Placeholder image for staff profiles

Dr Kaitai Liang


Lecturer in Secure Systems
PhD. FHEA.
+44 (0)1483 689630
12 BB 02
Please email me

Biography

Areas of specialism

Applied Cryptography ; Privacy Enhancing Technology ; Blockchain; Trusted Computing; Lattice-based Crypto; TPM; Consensus algorithms ; smart contract ; searchable encryption

University roles and responsibilities

  • Applicant Day Coordinator
  • Academic Integrity Officers

Affiliations and memberships

IEEE member
IEEE member
FHEA
Fellow of The Higher Education Academy
ISO
ISO/IEC JTC 1/SC 27/WG 2 "Cryptography and security mechanisms"

Research

Research interests

Research projects

Research collaborations

My teaching

Supervision

Postgraduate research supervision

My publications

Publications

Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Comp. Syst. 78: 753-762 (2018)

Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017)

Cong Zuo, Kaitai Liang, Zoe L. Jiang, Jun Shao, Jun-bin Fang:Cost-effective privacy-preserving vehicular urban sensing system. Personal and Ubiquitous Computing 21(5): 893-901 (2017)

Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292

Guanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou:A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes. GPC 2017: 222-236

Ye Li, Kaitai Liang, Chunhua Su, Wei Wu:DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626

Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56

Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang:Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016)

Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016)

Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang:Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing 28: 113-121 (2016)

Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang:Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016)

Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Information Forensics and Security 11(8): 1661-1673 (2016)

Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)

Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119

Kaitai Liang, Atsuko Miyaji, Chunhua Su:Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388

Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang:A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. ACISP (1) 2016: 525-540

Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94

Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605

Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Gonçalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos:A data hiding approach for sensitive smartphone data. UbiComp 2016: 557-468

Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:While Mobile Encounters with Clouds. NSS 2016: 3-18

Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:A New Transitive Signature Scheme. NSS 2016: 156-167

Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu:One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243

Emiliano De Cristofaro, Kaitai Liang, Yuruo Zhang:Privacy-Preserving Genetic Relatedness Test. CoRR abs/1611.03006 (2016)

Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptology ePrint Archive 2016: 1140 (2016)

Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015)

Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience 27(8): 2004-2027 (2015)

Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Generation Comp. Syst. 52: 95-108 (2015)

Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Computing 19(2): 58-63 (2015)

Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:Secure sharing and searching for real-time video data in mobile cloud. IEEE Network 29(2): 46-50 (2015)

Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Security and Communication Networks 8(16): 2836-2849 (2015)

Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015)

Kaitai Liang, Willy Susilo, Joseph K. Liu:Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Information Forensics and Security 10(8): 1578-1589 (2015)

Kaitai Liang, Willy Susilo:Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 10(9): 1981-1992 (2015)

Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166

Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477

Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. JoWUA 5(4): 3-28 (2014)

Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014)

Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Information Forensics and Security 9(10): 1667-1680 (2014)

Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272

Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461

Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205

Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing. IACR Cryptology ePrint Archive 2014: 473 (2014)

Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559

Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146

Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptology ePrint Archive 2013: 115 (2013)

Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptology ePrint Archive 2013: 236 (2013)

Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246