Kaitai is currently a lecturer (assistant professor) at SCCS (which is one of the 14 Academic Centres of Excellence in Cyber Security Research recognised by the UK Government Communications Headquarters in partnership with the Engineering and Physical Sciences Research Council) and Department of Computer Science, University of Surrey, U.K. His main research interests are applied cryptography, privacy and security in information technology; in particular, encryption, signature, blockchain security, cloud computing security, Internet of things, post-quantum crypto, privacy enhancing technology and lightweight secure system.
He has published over 60 research works with at least 1,2k citations, related to applied cryptography and information security in high tier (Q1 and top 3 of google scholar computer security and cryptography ranking) security international journals and conferences (e.g., IEEE TIFS, ESORICS). He also has prepared (proposal writing) and involved into five European projects (e.g., H2020, UK, Academic of Finland) as PI or CI. He has experience in collaborating with (projects, funding and research) international industries and companies, and in teaching undergraduate, master levels computer science courses and PhD supervision.
He received the Ph.D. degree in computer science (applied cryptography direction) at the Department of Computer Science, City University of Hong Kong, under the supervision of Duncan S. Wong (currently CEO of CryptoBLK) in October 2014. Before joining Surrey, he was a post-doctoral researcher and a lecturer, at Department of Computer Science, Aalto University, and School of Computing, Mathematics and Digital technology, Manchester Metropolitan University, respectively.
- HP Security Lab in Bristol has an open position for a 6-month paid internship in the area of infrastructure security, beginning this summer. If you are a Master or PhD student who is interested in this position, please contact Dr. Philippa Bayley via email@example.com.
- We will have the ABCP annual conference, SURREY, 10-12 July, 2019.
- We have open posts https://www.jobs.ac.uk/job/BSI654/teaching-fellow-a-b-senior-teaching-fellow-lecturer-senior-lecturer-reader-professor-in-computer-science. Please feel free to apply.
- Our SURREY post-quantum blockchain test-bed with privacy-preserving features will be available in this Summer, and its white paper will be published simultaneously. We will also contribute to ISO/TC307/WG2
- International exchange grant, for researchers with PhD degree (e.g., Post-doc and above) - (between UK and multiple countries), https://royalsociety.org/grants-schemes-awards/grants/international-exchanges/.
- Call for papers - an SI of IEEE TII is online now here, please feel free to submit your research works.
- We welcome Mr. Long Meng to join us as a PhD student.
- We welcome all the applicants supported by government funding, e.g., China Scholarship Council (CSC) scholarships, to apply for PhD (note we have experience on CSC applicants).
- Welcome Mr. Chris Ridden to join us as a PhD student.
- IAS Fellowship (This scheme (£5000) supports visits from international scholars to the University, deadline 12nd Oct 2018), and Workshop Grant Competition (The Institute of Advanced Studies (IAS) is once again running a competition for grants worth up to £3,500 each to support the organisation of small-scale research meetings at the University of Surrey, deadline 12nd Oct 2018). Please feel free to contact me if you are interested in these applications.
- I will have 3 PhD studentships (3-3.5 years), only supporting HOME/EU students. If you are interested in working in identity protection, blockchain applications and post-quantum crypto, please feel free to contact me. For overseas students, you need to top up the gap of the tuition fee (between overseas tuition fee and the HOME/EU one). Please email me for further information.
Project A: Security Assessment Framework for Blockchain. This project aims to develop methodology and design mechanisms that can be applied to distributed multi-jurisdictional Blockchain and DLT systems to assess the security of these systems. The assessment should be based on well-designed security models and standards. PhD candidate will study and investigate blockchain state of art, its core mechanisms/frameworks, and the employed secure protocols (e.g., signature, zero knowledge proof, consensus) so as to design assessment criteria/models. Machine learning algorithms and formal methods will be investigated and leveraged as well. The output of the project will enable a "grading" of each blockchain to be created and shared as part of a cyber insurance policy. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with adequate knowledge of programming (Python, C++, Java), basic knowledge of applied cryptography/machine learning/formal method, good communication skill, teamwork awareness, and be willing to work with industries.
Project B: Minimal Identity Disclosure and Disclosure Tracing in Blockchain. Upgrading centralized identity database to decentralized network may bring convenience to identity management, sharing and tracing. However, this yields concerns on the leakage and misuse of personal identity, since the database is deployed in open network. This project aims to leverage blockchain technique to monitor identity management and its disclosure, so that the “touch” of personal identity can be noticed by user and furthermore, the leakage/misuse of identity can be traced. Besides, building upon Zero Knowledge proofs and the multi-faceted and usage of identities, this project will create solutions that will only disclose the minimum facets of an identity based upon the need to know of the requestor and authentication, and further evolve this to encompass situational awareness of the identity, for example hours of work, multiple roles and location of identity provision. Trusted hardware (e.g., TPM) may be considered to employ in the solutions to enhance the “trust” of identity usage. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., zero-knowledge proof, signature, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
Project C: Secure Information Sharing in Blockchain. This project aims to develop secure algorithms and initial proof of concept that will enable information shared to be fully under the control of the consenting individual in blockchain applications. Based upon GDPR principles enable a data subject to control the consent to usage of their data and enable new means of dynamically authenticating and granting usage rights to this data. Cryptographic solutions that enables data "packets" to be wrapped and access only granted when dynamic authentication/delegation is received. "Trusted Data Sharing Module" will be built on top of trusted hardware (e.g., TPM) techniques. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., encryption, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
The start date of these PhDs will be in 2019, supported by full scholarships (covering Home/EU fee and stipend of at least £14,777 pa).
- PhD Placements and Supervisor Mobility Grants China-UK. https://www.britishcouncil.cn/en/programmes/education/higher/opportunities/phd
- Welcome Mr. Stephen HOLMES to join us as a PhD student (under department studentship, and will be partially supported by ObjectTech).
Google citation: https://scholar.google.com.hk/citations?user=_qHKRH4AAAAJ&hl=en
"As one of the researchers in the field of applied crypto and cybersecurity, you may consider to submit your publications to Top publications in Computer Security and Cryptography".
Areas of specialism
Applied Cryptography ;
Privacy Enhancing Technology ;
Consensus algorithms ;
smart contract ;
searchable encryption ;
University roles and responsibilities
- Applicant Day Coordinator
- Academic Integrity Officers
Affiliations and memberships
post-quantum (lattice-based) crypto - making your system hold against quantum computer's attacks, aiming for future security high ground
blockchain - securing your data log via immutability and traceability
trusted computing (TPM) - injecting hardware root of trust into your applications
privacy-enhancing technologies, applied crypto general - leveraging secure tools to safeguard user privacy and data security
searchable encryption - masking your query over encrypted data to provide query and content secrecy
consensus and smart contract - blockchain inner building blocks
and password-based encryption, IoT security, lightweight secure system,
attacks on (lattice-based) secure systems.
Newcastle University, Monash University, University of Wollongong, Deakin University, University of Melbourne
Hong Kong Polytechnic University, City University of Hong Kong, University of New Brunswick, University of Kentucky
National University of Singapore, Singapore Huawei, I2R, NUS-Singtel Cyber Security Research and Development Laboratory, Singapore Management University
Peking University, Shanghai Jiaotong University, Beijing University of Posts and Telecommunications, Central China Normal University, Beihang University, Guangzhou University, East China Normal University, Shanghai Jiao Tong University, Wuhan University
Osaka University, JAIST, The University of Texas at San Antonio, New Jersey Institute of Technology
ObjectTech, Onboard Security, AtCipher, CryptoBLK, ASTRI
and all the projects' partners (e.g., IBM, INFINEON)
- 2018/2019, COM3026 Distributed Systems (undergraduate), University of Surrey, UK.
- 2017/2018, COMM046 Multimedia Security and Digital Forensic (postgraduate), University of Surrey, UK
- 2016/2017, 6G5Z1102_1617_9Z6 Algorithms and Data Structures (undergraduate), Manchester Metropolitan University, UK
- 2016/2017, 6G4Z1101_1617_9Z6 Programming (undergraduate), Manchester Metropolitan University, UK
- 2015, T-79.4502 Cryptography and Data Security (postgraduate), Aalto University, Finland
- 2012/13, CS1302 Introduction to Computer Programming (undergraduate), CityU, Hong Kong
- 2011/12, CS3391 Advanced Programming (undergraduate), CityU, Hong Kong
- 2011/12, CS3342 Software Design (undergraduate), CityU, Hong Kong
Postgraduate research supervision
PhD students (my role):
Chris Ridden with Prof. Liqun Chen (primary supervision)
Stephen Holmes with Prof. Liqun Chen (primary supervision)
Wei Yin (Visiting PhD) with Prof. Liqun Chen (primary supervision)
Yi Zhao (Visiting PhD) with Prof. Liqun Chen (co-supervision)
Long Meng with Prof. Liqun Chen (co-supervision)
Kent Leeding with Prof. Steve Schneider (co-supervision)
Daniel Gardham with Dr. Mark Manulis (co-supervision)
Please refer to my DBLP for publications.
IEEE Transactions on Information Forensics and Security, Q1, Top 3 in Google Scholar Top publications - Computer Security & Cryptography;
IEEE Transactions on Industrial Informatics, Q1
Computers & Security, Q1, Top 8 in Google Scholar Top publications - Computer Security & Cryptography;
(ACM on Asia Conference on Computer and Communications Security, Top 13 in Google Scholar Top publications - Computer Security & Cryptography; )
Security and Communication Networks, Top 20 in Google Scholar Top publications - Computer Security & Cryptography;
Future Generation Computer Systems, Q1
IEEE Transactions on Computers, Q1
IEEE NETWORK, Q1
Theoretical Computer Science, Q1
Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Comp. Syst. 78: 753-762 (2018)
Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017)
Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Information Forensics and Security 11(8): 1661-1673 (2016)
Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)
Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015)
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience 27(8): 2004-2027 (2015)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Generation Comp. Syst. 52: 95-108 (2015)
Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Security and Communication Networks 8(16): 2836-2849 (2015)
Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015)
Kaitai Liang, Willy Susilo, Joseph K. Liu:Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Information Forensics and Security 10(8): 1578-1589 (2015)
Kaitai Liang, Willy Susilo:Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 10(9): 1981-1992 (2015)
Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166
Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. JoWUA 5(4): 3-28 (2014)
Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Information Forensics and Security 9(10): 1667-1680 (2014)
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing. IACR Cryptology ePrint Archive 2014: 473 (2014)