Dr. Kaitai Liang received a Ph.D. degree in computer science (applied cryptography direction) at the Department of Computer Science, City University of Hong Kong, under the supervision of Duncan S. Wong (currently CEO of CryptoBLK) in October 2014. His main research interests are applied cryptography, privacy and security in information technology; in particular, encryption, signature, blockchain, cloud computing security, big data security, Internet of things, post-quantum crypto, privacy enhancing technology and lightweight secure system.
He is currently a lecturer (assistant professor) at SCCS (which is one of the 14 Academic Centres of Excellence in Cyber Security Research recognised by the UK Government Communications Headquarters in partnership with the Engineering and Physical Sciences Research Council) and Department of Computer Science, University of Surrey, U.K. Before joining Surrey, he was a post-doctoral researcher and a lecturer, at Department of Computer Science, Aalto University, and School of Computing, Mathematics and Digital technology, Manchester Metropolitan University, respectively.
- Although I currently do not have related funding to support overseas (non-HOME/EU) PhD applicants, but we welcome all the applicants supported by government funding, e.g., China Scholarship Council (CSC) scholarships, to apply for PhD (note we have experience on CSC applicants).
- Welcome Mr. Chris Ridden to join us as a PhD student.
- IAS Fellowship (This scheme (£5000) supports visits from international scholars to the University, deadline 12nd Oct 2018), and Workshop Grant Competition (The Institute of Advanced Studies (IAS) is once again running a competition for grants worth up to £3,500 each to support the organisation of small-scale research meetings at the University of Surrey, deadline 12nd Oct 2018). Please feel free to contact me if you are interested in these applications.
- I will have 3 PhD studentships (3-3.5 years), only supporting HOME/EU (passport holder) students. If you are interested in working in identity protection, blockchain applications and post-quantum crypto, please feel free to contact me.
Project A: Security Assessment Framework for Blockchain. This project aims to develop methodology and design mechanisms that can be applied to distributed multi-jurisdictional Blockchain and DLT systems to assess the security of these systems. The assessment should be based on well-designed security models and standards. PhD candidate will study and investigate blockchain state of art, its core mechanisms/frameworks, and the employed secure protocols (e.g., signature, zero knowledge proof, consensus) so as to design assessment criteria/models. Machine learning algorithms and formal methods will be investigated and leveraged as well. The output of the project will enable a "grading" of each blockchain to be created and shared as part of a cyber insurance policy. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with adequate knowledge of programming (Python, C++, Java), basic knowledge of applied cryptography/machine learning/formal method, good communication skill, teamwork awareness, and be willing to work with industries.
Project B: Minimal Identity Disclosure and Disclosure Tracing in Blockchain. Upgrading centralized identity database to decentralized network may bring convenience to identity management, sharing and tracing. However, this yields concerns on the leakage and misuse of personal identity, since the database is deployed in open network. This project aims to leverage blockchain technique to monitor identity management and its disclosure, so that the “touch” of personal identity can be noticed by user and furthermore, the leakage/misuse of identity can be traced. Besides, building upon Zero Knowledge proofs and the multi-faceted and usage of identities, this project will create solutions that will only disclose the minimum facets of an identity based upon the need to know of the requestor and authentication, and further evolve this to encompass situational awareness of the identity, for example hours of work, multiple roles and location of identity provision. Trusted hardware (e.g., TPM) may be considered to employ in the solutions to enhance the “trust” of identity usage. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., zero-knowledge proof, signature, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
Project C: Secure Information Sharing in Blockchain. This project aims to develop secure algorithms and initial proof of concept that will enable information shared to be fully under the control of the consenting individual in blockchain applications. Based upon GDPR principles enable a data subject to control the consent to usage of their data and enable new means of dynamically authenticating and granting usage rights to this data. Cryptographic solutions that enables data "packets" to be wrapped and access only granted when dynamic authentication/delegation is received. "Trusted Data Sharing Module" will be built on top of trusted hardware (e.g., TPM) techniques. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., encryption, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
The start date of these PhDs will be in January 2019, Home/EU students (passport holders) ONLY, supported by full scholarships (covering Home/EU fee and stipend of at least £14,777 pa).
- PhD Placements and Supervisor Mobility Grants China-UK. https://www.britishcouncil.cn/en/programmes/education/higher/opportunities/phd
- Welcome Mr. Stephen HOLMES to join us as a PhD student (under department studentship, and will be partially supported by ObjectTech).
Google citation: https://scholar.google.com.hk/citations?user=_qHKRH4AAAAJ&hl=en
Areas of specialism
Applied Cryptography ;
Privacy Enhancing Technology ;
Consensus algorithms ;
smart contract ;
Affiliations and memberships
post-quantum crypto, blockchain, trusted computing, applied crypto, IoT, searchable encryption, consensus, lattice-based crypto, TPM, smart contract
Monash University, University of Wollongong, Deakin University,
Hong Kong Polytechnic University, University of New Brunswick
National University of Singapore, Singapore Huawei, I2R,
Beijing University of Posts and Telecommunications, Central China Normal University, Beihang University, Guangzhou University, East China Normal University, Shanghai Jiao Tong University, Wuhan University
Osaka University, The University of Texas at San Antonio
- 2017/2018, COMM046 Multimedia Security and Digital Forensic, University of Surrey, UK
- 2016/2017, 6G5Z1102_1617_9Z6 Algorithms and Data Structures, Manchester Metropolitan University, UK
- 2016/2017, 6G4Z1101_1617_9Z6 Programming, Manchester Metropolitan University, UK
- 2015, T-79.4502 Cryptography and Data Security, master course, Aalto University, Finland
- 2012/13, CS1302 Introduction to Computer Programming, CityU
- 2011/12, CS3391 Advanced Programming, CityU
- 2011/12, CS3342 Software Design, CityU
Postgraduate research supervision
Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Comp. Syst. 78: 753-762 (2018)
Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017)
Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Information Forensics and Security 11(8): 1661-1673 (2016)
Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)
Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015)
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience 27(8): 2004-2027 (2015)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Generation Comp. Syst. 52: 95-108 (2015)
Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Security and Communication Networks 8(16): 2836-2849 (2015)
Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015)
Kaitai Liang, Willy Susilo, Joseph K. Liu:Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Information Forensics and Security 10(8): 1578-1589 (2015)
Kaitai Liang, Willy Susilo:Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 10(9): 1981-1992 (2015)
Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166
Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. JoWUA 5(4): 3-28 (2014)
Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Information Forensics and Security 9(10): 1667-1680 (2014)
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing. IACR Cryptology ePrint Archive 2014: 473 (2014)