Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anjia Yang is active.

Publication


Featured researches published by Anjia Yang.


Future Generation Computer Systems | 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang; Man Ho Au; Joseph K. Liu; Willy Susilo; Duncan S. Wong; Guomin Yang; Yong Yu; Anjia Yang

Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. This paper proposes a new Ciphertext-Policy Attribute-Based Proxy Re-Encryption scheme.The scheme is proved adaptively chosen ciphertext secure by leveraging dual system encryption technology and selective proof technique.The paper also proposes an improvement for re-encryption key generation and re-encryption phases so as to reduce computational and communication cost.


network and system security | 2013

A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation

Yunhui Zhuang; Anjia Yang; Duncan S. Wong; Guomin Yang; Qi Xie

There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding.


network and system security | 2013

A New Unpredictability-Based RFID Privacy Model

Anjia Yang; Yunhui Zhuang; Duncan S. Wong; Guomin Yang

Ind-privacy and unp-privacy, later refined to unp*-privacy, are two different classes of privacy models for RFID authentication protocols. These models have captured the major anonymity and untraceability related attacks regarding RFID authentication protocols with privacy, and existing work indicates that unp*-privacy seems to be a stronger notion when compared with ind-privacy. In this paper, we continue studying the RFID privacy models, and there are two folds regarding our results. First of all, we describe a new traceability attack and show that schemes proven secure in unp*-privacy may not be secure against this new and practical type of traceability attacks. We then propose a new unpredictability-based privacy model to capture this new type of attacks. Secondly, we show that this new model, where we called it the unp τ -privacy, is stronger than both unp*-privacy and ind-privacy.


Future Generation Computer Systems | 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models

Anjia Yang; Yunhui Zhuang; JianPing Weng; Gerhard P. Hancke; Duncan S. Wong; Guomin Yang

Abstract A comprehensive privacy model plays a vital role in the design of privacy-preserving RFID authentication protocols. Among various existing RFID privacy models, indistinguishability-based (ind-privacy) and unpredictability-based (unp-privacy) privacy models are the two main categories. Unp ∗ -privacy, a variant of unp-privacy has been claimed to be stronger than ind-privacy. In this paper, we focus on studying RFID privacy models and have three-fold contributions. We start with revisiting unp ∗ -privacy model and figure out a limitation of it by giving a new practical traceability attack which can be proved secure under unp ∗ -privacy model. To capture this kind of attack, we improve unp ∗ -privacy model to a stronger one denoted as unp τ -privacy. Moreover, we prove that our proposed privacy model is stronger than ind-privacy model. Then, we explore the relationship between unp ∗ -privacy and ind-privacy, and demonstrate that they are actually not comparable, which is in contrast to the previous belief. Next, we present a new RFID mutual authentication protocol and prove that it is secure under unp τ -privacy model. Finally, we construct a RFID mutual authentication model denoted as M A model, and show that unp τ -privacy implies M A , which gives a reference to design a privacy-preserving RFID mutual authentication protocol. That is, if we propose a scheme that satisfies unp τ -privacy, then it also supports mutual authentication.


international conference on information and communication security | 2012

An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy

Anjia Yang; Yunhui Zhuang; Duncan S. Wong


Future Generation Computer Systems | 2018

HB+DB: Distance bounding meets human based authentication

Elena Pagnin; Anjia Yang; Qiao Hu; Gerhard P. Hancke; Aikaterini Mitrokotsa


wireless network security | 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding

Elena Pagnin; Anjia Yang; Gerhard P. Hancke; Aikaterini Mitrokotsa


IEEE Transactions on Mobile Computing | 2018

Two-Hop Distance-Bounding Protocols: Keep Your Friends Close

Anjia Yang; Elena Pagnin; Aikaterini Mitrokotsa; Gerhard P. Hancke; Duncan S. Wong


IEEE Transactions on Emerging Topics in Computing | 2017

Energy-Efficient Distance-Bounding with Residual Charge Computation

Yunhui Zhuang; Anjia Yang; Gerhard P. Hancke; Duncan S. Wong; Guomin Yang


Computer Networks | 2016

Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization

Qiao Hu; Lavinia Mihaela Dinca; Anjia Yang; Gerhard P. Hancke

Collaboration


Dive into the Anjia Yang's collaboration.

Top Co-Authors

Avatar

Duncan S. Wong

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Gerhard P. Hancke

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Yunhui Zhuang

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Guomin Yang

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Aikaterini Mitrokotsa

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Elena Pagnin

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Qiao Hu

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Kaitai Liang

Manchester Metropolitan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Man Ho Au

Hong Kong Polytechnic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge