joined the Department of Information Engineering at the Chinese
University of Hong Kong in November 2012,
and received the Early
Career Award 2013/14 by the Hong Kong Research Grant Council.
He is an LSCM Expert Review Panel member (Jan '15 to Dec '20),
Before CUHK, he was a
research fellow at Department of
Combinatorics and Optimization,
University of Waterloo, a position he
commenced after receiving his Ph.D. degree from the
Courant Institute of
Mathematical Sciences, New York University.
He interned at
NTT Research and Development (Tokyo),
Microsoft Research (Redmond) and
Fuji Xerox Palo Alto Laboratory,
and has made research visits to
U. Calgary, U. Texas, HKU,
Queensland University of Technology.
He has published in major conferences such as
AsiaCrypt, CCS, EuroCrypt, ITCS, NDSS, and Usenix Security.
He serves on the program committees of 180+
on cryptography, security, privacy, network, cloud, fintech, access
IoT, PKI, and forensics,
Financial Crypt. 2013,
2019 (Distinguished TPC in 2018),
ICDCS 2015 -
He has served as a program co-chair of
Security in Cloud Computing '15
and ISC '14
The full list of PC duties during '10-'19 can be found at here
He serves on the editorial boards of
also as a lead guest-editor
and a founding member of
IEEE SMC's blockchain technical committee (since 2018).
Computer Science and Communications
Selected Funded Projects:
- Accountable Privacy in Online Communications, HKD 916K
(e.g., Scored Anonymous Credentials)
- Searchable Encryption, HKD 692K + HKD 700K
(e.g., Asymmetric Searchable Encryption, Multi-Writer Searchable Encryption)
- Reset-secure Identity-Based Identification Schemes, RM85K (Overseas
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in my research areas
(especially anonymous credentials and searchable
- Post-Doctoral Fellow / Research Associate
for Applicants with a strong record in network coding
(co-mentored with Raymond Yeung)
- Research Assistants / Visiting Students
with strong interest(s)
in searchable encryption (or information retrieval),
anonymous credentials, privacy-enhancing technologies,
- Undergraduate student helpers for part-time security-related projects
(you are either strong in Mathematics, or hands-on
PhD students with strong interest(s) in my research
a funded Summer Workshop for HK PhD Fellowship.
So far, three participants got PhD offer in our group.)
(CUHK is ranked 18th in Computer Science and Information
QS world rankings 2015)
- I enjoy working with motivated students.
I co-authored with students and published in
ACNS, AsiaCrypt, CT-RSA, ESORICS, EuroCrypt, FC, ICDCS, Infocom, ITCS, PETS, Usenix Security, WiSec, etc.
- Impress me with your papers in
reputable venues and your own research statement.
- If you are a CUHK (undergrad / master / PhD) student
and would like to explore cyber security with me,
send me an email.
Current Post-Doctoral Research Fellow:
Yongjun Zhao, PhD, BEng(CUHK)
(working on blockchain,
threshold PSI, Cloud Crypto,
Universal Composability (e.g., OpenID),
(working on CCA Security, Privacy-Preserving System, Searchable
Jack P. K. Ma, BSc(CUHK)
(working on Anonymous Credentials, Secure Multi-party Computation)
Jiafan Wang, BSc(CSU)
(working on Secure Spectrum Auction, Searchable Encryption)
Harry W. H. Wong, BSc(CUHK)
(working on Lattice-Based Signatures)
Huangting Wu, BSc(CUHK)
(working on Pairing-Based Cryptography)
Minxin Du, MS(WHU), BS-HongYi(WHU)
Yu Zheng, BEng(NEU)
Lucien K. L. Ng, BSc-Elite(CUHK)
(working on Machine Learning and Blockchain)
Donald P. H. Wong, BEng(CUHK)
(working on Machine Learning)
Past Post-Doctoral Research Fellow:
Tao Zhang, PhD, BEng(CUHK)
currently with Tencent)
Yongjun Zhao, PhD, BEng(CUHK)
(visited U. Surrey, now Postdoc at CUHK)
Russell W. F. Lai, MPhil, BEng+BSc(CUHK)
(also RA@CUHK: Aug '16 - Jul '17, now with FAU, Germany)
Raymond K. H. Tai, MPhil, BSc(CUHK)
Past Part-Time RA:
Hu (was a PhD student at Kyushu University)
Cong Zhang (previously RA at HKU, now PhD student at
Past Research Intern:
Yu Zheng (Final-year UG student at Northeastern University, China)
(Mar '18 - May '18, now PhD student)
(Final-year UG student at Shanghai Jiaotong University)
(Oct '17 - Feb '18, result: ACISP 2019 Best Student Paper Award)
Current Summer Research Interns:
- Kelvin Chan (MIE)
- Anna Yung (MIE-Elite)
Past Summer Research Interns:
FYP Supervisions: (Selected projects)
- Jack Ma (MIE)
- Wenjie Zhao (MIE)
- Jianhan Song (IE)
- Angela Xuan (MIE)
- Russell Lai (MATH+IERG,
Best Project Award winner)
- Luke Wang (IBBA+IERG)
Improving Latency of Secure Neural Network Inference:
Nash Chow, Peter Wong
Deep Neural Network in Secure Linux Container with Trusted Processor:
Gary Chow, Donald Wong
Secure Machine Learning: Lucien K. L. Ng (Bronze
Award of the ASM Technology Award 2018!)
TLS 0-RTT Key Exchange: Erwin Chan, Lynus Wong
Revocable-Storage Attribute-Based Encryption: Huangting Wu
- Permissions-Oriented Android Apps Store: King Ng, Edwin Sin
Privacy Preserving Machine Learning Classification:
Jack Ma, Raymond Tai (published in ESORICS 2017!)
- Lattice-Based Homomorphic Signatures: Harry Wong, Franklin Yu
- Searchable Encryption: Terry Ng
- Building a Mobile Spyware: Lok-Sun Chan, John Lui
- Privacy-Enhancing Electronic Toll-Pricing: Pak-Hei Lin, Patrick Yik
Leakage-Resilient Message-Locked Deduplication: Frank Hu, Luke Wang
- Lattice-based Cryptography: Russell Lai
- Lattice-based Cryptography: Leon Yam
MSc Alumni (with research project supervision):
Some Recent Papers:
- Qian Chen
- Luohong Yang
- Yixin Yue
- Zhenjie Song
- Yisong Wu
- Rachel Zhu
- Hua Tong
- Muren Zhang
- Teresa Dermawan (co-supervised with
C. C. Loy)
- Weiyi Mao
- Yingkai Tang
- Rongbin Li
- Huirui Han
Upcoming Invited Talks:
Recent Invited Talks:
Recent Conferences Attended:
7th Intl. Workshop on Security in Cloud Computing (SCC) (Jul '19, Auckland, New Zealand, also a panelist)
22nd Workshop on Elliptic Curve Cryptography (Nov '18, Osaka, Japan)
1st Intl' Conference on Frontiers in Cyber Security (Nov '18, Chengdu, China)
14th Intl' Conference on
Information Security Practice and
(Sep '18, Tokyo, Japan)
12th Intl' Conference on Network and System Security
(Aug '18, Hong Kong, short talk + panelist)
IEEE Intl' Workshop on Blockchain for the Internet of Things,
(July '18, Halifax,
9th IEEE Intl' Conf. on Cloud
Computing Technology and Science (Dec '17, Hong Kong, also a
Cryptography and Security Frontier Forum (Aug '17, State Key Laboratory
of Cryptology, Beijing, China)
3rd Cyber Security Workshop (June '17, Wuhan, China)
3rd Intl. Symposium on Mobile Security (Dec '16, Seoul, South Korea)
IoT Privacy, Trust, and Security (May '16,
Next-generation Cryptography (Sep '15, IMI, Kyushu
University; and ISIT, Japan)
Security Leading Edge Forum" (July '15, Guangzhou University, China)
Intl. Cryptology and Information Security Conference
(June '14, Putrajaya, Malaysia)
- ('19 :)
AsiaCCS (SCC), ...
- ('18 :)
- ('17 :)
- ('16 :)
- ('15 :)
- ('14 :)
- ('13 :)
- ('12 :)
Advanced topics in Blockchain (Spring
2019) co-teach with Eric Lo of CSE
Cyber Security (2nd Trimester, 2018-19)
(Fall 2018, Fall 2017, Fall 2015, Spring 2014, Spring 2013)
Consider you are confessing your love, how can you sign a love letter such that
only your crush knows it is from you, yet no one else will be convinced?
Cryptography can help achieving these seemingly conflicting goals.
It is not just about ensuring you are browsing a legitimate
shopping website and no one else can see your credit card number.
It is an inter-disciplinary subject with applications ranging
from secure routing to anonymous reputation system.
You will understand the
magic under the hood of currently deployed systems.
Special topics include privacy-enhancing cryptography and
Secure Software Engineering
(Springer 2018, Spring 2017)
IERG 4130 or ESTR 4306
Intro. to Cyber Security
(Fall 2017, Fall 2016, Spring 2016, Fall 2014, Fall 2013)
Security & Privacy in Cyber Systems
This course discusses the design and realization of security and privacy
services in practical large-scale systems.
Additional cyber security
services/applications such as
- online identity and authentication management;
- mobile payment systems with Smartcard / near field communications
best privacy practices for online social networks and mobile
- safe browsing; geolocation privacy;
cloud computing security and privacy: trustworthy cloud
secure outsourcing of data and computation;
- data provenance;
- virtual machine security.
will also be covered.
secure and anonymous routing systems,
- digital rights management
Some Other Duties:
People from different background can do different research in
Also check this and
of papers which will be the potential projects for students
in my crypto class.
- Complexity theory gives the foundation of cryptography.
- Coding theory and information theory both play important roles.
- Physicists can do quantum cryptography.
- Various branches of mathematics found applications in cryptography,
- algebraic geometry,
group/number theory, etc.
Treating these structures as black-box primitives one can design
which achieve various sets of
- e.g., balancing accountability and privacy,
without trusting any third party. (Who can you trust in the
- Leveraging these properties one may design a larger
secure e-commerce/financial applications such as e-cash or
- One may also utilize cryptographic schemes to build
protocols for securing distributed systems,
cloud environments, the Internet, etc.
computing paradigm has different constraints.
Systems that work under one
specific setting may require extra
system design or engineering
effort for another scenario.
- You may wear a black hat to hack into
a system by finding its weakest link.
- A white hat, on the other hand, needs to apply
prudent practice when building a system
and make sure its
deployment and implementation are vulnerability-free.
- Connections with other fields may go beyond your imagination, e.g.,
game theory, machine learning, biometrics, etc.
So, you must have found something interesting :)
Topics in Cryptography
Conferences/Journals in Cryptography (for ref. only)
- Cantonese (Native), English (Fluent), Mandarin (Fluent), Japanese
C++, Java, ...