<form id="cq4tt"><noscript id="cq4tt"></noscript></form>
<samp id="cq4tt"></samp>
<label id="cq4tt"><rp id="cq4tt"></rp></label>
  • <bdo id="cq4tt"><delect id="cq4tt"></delect></bdo>
      <meter id="cq4tt"></meter>
    1. <bdo id="cq4tt"><delect id="cq4tt"></delect></bdo>

        首頁 > 學術講座 > 正文
        Secure data search and sharing, and more


        Secure data search and sharing, and more


        Dr. Kaitai Liang is an Assistant Professor in Secure Systems at the University of Surrey, UK. He received the PhD degree in computer science from City University of Hong Kong. His main research interests are applied cryptography, in particular, functional encryption, proxy re-encryption, searchable encryption, lattice-based cryptographic protocols, post-quantum blockchain research, lattice-based TPM, blockchain security, and privacy-enhancing technology. He’s participated (as PI/CI) in European funding and H2020 projects to deliver real-world impact with academic (e.g., Uni. Birmingham) and industrial partners (e.g., IBM, Infineon). He’s published over 70 research works, leveraging information security/crypto tools to tackle real-world problems, in high tier international journals and conferences, e.g., IEEE TIFS/Computers/TII, ESORICS. He’s served as TPC for over 20 renown international security/privacy conferences, e.g., ESORICS. He is a member of UK ISO Crypto Sub Committee IST/33/2.


        To date outsourcing data storage to remote cloud has become a trend because database owners may get rid of the cost of local data management and maintenance. But the data outsourcing yields data confidentiality and user privacy concerns. A traditional encryption technique, e.g., AES/RSA, may trivially protect data secrecy but hinder the further encrypted data operations (e.g., search/computation). In this seminar, we will consider how to leverage searchable encryption and proxy re-encryption to achieve secure data search and sharing for the case where a database is out of “physical control” of its owner. We will also introduce key techniques, security proof, and applications for the two encryptions. Some interesting open problems and future research directions will be introduced at the end of the seminar.