
It is an inter-disciplinary subject with applications ranging
from secure routing to anonymous reputation system.
You will understand the
magic under the hood of currently deployed systems.
Special topics include privacy-enhancing cryptography and
Security & Privacy in Cyber Systems
This course discusses the design and realization of security and privacy
services in practical large-scale systems.
Additional cyber security
services/applications such as
- online identity and authentication management;
- mobile payment systems with Smartcard / near field communications
best privacy practices for online social networks and mobile
- safe browsing; geolocation privacy;
cloud computing security and privacy: trustworthy cloud
secure outsourcing of data and computation;
- data provenance;
- virtual machine security.
will also be covered.
secure and anonymous routing systems,
- digital rights management
- ACM Team Coach
- Director of Work Study Programme
- Member of U/G Admission Committee
- Member of Work Study Committee
- Member of U/G Summer Research Internship Committee (15-16)
- Faculty representative member of Task Force on Cyber Security
- Department representative member of Task Force on Learning Commons
People from different background can do different research in
Also check this and
of papers which will be the potential projects for students
in my crypto class.
- Complexity theory gives the foundation of cryptography.
- Coding theory and information theory both play important roles.
- Physicists can do quantum cryptography.
- Various branches of mathematics found applications in cryptography,
- algebraic geometry,
group/number theory, etc.
Treating these structures as black-box primitives one can design
which achieve various sets of
- e.g., balancing accountability and privacy,
without trusting any third party. (Who can you trust in the
- Leveraging these properties one may design a larger
secure e-commerce/financial applications such as e-cash or
- One may also utilize cryptographic schemes to build
protocols for securing distributed systems,
cloud environments, the Internet, etc.
computing paradigm has different constraints.
Systems that work under one
specific setting may require extra
system design or engineering
effort for another scenario.
- You may wear a black hat to hack into
a system by finding its weakest link.
- A white hat, on the other hand, needs to apply
prudent practice when building a system
and make sure its
deployment and implementation are vulnerability-free.
- Connections with other fields may go beyond your imagination, e.g.,
game theory, machine learning, biometrics, etc.
So, you must have found something interesting :)
Topics in Cryptography
Conferences/Journals in Cryptography (for ref. only)
- Cantonese (Native), English (Fluent), Mandarin (Fluent), Japanese
C++, Java, ...