Anjia Yang
City University of Hong Kong
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anjia Yang.
Future Generation Computer Systems | 2015
Kaitai Liang; Man Ho Au; Joseph K. Liu; Willy Susilo; Duncan S. Wong; Guomin Yang; Yong Yu; Anjia Yang
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. This paper proposes a new Ciphertext-Policy Attribute-Based Proxy Re-Encryption scheme.The scheme is proved adaptively chosen ciphertext secure by leveraging dual system encryption technology and selective proof technique.The paper also proposes an improvement for re-encryption key generation and re-encryption phases so as to reduce computational and communication cost.
network and system security | 2013
Yunhui Zhuang; Anjia Yang; Duncan S. Wong; Guomin Yang; Qi Xie
There is a common situation among current distance bounding protocols in the literature: they set the fast bit exchange phase after a slow phase in which the nonces for both the reader and a tag are exchanged. The output computed in the slow phase is acting as the responses in the subsequent fast phase. Due to the calculation constrained RFID environment of being lightweight and efficient, it is the important objective of building the protocol which can have fewer number of message flows and less number of cryptographic operations in real time performed by the tag. In this paper, we propose a new highly efficient mutually-authenticated RFID distance bounding protocol that enables pre-computation which is carried out off-line by the tag. There is no evaluation on any PRF during the real time protocol running which makes the tag significantly more efficient at a low-cost. The protocol requires only O(1) complexity for achieving tag privacy. In addition, we give a detailed security analysis to prove that our protocol is secure against all common attacks in distance bounding.
network and system security | 2013
Anjia Yang; Yunhui Zhuang; Duncan S. Wong; Guomin Yang
Ind-privacy and unp-privacy, later refined to unp*-privacy, are two different classes of privacy models for RFID authentication protocols. These models have captured the major anonymity and untraceability related attacks regarding RFID authentication protocols with privacy, and existing work indicates that unp*-privacy seems to be a stronger notion when compared with ind-privacy. In this paper, we continue studying the RFID privacy models, and there are two folds regarding our results. First of all, we describe a new traceability attack and show that schemes proven secure in unp*-privacy may not be secure against this new and practical type of traceability attacks. We then propose a new unpredictability-based privacy model to capture this new type of attacks. Secondly, we show that this new model, where we called it the unp τ -privacy, is stronger than both unp*-privacy and ind-privacy.
Future Generation Computer Systems | 2018
Anjia Yang; Yunhui Zhuang; JianPing Weng; Gerhard P. Hancke; Duncan S. Wong; Guomin Yang
Abstract A comprehensive privacy model plays a vital role in the design of privacy-preserving RFID authentication protocols. Among various existing RFID privacy models, indistinguishability-based (ind-privacy) and unpredictability-based (unp-privacy) privacy models are the two main categories. Unp ∗ -privacy, a variant of unp-privacy has been claimed to be stronger than ind-privacy. In this paper, we focus on studying RFID privacy models and have three-fold contributions. We start with revisiting unp ∗ -privacy model and figure out a limitation of it by giving a new practical traceability attack which can be proved secure under unp ∗ -privacy model. To capture this kind of attack, we improve unp ∗ -privacy model to a stronger one denoted as unp τ -privacy. Moreover, we prove that our proposed privacy model is stronger than ind-privacy model. Then, we explore the relationship between unp ∗ -privacy and ind-privacy, and demonstrate that they are actually not comparable, which is in contrast to the previous belief. Next, we present a new RFID mutual authentication protocol and prove that it is secure under unp τ -privacy model. Finally, we construct a RFID mutual authentication model denoted as M A model, and show that unp τ -privacy implies M A , which gives a reference to design a privacy-preserving RFID mutual authentication protocol. That is, if we propose a scheme that satisfies unp τ -privacy, then it also supports mutual authentication.
international conference on information and communication security | 2012
Anjia Yang; Yunhui Zhuang; Duncan S. Wong
Future Generation Computer Systems | 2018
Elena Pagnin; Anjia Yang; Qiao Hu; Gerhard P. Hancke; Aikaterini Mitrokotsa
wireless network security | 2015
Elena Pagnin; Anjia Yang; Gerhard P. Hancke; Aikaterini Mitrokotsa
IEEE Transactions on Mobile Computing | 2018
Anjia Yang; Elena Pagnin; Aikaterini Mitrokotsa; Gerhard P. Hancke; Duncan S. Wong
IEEE Transactions on Emerging Topics in Computing | 2017
Yunhui Zhuang; Anjia Yang; Gerhard P. Hancke; Duncan S. Wong; Guomin Yang
Computer Networks | 2016
Qiao Hu; Lavinia Mihaela Dinca; Anjia Yang; Gerhard P. Hancke