Dr Yangguang Tian

Dr Yangguang Tian


Lecturer in Cyber Security

About

Research

Research interests

Publications

Yangguang Tian, Nan Li, Yingjiu Li, Pawel Szalachowski, Jianying Zhou (2020) Policy-based chameleon hash for blockchain rewriting with black-box accountability
Policy-based chameleon hash is a useful primitive for blockchain rewriting. It allows a party to create a transaction associated with an access policy, while another party who possesses enough rewriting privileges satisfying the access policy can rewrite the transaction. However, it lacks accountability. The chameleon trapdoor holder may abuse his/her rewriting privilege and maliciously rewrite the hashed object in the transaction without being identified. In this paper, we introduce policy-based chameleon hash with black-box accountability (PCHBA). Black-box accountability allows an attribute authority to link modified transactions to responsible transaction modifiers in case of dispute, in which any public user identifies those transaction modifiers from interacting with an access device/blackbox. We first present a generic framework of PCHBA. Then, we present a practical instantiation, showing its practicality through implementation and evaluation analysis.
Yangguang Tian, Yingjiu Li, Yi Mu, Guomin Yang (2021) Unlinkable and Revocable Secret Handshake
In this paper, we introduce a new construction for unlinkable secret handshake that allows a group of users to perform handshakes anonymously. We define formal security models for the proposed construction and prove that it can achieve session key security, anonymity and affiliation hiding. In particular, the proposed construction ensures that (i) anonymity against protocol participants (including group authority) is achieved since a hierarchical identity-based signature is used in generating group user’s pseudonym-credential pairs and (ii) revocation is achieved using a secret sharing-based revocation mechanism.
Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H Deng, Zheng Yang (2021) Policy-Based Editing-Enabled Signatures: Authenticating Fine-Grained and Restricted Data Modification
Data owners often encrypt their bulk data and upload it to cloud in order to save storage while protecting privacy of their data at the same time. A data owner can allow a third-party entity to decrypt and access her data. However, if that entity wants to modify the data and publish the same in an authenticated way, she has to ask the owner for a signature on the modified data. This incurs substantial communication overhead if the data is modified often. In this work, we introduce the notion of , where the data owner specifies a policy for her data such that an entity satisfying this policy can decrypt the data. Moreover, the entity is permitted to produce a valid signature for the modified data (on behalf of the owner)  interacting with the owner every time the data is modified. On the other hand, a policy-based editing-enabled signature (PB-EES) scheme allows the data owner to choose  set of modification operations applicable to her data and still restricts a (possibly untrusted) entity to authenticate the data modified using operations from that set . We provide two PB-EES constructions, a generic construction and a concrete instantiation. We formalize the security model for PB-EESs and analyze the security of our constructions. Finally, we evaluate the performance of the concrete PB-EES instantiation.
policy-based editing-enabled signaturesonlywithoutanyonly
Yangguang Tian, Yingjiu Li, Robert H Deng, Binanda Sengupta, Guomin Yang (2021) Lattice-based remote user authentication from reusable fuzzy signature
In this paper, we introduce a new construction of reusable fuzzy signature based remote user authentication that is secure against quantum computers. We investigate the reusability of fuzzy signature, and we prove that the fuzzy signature schemes provide biometrics reusability (aka. reusable fuzzy signature). We define formal security models for the proposed construction, and we prove that it achieves user authenticity and user privacy. The proposed construction ensures: 1) a user’s biometrics can be securely reused in remote user authentication; 2) a third party having access to the communication channel between a user and the authentication server cannot identify the user.
Zheng Yang, Chenglu Jin, Yangguang Tian, Junyu Lai, Jianying Zhou (2020) Lis: Lightweight signature schemes for continuous message authentication in cyber-physical systems