About
202
Publications
28,132
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,167
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (202)
Fion Liu Yu Yan Yu Sun- [...]
Zhenyu Guan
Smart grid is gradually replacing traditional grid with two-way communication and improved management. Besides the efficiency and reliability it brings, the smart grid is inevitably fraught with rampant physical and cyber-attack. Although several physical unclonable function (PUF)-based schemes have been proposed, they are unsuited to the end-edge-...
Classical one-way function is a fundamental part of cryptography. Its one-wayness is threatened by the emerging quantum computers. Quantum one-way function (QOWF) was proposed to solve this dilemma. It is computable but almost irreversible in quantum polynomial time. However, there is not a purely full quantum one-way function which takes quantum s...
It usually takes a lot of time and resources to train a high-accurate Machine Learning model, so it is believed that the trainer owns the Intellectual Property (IP) of the model. With the help of various computing accelerators, a Machine Learning model can run on FPGAs, and model providers render services by selling FPGAs with models embedded. Unau...
As a typical application of Internet of Things (IoT), home automation systems, namely, smart homes, provide a more convenient and intelligent life experience through event recognition, automation control, and remote device access. However, smart home systems have also given rise to new complications for security issues. As an event-driven IoT syste...
Statistical analysis on genomic data can explore the relationship between gene sequence and phenotype. Particularly, counting the genomic mutation samples and associating with related phenotypes for statistical analysis can annotate the variation sites and help to diagnose genovariation. Expansion of the size of variation sample data helps to incre...
With the continuous development of edge computing and IIoT technology, there are growing types of IIoT devices, and the number of such devices is continuously climbing. It is indispensable to authenticate devices in the IIoT environment. In this paper, we propose two blockchain-based authentication for IIoT devices with PUF. The first one relies on...
The rapid development of global wireless networks has promoted the innovation of 5G network application scenarios and the improvement of infrastructure. The deployment of 5G network in high-speed railway network system has important practical application prospects. Data security and user experience are significant factors to consider for 5G high-sp...
The core issue of cyberspace detecting and mapping is to accurately identify and dynamically track devices. However, with the development of anonymization technology, devices can have multiple IP addresses and MAC addresses, and it is difficult to map multiple virtual attributes to the same physical device by existing detecting and mapping technolo...
In cryptography, obfuscation is one of the strongest forms of encryption. Point functions have been widely discussed in classical obfuscation so that obfuscation of point functions becomes an important branch of obfuscation theory. For quantum circumstance, a series of positive results in quantum point obfuscation have been proposed and indicate th...
With the continuous advancement of edge intelligence, edge servers undertake more and more intelligent computing tasks. Nowadays, there are a large number of IoT devices in the network in idle state. For instance, the mining process for consensus of miners in blockchain such as Bitcoin causes a waste of computing resources and energy. A natural que...
In the era of big data, next-generation sequencing produces a large amount of genomic data. With these genetic sequence data, research in biology fields will be further advanced. However, the growth of data scale often leads to privacy issues. Even if the data is not open, it is still possible for an attacker to steal private information by a membe...
Blockchain is a decentralized ledger system that enables transactional consensus among untrusted nodes. Due to the independence between blockchains, it is tough to complete asset exchange tasks between diverse chains. Facing this problem, multiple cross-chain exchange schemes were proposed, but they have not been widely used due to various defects...
The immutability of blockchain means that data in blockchain cannot be modified once confirmed. It guarantees the reliability and integrity of blockchain. However, absolute immutability is not conducive to timely correction of blockchain. Currently, there are some researches on redactable blockchain. They replaced hash functions with chameleon hash...
A complete sharding blockchain consists of many vital components, the two most important of which are the intra-shard consensus algorithm and the cross-shard transaction processing method. The latter usually requires a two-phase commit protocol, which usually relies on the shard leaders to transfer critical messages among different shards. In the p...
With the proliferation of cryptocurrency, many automated cross-ledger trading platforms were set up. These platforms introduce new challenges in tracing the money flows and getting evidence of illicit behaviors. Yousaf, Kappos, and Meiklejohn (USENIX Security’19) are the first to link the cross-ledger money flows. However, their scheme is only appl...
Nowadays, mass-surveillance is becoming an increasingly severe threat to the public’s privacy. The PRISM and a series of other events showed that inner attacks such as subversion attacks may exist in the current network extensively. As an important strategy to defend users’ privacy against these attacks, cryptographic reverse firewall (CRF) is desi...
中本聪共识是区块链共识机制中最基础和研究最广泛的一种共识机制, 其安全性对整个区块链领域的发展具有重要的理论意义和应用价值. 现有大量研究在各种模型假设下 对中本聪共识进行了安全性分析和证明. 本文首先详细描述了中本聪共识的执行模型, 包括时间模型, 网络模型, 敌手模型等. 其次, 系统总结了中本聪共识安全性的形式化定义. 再次, 根据时间模型将中本聪共识研究方法分为基于离散时间模型和连续时间模型两类, 并指出不同方法的优缺点. 最后对中本聪共识的安全性研究进行展望, 旨在为区块链共识机制的研究提供技术支撑.
Android is undergoing unprecedented malicious threats daily, but the existing methods for malware detection often fail to cope with evolving camouflage in malware. To address this issue, we present Hawk, a new malware detection framework for evolutionary Android applications. We model Android entities and behavioral relationships as a heterogeneous...
Android is undergoing unprecedented malicious threats daily, but the existing methods for malware detection often fail to cope with evolving camouflage in malware. To address this issue, we present HAWK, a new malware detection framework for evolutionary Android applications. We model Android entities and behavioural relationships as a heterogeneou...
Quantum decoherence leads to environment-induced superselection of preferred states. Some information in the measurement apparatus is lost during communication. Even if the measurement apparatus is not entangled with the system of interest, the loss of information would occur. In this paper, we propose a feasible quantum network coding scheme reduc...
Quantum obfuscation means encrypting the functionality of circuits or functions by quantum mechanics. It works as a form of quantum computation to improve the security and confidentiality of quantum programs. Although some quantum encryption schemes have been discussed, any quantum asymmetric scheme based on quantum obfuscation is not still propose...
Traceable ring signature (TRS), a variant of ring signature, allows a signer to sign a message anonymously labeled with a tag on behalf of a group of users, but may reveal the signer’s identity if he creates two signatures with the same tag. TRS provides accountable anonymity for users, and serves as an important role in e-voting systems and e-coup...
Fully homomorphic encryption enables computation on encrypted data while maintaining secrecy. This leads to an important open question whether quantum computation can be delegated and verified in a non-interactive manner or not. In this paper, we affirmatively answer this question by constructing quantum fully homomorphic encryption (QFHE) schemes...
With the wide application of electronic hardware in aircraft such as air-to-ground communication, satellite communication, positioning system and so on, aircraft hardware is facing great secure pressure. Focusing on the secure problem of aircraft hardware, this paper proposes a supervisory control architecture based on secure System-on-a-Chip (SoC)...
With the rapid development of the digital world, digital rights management (DRM) becomes increasingly important. Multi-Authority Attribute Based Encryption (MA-ABE) schemes provide suitable solutions for flexible fine-grained access control in DRM. However, there are two accountable problems unsolved when applying existing ABE schemes to DRM direct...
Sharding is the prevalent approach to breaking the trilemma of simultaneously achieving decentralization, security, and scalability in traditional blockchain systems, which are implemented as replicated state machines relying on atomic broadcast for consensus on an immutable chain of valid transactions. Sharding is to be understood broadly as techn...
Smart contracts are regarded as one of the most promising and appealing notions in blockchain technology. Their self-enforcing and event-driven features make some online activities possible without a trusted third party. Nevertheless, problems such as miscellaneous attacks, privacy leakage, and low processing rates prevent them from being widely ap...
Cloud storage is an effective way for data owners to outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services. In traditional cloud storage systems, cloud data integrity verification relies on centralized entities and data is stored in a small number of storage servicers. However, these centralized entiti...
Sharding blockchains are proposed to solve the scalability problem while maintaining security and decentralization. However, there are still many issues to be solved. First, the member selection and assignment process are not strictly analyzed, which might lead to an increase in the adversary proportion. Second, current intra-shard consensus algori...
We propose an attribute-based fast data cloud-outsourcing (FDCO) scheme, which shows great performance in mobile devices. Technically, this work is a CCA-secure online/offline key encapsulation scheme based on ciphertext-policy attribute-based encryption with public validity test and indirect user revocation mechanism. We adapt it to a mobile cloud...
With the rapid development of the genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced, and the analysis and utilization of genomic data came into the public view, while the leakage of genomic data privacy has aroused the attention of researchers. The security of genomic...
The PRISM made the research of cryptography against subversion attacks flourish these years. In a subversion attack, surveillants can compromise the security of users’ systems by subverting implementations of cryptographic algorithms. While the scenario of a single‐surveillant has been researched by several works, the multi‐surveillant setting attr...
Metamaterials, artificially engineered structures with extraordinary physical properties, offer multifaceted capabilities in interdisciplinary fields. To address the looming threat of stealthy monitoring, the detection and identification of metamaterials is the next research frontier but have not yet been explored. Here, we show that the crypto-ori...
Sharding blockchains could improve the transaction throughput and achieve scalibility, making the application fields of the blockchain technology more extensive. Cross-shard transactions account for a large fraction of transactions in a sharding blockchain, so the processing method of cross-shard transactions is of vital importance to the system ef...
Sharding blockchains are promising in improving transaction throughput and achieving network scalability. Intra-shard consensus and cross-shard communication are two essential parts for almost every kind of sharding blockchain. However, some security problems still exist in current sharding solutions such as replay attacks, and there is still room...
With the wide application of the mobile Internet, many aspects such as mobile payment, mobile office, private-data protection, security control of terminals and so on will face huge secure pressure. For that reason, this paper presents a supervisory control architecture based on secure SOC system with attack-immune and trustworthiness for intellige...
Smart contract has been regarded as one of the most promising and appealing notions in blockchain technology. Its self-enforcing and event-driven features make some online activities possible without a trusted third party, especially those related to financial and business. However, problems such as high security risk and low processing rate preven...
As a combination of cloud computing and edge computing, cloud-fog-end computing models are gradually replacing traditional centralized cloud computing models due to their high controllability and low latency. However, this model has certain shortcomings in terms of resource awareness of edge devices. Two problems are the most prominent. One is that...
Internet of Things is a critical infrastructure component as well as an enabling technology to support the fast-developing cross-region, cross-application, and diversified collaborative smart city services that require systematic cooperation among multiple smart city systems. Speech recognition-based voice controllable systems become one of the mos...
Performance of routing protocol at network layer in Cognitive Radio Adhoc Networks (CRAHNs) is mainly based on the probability of channel availability for application data transmission. To attain, end-to-end channel-route control messages should be disseminated in an efficient mechanism with minimal channel-route re-connection delays. In CRAHNs, en...
Committee-based blockchain consensus protocols combine permissionless consensus and classical state machine replication protocols to process transactions efficiently. Due to corruptions by the adversary, reconfiguration mechanisms have to be deployed to update committee members. How to select enough fraction of honest nodes is a key issue that need...
In this chapter, we review the principle of some common quantum attacks, such as intercept-and-resend attack, teleportation attack, man-in-the-middle attack, participant attack, and implementation attack. Also, we introduce some general security analysis methods, such as BAN logic, random oracle model, and quantum-accessible random oracle model. Th...
Considering the practical advantage of continuous variables, in this chapter, we introduce continuous-variable quantum network coding (CVQNC) schemes. Basic operations are provided. To verify the identity of different data sources in a quantum network, we introduce a continuous-variable quantum homomorphic signature scheme. It is based on continuou...
How to design network coding beyond the butterfly network is desired to be resolved. Quantum repeaters are potential candidates to create nonlocal entanglement between distant particles and realize long-distance quantum communication.
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible random oracle for post-quantum cryptography and quantum random oracle for quantum cryptography. T...
Quantum network coding is vulnerable to pollution attacks, especially when using classical channel as an auxiliary resource. In this chapter, we introduce a secure quantum network coding scheme against pollution attacks.
Many quantum network coding schemes are different in terms of node, channel, resources, security, etc. Considering their own special properties characterized by the additional resources used, quantum network coding schemes can be precisely classified according to what kind of additional resources are used.
Many quantum authentication schemes have been designed according to quantum key distribution. Scheme security is proved heuristically by employing attack strategies such as intercept-measure-resend attack, entanglement-measure attack, etc. In this chapter, we introduce security analysis based on BAN logic. In contrast to analyzing protocols with co...
Quantum communication is a new interdiscipline combining quantum mechanics and information theory, which has the feature of unconditional security. Usually, the handling of quantum information is harder than that of the classical counterparts. Copying and coding are two typical operations of network coding. The question is whether or not quantum ne...
Opportunistic coding can take advantage of channel characteristic to maximize the gain from network coding. The achievement of air-to-ground quantum key distribution represents a key milestone toward quantum communication in free space. Thus it is worth concerning whether quantum network coding with opportunistic characteristic is also feasible or...
Controlled teleportation introduces the concept of a controller and can control the reconstruction process of a receiver by sharing a GHZ state between the sender and the receiver.
With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being paid increasing attention to.
Quantum cryptography has developed some fundamental primitives such as quantum one-time pad and quantum IND (indistinguishability)-security. Compared with other terms in quantum cryptography, quantum obfuscation attracts less attention and is still in its infancy due to its difficulty in implementation and application. In this chapter, we provide a...
Most k-anonymization mechanisms that have been developed presently are vulnerable to re-identification attacks, e.g., those generating a generalized value based on input databases. k-anonymization mechanisms do not properly capture the notion of hiding in a crowd, because they do not impose any constraints on the mechanisms. In this paper, we defin...
One‐way functions are fundamental tools for cryptography. Until now, quantum one‐way functions have several input‐output categories such as “classical‐to‐classical,” “classical‐to‐quantum,” and “quantum‐to‐classical,” which are used for postquantum cryptography or quantum cryptography. However, there are still no intrinsic “quantum‐to‐quantum” quan...
With the continuous development and popularity of blockchain technology, anonymity of cryptocurrency has attracted wide attention. Zcash is an altcoin of Bitcoin aiming to protect blockchain anonymity. Its anonymity is highly guaranteed by zero-knowledge proofs. However, it is still practicable to decrease Zcash’s anonymity. In this paper, we provi...
The application of cloud storage system has been deployed widely in recent years. A lot of electronic medical records (EMRs) are collected and uploaded to the cloud for scalable sharing among the authority users. It is necessary to guarantee the confidentiality of EMRs and the privacy of EMR owners. To achieve this target, we summarize a series of...
Traceable ring signature (TRS), a variant of ring signature, allows a signer to sign a message anonymously labeled with a tag on behalf of a group of users, but may reveal the signer’s identity if he creates two signatures with the same tag. TRS provides accountable anonymity for users, and serves as an important role in e-voting systems and e-coup...
Due to the basic nature of mobile ad hoc networks, that is, infrastructure-less, it is prone to individual or collective misbehaviors by participating node(s). Participating nodes could act selfishly and does cause massive loss to network performance because of limited resources or belonging to a different administrative domain. Reputation-based so...
Ethereum accelerates the transaction process through a quicker block creation design. Since the time interval between the generation of blocks is very short (about 15s), block propagation time in an inefficient network is not negligible compared with the block time interval. This lead to the production of a large number of orphan blocks. In order t...
This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the b...
The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed in many industrial systems. The ability of SDN to intelligently route traffic and use underutilised network resources, enables IoT networks to cope with data onslaught smoothly. SDN also eliminates bottlenecks and helps to process IoT data efficiently witho...
Abstract: The software-defined network (SDN) enabled internet of things (IoT) architecture is deployed in many industrial systems. The ability of SDN to intelligently route traffic and use underutilised network resources, enables IoT networks to cope with data onslaught smoothly. SDN also eliminates bottlenecks and helps to process IoT data efficie...
With the rapid development of genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced. The analysis and utilization of genomic data have gradually come into the public view, the privacy leakage of genomic data has aroused the attention of researchers. Genomic data has unique...
In the existing Software-Defined Networking (SDN), the network infrastructure is divided into different network domains according to the operators assigned to it. In this paper, by adding monitor meta to the switch layer, the flow table rules and logs issued by the controller are distributed recorded. The consortium blockchain is constructed by dis...
Identity-based remote data auditing schemes can verify data integrity and provide a simple identity authentication and management for multiple users. However, prior works on identity-based remote data auditing lack the support of dynamic operations. In these schemes, tag generation is linked to the index of data block, which is related to update op...