
Dr Kaitai Liang
Academic and research departments
Surrey Centre for Cyber Security, Department of Computer Science, Faculty of Engineering and Physical Sciences.Biography
Kaitai is currently a lecturer (assistant professor) at SCCS (which is one of the 14 Academic Centres of Excellence in Cyber Security Research recognised by the UK Government Communications Headquarters in partnership with the Engineering and Physical Sciences Research Council) and Department of Computer Science, University of Surrey, U.K. His main research interests are applied cryptography, privacy and security in information technology; in particular, encryption, signature, blockchain, cloud computing security, big data security, Internet of things, post-quantum crypto, privacy enhancing technology and lightweight secure system.
He has published over 60 research works with at least 1,200 citations, related to applied cryptography in high tier security international journals and conferences (e.g., IEEE TIFS, ESORICS). He also has prepared (proposal writing) and involved into some European projects (e.g., H2020, UK, Academic of Finland) as PI or CI. He has experience in collaborating with (projects, funding and research) international industries and companies, and in teaching undergraduate, master levels computer science courses and PhD supervision.
He received the Ph.D. degree in computer science (applied cryptography direction) at the Department of Computer Science, City University of Hong Kong, under the supervision of Duncan S. Wong (currently CEO of CryptoBLK) in October 2014. Before joining Surrey, he was a post-doctoral researcher and a lecturer, at Department of Computer Science, Aalto University, and School of Computing, Mathematics and Digital technology, Manchester Metropolitan University, respectively.
[News]
- International exchange grant, for researchers with PhD degree (e.g., Post-doc and above) - (between UK and multiple countries), https://royalsociety.org/grants-schemes-awards/grants/international-exchanges/.
- Call for papers - an SI of IEEE TII is online now here, please feel free to submit your research works.
- We welcome Mr. Long Meng to join us as a PhD student.
- We welcome all the applicants supported by government funding, e.g., China Scholarship Council (CSC) scholarships, to apply for PhD (note we have experience on CSC applicants).
- Welcome Mr. Chris Ridden to join us as a PhD student.
- IAS Fellowship (This scheme (£5000) supports visits from international scholars to the University, deadline 12nd Oct 2018), and Workshop Grant Competition (The Institute of Advanced Studies (IAS) is once again running a competition for grants worth up to £3,500 each to support the organisation of small-scale research meetings at the University of Surrey, deadline 12nd Oct 2018). Please feel free to contact me if you are interested in these applications.
- I will have 3 PhD studentships (3-3.5 years), only supporting HOME/EU students. If you are interested in working in identity protection, blockchain applications and post-quantum crypto, please feel free to contact me. For overseas students, you need to top up the gap of the tuition fee (between overseas tuition fee and the HOME/EU one). Please email me for further information.
Project A: Security Assessment Framework for Blockchain. This project aims to develop methodology and design mechanisms that can be applied to distributed multi-jurisdictional Blockchain and DLT systems to assess the security of these systems. The assessment should be based on well-designed security models and standards. PhD candidate will study and investigate blockchain state of art, its core mechanisms/frameworks, and the employed secure protocols (e.g., signature, zero knowledge proof, consensus) so as to design assessment criteria/models. Machine learning algorithms and formal methods will be investigated and leveraged as well. The output of the project will enable a "grading" of each blockchain to be created and shared as part of a cyber insurance policy. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with adequate knowledge of programming (Python, C++, Java), basic knowledge of applied cryptography/machine learning/formal method, good communication skill, teamwork awareness, and be willing to work with industries.
Project B: Minimal Identity Disclosure and Disclosure Tracing in Blockchain. Upgrading centralized identity database to decentralized network may bring convenience to identity management, sharing and tracing. However, this yields concerns on the leakage and misuse of personal identity, since the database is deployed in open network. This project aims to leverage blockchain technique to monitor identity management and its disclosure, so that the “touch” of personal identity can be noticed by user and furthermore, the leakage/misuse of identity can be traced. Besides, building upon Zero Knowledge proofs and the multi-faceted and usage of identities, this project will create solutions that will only disclose the minimum facets of an identity based upon the need to know of the requestor and authentication, and further evolve this to encompass situational awareness of the identity, for example hours of work, multiple roles and location of identity provision. Trusted hardware (e.g., TPM) may be considered to employ in the solutions to enhance the “trust” of identity usage. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., zero-knowledge proof, signature, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
Project C: Secure Information Sharing in Blockchain. This project aims to develop secure algorithms and initial proof of concept that will enable information shared to be fully under the control of the consenting individual in blockchain applications. Based upon GDPR principles enable a data subject to control the consent to usage of their data and enable new means of dynamically authenticating and granting usage rights to this data. Cryptographic solutions that enables data "packets" to be wrapped and access only granted when dynamic authentication/delegation is received. "Trusted Data Sharing Module" will be built on top of trusted hardware (e.g., TPM) techniques. The PhD candidate (holding MSc. degree of Math, Computer Science, Engineering) should be equipped with basic knowledge of programming (Python, C++, Java), adequate knowledge of applied cryptography (e.g., encryption, multiparty computation, lattice-based crypto), good communication skill, teamwork awareness, and be willing to work with industries.
The start date of these PhDs will be in 2019, supported by full scholarships (covering Home/EU fee and stipend of at least £14,777 pa).
- PhD Placements and Supervisor Mobility Grants China-UK. https://www.britishcouncil.cn/en/programmes/education/higher/opportunities/phd
- Welcome Mr. Stephen HOLMES to join us as a PhD student (under department studentship, and will be partially supported by ObjectTech).
DBLP: https://dblp.org/pers/hd/l/Liang:Kaitai
Google citation: https://scholar.google.com.hk/citations?user=_qHKRH4AAAAJ&hl=en
ORCID: https://orcid.org/0000-0003-0262-7678
"As one of the researchers in the field of applied crypto and cybersecurity, you may consider to submit your publications to Top publications in Computer Security and Cryptography".
Areas of specialism
Applied Cryptography ;
Privacy Enhancing Technology ;
Blockchain;
Trusted Computing;
Lattice-based Crypto;
TPM;
Consensus algorithms ;
smart contract ;
searchable encryption
University roles and responsibilities
- Applicant Day Coordinator
- Academic Integrity Officers
Affiliations and memberships
In the media
Research
Research interests
post-quantum crypto, blockchain, trusted computing, applied crypto, IoT, searchable encryption, consensus, lattice-based crypto, TPM, smart contract
Research projects
Research collaborations
Newcastle University, Monash University, University of Wollongong, Deakin University,
Hong Kong Polytechnic University, University of New Brunswick, University of Kentucky
National University of Singapore, Singapore Huawei, I2R, NUS-Singtel Cyber Security Research and Development Laboratory, Singapore Management University
Beijing University of Posts and Telecommunications, Central China Normal University, Beihang University, Guangzhou University, East China Normal University, Shanghai Jiao Tong University, Wuhan University
Osaka University, The University of Texas at San Antonio
My teaching
- 2018/2019, COM3026 Distributed Systems (undergraduate), University of Surrey, UK.
- 2017/2018, COMM046 Multimedia Security and Digital Forensic (postgraduate), University of Surrey, UK
- 2016/2017, 6G5Z1102_1617_9Z6 Algorithms and Data Structures (undergraduate), Manchester Metropolitan University, UK
- 2016/2017, 6G4Z1101_1617_9Z6 Programming (undergraduate), Manchester Metropolitan University, UK
- 2015, T-79.4502 Cryptography and Data Security (postgraduate), Aalto University, Finland
- 2012/13, CS1302 Introduction to Computer Programming (undergraduate), CityU, Hong Kong
- 2011/12, CS3391 Advanced Programming (undergraduate), CityU, Hong Kong
- 2011/12, CS3342 Software Design (undergraduate), CityU, Hong Kong
Supervision
Postgraduate research supervision
PhD students (my role):
Chris Ridden with Prof. Liqun Chen (primary supervision)
Stephen Holmes with Prof. Liqun Chen (primary supervision)
Wei Yin (Visiting PhD) with Prof. Liqun Chen (primary supervision)
Yi Zhao (Visiting PhD) with Prof. Liqun Chen (co-supervision)
Long Meng with Prof. Liqun Chen (co-supervision)
Kent Leeding with Prof. Steve Schneider (co-supervision)
Daniel Gardham with Dr. Mark Manulis (co-supervision)
My publications
Highlights
Please refer to my DBLP for publications.
Publications
Peng Zhang, Zehong Chen, Joseph K. Liu, Kaitai Liang, Hongwei Liu:An efficient access control scheme with outsourcing capability and attribute update for fog computing. Future Generation Comp. Syst. 78: 753-762 (2018)
Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen:Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017)
Cong Zuo, Kaitai Liang, Zoe L. Jiang, Jun Shao, Jun-bin Fang:Cost-effective privacy-preserving vehicular urban sensing system. Personal and Ubiquitous Computing 21(5): 893-901 (2017)
Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. CLOSER 2017: 281-292
Guanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou:A Modified Segmentation Approach for Overlapping Elliptical Objects with Various Sizes. GPC 2017: 222-236
Ye Li, Kaitai Liang, Chunhua Su, Wei Wu:DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity. GPC 2017: 611-626
Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56
Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang:Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016)
Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016)
Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang:Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing 28: 113-121 (2016)
Joseph K. Liu, Kaitai Liang, Willy Susilo, Jianghua Liu, Yang Xiang:Two-Factor Data Security Protection Mechanism for Cloud Storage System. IEEE Trans. Computers 65(6): 1992-2004 (2016)
Shulan Wang, Kaitai Liang, Joseph K. Liu, Jianyong Chen, Jianping Yu, Weixin Xie:Attribute-Based Data Sharing Scheme Revisited in Cloud Computing. IEEE Trans. Information Forensics and Security 11(8): 1661-1673 (2016)
Kaitai Liang, Xinyi Huang, Fuchun Guo, Joseph K. Liu:Privacy-Preserving and Regular Language Search Over Encrypted Cloud Data. IEEE Trans. Information Forensics and Security 11(10): 2365-2376 (2016)
Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:Edit Distance Based Encryption and Its Application. ACISP (2) 2016: 103-119
Kaitai Liang, Atsuko Miyaji, Chunhua Su:Secure and Traceable Framework for Data Circulation. ACISP (1) 2016: 376-388
Peng Zhang, Zehong Chen, Kaitai Liang, Shulan Wang, Ting Wang:A Cloud-Based Access Control Scheme with User Revocation and Attribute Update. ACISP (1) 2016: 525-540
Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu:Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data. AsiaCCS 2016: 83-94
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Kaitai Liang:Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control. ESORICS (2) 2016: 588-605
Chu Luo, Angelos Fylakis, Juha Partala, Simon Klakegg, Jorge Gonçalves, Kaitai Liang, Tapio Seppänen, Vassilis Kostakos:A data hiding approach for sensitive smartphone data. UbiComp 2016: 557-468
Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:While Mobile Encounters with Clouds. NSS 2016: 3-18
Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo:A New Transitive Signature Scheme. NSS 2016: 156-167
Yangguang Tian, Guomin Yang, Yi Mu, Kaitai Liang, Yong Yu:One-Round Attribute-Based Key Exchange in the Multi-party Setting. ProvSec 2016: 227-243
Emiliano De Cristofaro, Kaitai Liang, Yuruo Zhang:Privacy-Preserving Genetic Relatedness Test. CoRR abs/1611.03006 (2016)
Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan S. Wong:Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups. IACR Cryptology ePrint Archive 2016: 1140 (2016)
Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong:Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption. Comput. J. 58(10): 2778-2792 (2015)
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurrency and Computation: Practice and Experience 27(8): 2004-2027 (2015)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Generation Comp. Syst. 52: 95-108 (2015)
Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong:Privacy Concerns for Photo Sharing in Online Social Networks. IEEE Internet Computing 19(2): 58-63 (2015)
Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:Secure sharing and searching for real-time video data in mobile cloud. IEEE Network 29(2): 46-50 (2015)
Anjia Yang, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia:A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction. Security and Communication Networks 8(16): 2836-2849 (2015)
Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou:Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. IEEE Trans. Computers 64(4): 971-983 (2015)
Kaitai Liang, Willy Susilo, Joseph K. Liu:Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. IEEE Trans. Information Forensics and Security 10(8): 1578-1589 (2015)
Kaitai Liang, Willy Susilo:Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 10(9): 1981-1992 (2015)
Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166
Shangqi Lai, Joseph K. Liu, Kim-Kwang Raymond Choo, Kaitai Liang:Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN. ICICS 2015: 467-477
Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. JoWUA 5(4): 3-28 (2014)
Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou:Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 539: 87-105 (2014)
Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Information Forensics and Security 9(10): 1667-1680 (2014)
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing. ESORICS (1) 2014: 257-272
Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461
Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205
Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo:An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing. IACR Cryptology ePrint Archive 2014: 473 (2014)
Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. ISPEC 2013: 132-146
Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. IACR Cryptology ePrint Archive 2013: 115 (2013)
Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptology ePrint Archive 2013: 236 (2013)
Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang:A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. ICISC 2012: 231-246