Research Interests

Information security, Applied Cryptography, Blockchain Technology

List of Publications

Refereed Journal Publications

  1. Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo and Qingqing Ye. Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. IEEE Transactions on Information Forensics & Security 15:3023-3034 (2022)
  2. Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au and Qian Wang. Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Transactions on Dependable and Secure Computing (to appear) (2022)
  3. Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin and Xuemin (Sherman) Shen. Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Transactions on Mobile Computing (to appear) (2021)
  4. Wenjuan Li, Yu Wang, Jin Li and Man Ho Au. Toward A Blockchain-based Framework For Challenge-based Collaborative Intrusion Detection. International Journal of Information Security 20(2): 127-139 (2021)
  5. j5. Wenjuan Li, Man Ho Au and Yu Wang. A Fog-based Collaborative Intrusion Detection Framework For Smart Grid. International Journal of Network Management 31(2) (2021)
  6. j6. Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au and Qian Wang. Enabling Secure and Efficient Decentralized Storage Auditing with Blockchain. IEEE Transactions on Dependable and Secure Computing (to appear) (2021)
  7. Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng and Xiaokui Xiao. LF-GDPR: A Framework for Estimating Graph Metrics with Local Differential Privacy. IEEE Transactions on Knowledge and Data Engineering 14:8 (2020)
  8. Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au. Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Generation Computer Systems 108: 1258-1266 (2020)
  9. Wenjuan Li, Weizhi Meng and Man Ho Au. Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. Journal of Network and Computer Applications 161: 102631 (2020)
  10. Kang Li, Wang Fat Lau, Man Ho Au, Ivan Wang-Hei Ho and Yilei Wang. Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks. Computers & Electrical Engineering 86 (accepted on 28 May 2020)
  11. Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau and Man Ho Au. Geometric range search on encrypted data with Forward/Backward security. IEEE Transactions on Dependable and Secure Computing (2020)
  12. Wenjuan Li, Weizhi Meng, Zhiqiang Liu and Man Ho Au. Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Transactions on Information and Systems (2020)
  13. Dagang Li, Rong Du, Yue Fu and Man Ho Au. Meta-Key: A Secure Data-Sharing Protocol Under Blockchain-Based Decentralized Storage Architecture. IEEE Networking Letters (2020)
  14. Xiao Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu and Jacob Cheng. Practical Escrow Protocol for Bitcoin. IEEE Transactions on Information Forensics & Security 15:3023-3034 (2020)
  15. Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au and Dongxi Liu. Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Transactions on Dependable and Secure Computing (2019)�
  16. Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng and Jin Li. Simulation-Based Selective Opening Security for Receivers Under Chosen-Ciphertext Attacks. Design, Codes and Cryptography 87(6): 1345-1371 (2019)
  17. Lifeng Zhang, Yilei Wang, Fengyin Li, Yuemei Hu and Man Ho Au. A Game-Theoretic Method Based on Q-Learning to Invalidate Criminal Smart Contracts. Information Sciences 498: 144-153 (2019)
  18. Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du and Bo Yang. Efficient Attribute-Based Encryption with Attribute Revocation for Assured Data Deletion. Information Sciences 479: 640-650 (2019)
  19. Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au and Baocang Wang. An Efficient Linkable Group Signature for Payer Tracing in Anonymous Cryptocurrencies. Future Generation Computer Systems 101: 29-38 (2019)
  20. Lei Zhang, Mingxing Luo, Jiantao Li, Man Ho Au, Kim-Kwang Raymond Choo, Tong Chen and Shengwei Tian. Blockchain Based Secure Data Sharing System for Internet of Vehicles: A Position Paper. Vehicular Communications 16: 85-93 (2019)
  21. Rupeng Yang, Man Ho Au, Qiuliang Xu and Zuoxia Yu. Decentralized Blacklistable Anonymous Credentials with Reputation. Computers & Security 85: 353-371 (accepted on 10 May 2019)
  22. Yang Shi, Wujing Wei, Hongfei Fan, Man Ho Au and Xiapu Luo. A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Transactions on Computers 68(10): 1411-1427 (accepted on 13 Mar 2019)
  23. Yi Dou, Henry CB Chan and Man Ho Au. A Distributed Evaluation Protocol with Privacy Protection for Intercloud. IEEE Transactions on Parallel and Distributed Systems (TPDS) 30(6): 1208-1221 (accepted on 7 Nov 2018)
  24. Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai and Wenmin Li. PPFilter: Provider Privacy-aware Encrypted Filtering System. IEEE Transactions on Services Computing. (accepted on 27 Sep 2018)
  25. Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu and Rongmao Chen. Identity-Based Revocation System: Enhanced Security Model and Scalable Bounded IBRS Construction with Short Parameters. Information Sciences 472: 35-52 (accepted on 17 Sep 2018)
  26. Yi Dou, Henry CB Chan and Man Ho Au. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. The Computer Journal 61(12): 1806-1824 (accepted on 12 Jun 2018)
  27. Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang and Joseph K. Liu. Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Transactions on Services Computing. (accepted on 20 Mar 2018)
  28. Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au and Xiapu Luo. A Survey on Access Control in Fog Computing. IEEE Communications Magazine 56(2): 144-149 (2018)
  29. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. Design, Codes and Cryptography 86(1): 97-120 (2018)
  30. Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang(s)and Jinguang Han. Towards Leakage-Resilient Fine-Grained Access Control in Fog Computing. Future Generation Computer Systems 78: 763-777 (2018)
  31. Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu(s), Hao Wang and Lu Zhou. Position Based Cryptography with Location Privacy: A step for Fog Computing. Future Generation Computer Systems 78: 799-806 (2018)
  32. Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu and Jianting Ning. Privacy-Preserving Personal Data Operation on Mobile Cloud - Chances and Challenges over Advanced Persistent Threat. Future Generation Computer Systems 79: 337-349 (2018)
  33. Shuang Zhao, Xiapu Luo, Xiaobo Ma, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au and Xinliang Qiu. Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Security and Communication Networks 2018: 3182402:1-3182402:22 (2018)
  34. Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang and Man Ho Au. Fuzzy Matching and Direct Revocation: A New CP-ABE Scheme from Multilinear Maps. Soft Computing 22(7): 2267-2274 (2018)
  35. Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li. Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. The Computer Journal 60(4): 588-599 (2017)
  36. Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang and Zoe, L. Jiang. A General Framework for Secure Sharing of Personal Health Records in Cloud System, Journal of Computer and System Sciences 90: 46-62 (2017)
  37. Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au and Yajuan Tang. CloudBot: Advanced Mobile Botnets using Obiquitous Cloud Technologies. Pervasive and Mobile Computing 41: 270-285 (2017)
  38. Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu and Man Ho Au. Towards Secure and Cost-Effective Fuzzy Access Control in Mobile Cloud Computing. Soft Computing 21(10): 2643-2649 (2017)
  39. Xu Jing, Hanwen Hu, Huijun Yang, Man Ho Au, Shuqin Li, Naixue Xiong, Muhammad Imran and Athanasios V. Vasilakos. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks. Sensors 17(3): 642 (2017)
  40. Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai and Geyong Min. Identity-Based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage, IEEE Transactions on Information Forensics and Security 12(4): 767-778 (2017)
  41. Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos and Jian Shen. Cloud Data Integrity Checking with Identity-based Auditing Mechanism from RSA. Future Generation Computer Systems 62: 85-91 (2016)
  42. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Junbin Fang, Zoe L. Jiang, Willy Susilo and Jianying Zhou. Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. The Computer Journal 59(7): 1040-1053 (2016)
  43. Hui Cui, Yi Mu and Man Ho Au. Relations between Robustness and RKA Security under Public-Key Encryption. Theoretic Computer Science 628: 78-91 (2016)
  44. Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu and Jin Li. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services. IEEE Transactions on Information Forensics and Security 11(3): 484-497 (2016)
  45. Joonsang Baek, Duncan S. Wong, Jin Li and Man Ho Au. Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. The Computer Journal 59(4): 508-521 (2016)
  46. Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au and Jie Cao. ACC-OT: Accountable Oblivious Transfer with Access Control. IEEE Transactions on Information Forensics and Security 10(12): 2502-2514 (2015)
  47. Yang Wang, Willy Susilo and Man Ho Au. Revisiting Security against the Arbitrator in Optimistic Fair Exchange. The Computer Journal 58(10): 2665-2676 (2015)
  48. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry. Adaptively Secure Identity-Based Broadcast Encryption with a Constant-sized Ciphertext. IEEE Transactions on Information Forensics and Security 10(3): 679-693 (2015)
  49. Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu and Balasubramaniam Srinivasan. Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud. IEEE Network Magazine 29(2): 46-50 (2015)
  50. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou and Man Ho Au. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-based Encryption. IEEE Transactions on Information Forensics and Security 10(3): 665-678 (2015)
  51. Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu and Anjia Yang. A Secure and Efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. Future Generation Computer Systems 52: 95-108 (2015)
  52. Joseph K. Liu, Cheng-Kang Chu, Sherman S.M. Chow, Xinyi Huang, Man Ho Au and Jianying Zhou. Time-Bound Anonymous Authentication for Roaming Networks. IEEE Transactions on Information Forensics and Security 10(1): 178-189 (2015)
  53. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo and Jianying Zhou. k-times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Transactions on Computers 64(9): 2595-2608 (2015)
  54. Yong Yu, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen and Hongyu Liu. Remote Data Possession Checking with Enhanced Security for Cloud Storage. Future Generation Computer Systems 52: 77-52 (2015)
  55. Yang Wang, Man Ho Au and Willy Susilo. Optimistic Fair Exchange in the Enhanced Chosen-key Model. Theoretical Computer Science 562: 57-74 (2015)
  56. Yang Wang, Man Ho Au and Willy Susilo. Revisiting Optimistic Fair Exchange based on Ring Signatures. IEEE Transactions on Information Forensics and Security 9(11): 1883-1892 (2014)
  57. Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo and Liju Dong. Enhanced Privacy of a Remote Data Integrity Checking Protocol for Secure Cloud Storage. International Journal of Information Security 14(4): 307-318 (2015)
  58. Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang and Hui Li. Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Transactions on Services Computing 8(6): 998-999 (2015)
  59. Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong and Qi Xie. A DFA-based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Transactions on Information Forensics and Security 9(10): 1667-1680 (2014)
  60. Yang Wang, Willy Susilo, Man Ho Au and Guilin Wang. Collusion-Resistance in Optimistic Fair Exchange. IEEE Transactions on Information Forensics and Security 9(8): 1227-1239 (2014)
  61. Yang Wang(s), Man Ho Au and Willy Susilo. Attribute-based Optimistic Fair Exchange: How to Restrict Brokers with Policies. Theoretical Computer Science 527: 83-96 (2014)
  62. Yong Yu, Man Ho Au, Yi Mu and Willy Susilo. Secure Delegation of Signing Power from Factorization. The Computer Journal 58(4): 867-877 (2015)
  63. Hui Cui, Yi Mu and Man Ho Au. Proof of Retrievability with Public Verifiability Resilient Against Related-Key Attacks. IET Information Security 9(1): 43-49 (2015)
  64. Yong Yu, Yi Mu, Willy Susilo and Man Ho Au. Security Pitfalls of an Efficient Threshold Proxy Signature Scheme for Mobile Agents. Information Processing Letters 114(1-2): 5-8 (2014)
  65. Hui Cui, Yi Mu and Man Ho Au. Anonymous Broadcast Encryption with an Untrusted Gateway. International Journal of Security and Networks 9(1): 20-29 (2014)
  66. Yong Yu, Jianbing Ni, Man Ho Au, Hongyu Liu, Hua Wang and Chungxiang Xu. Improved Security of a Dynamic Remote Data Possession Checking Protocol for Cloud Storage. Expert Systems with Applications 41(17): 7789-7796 (2014)
  67. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au and Willy Susilo. Improvements on an Authentication Scheme for Vehicular Sensor Networks. Expert Systems with Applications 41(5): 2559-2564 (2014)
  68. Hui Cui, Yi Mu and Man Ho Au. Signcryption Secure Against Linear Related-Key Attacks. The Computer Journal 57(10): 1472-1483 (2014)
  69. Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang. (Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack. Concurrency and Computation: Practice and Experience 26(8): 1574-1592, Wiley, 2014
  70. Man Ho Au, Joseph K. Liu, Junbin Fang, Zoe L. Jiang, Willy Susilo and Jianying Zhou. A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Transactions on Vehicular Technology 63(1): 3-18 (2014)
  71. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Linkable Ring Signature with Unconditional Anonymity. IEEE Transactions on Knowledge and Data Engineering 26(1): 157-165 (2014)
  72. Man Ho Au, Joseph K. Liu, Willy Susilo and Jianying Zhou. Realizing Fully Secure Unrestricted ID-based Ring Signature in the Standard Model Based on HIBE. IEEE Transactions on Information Forensics and Security 8(12): 1909-1922 (2013)
  73. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction. Theoretical Computer Science 469: 1-14 (2013)
  74. Man Ho Au, Willy Susilo, Yi Mu and Sherman S.M. Chow. Constant-Size Dynamic k-Times Anonymous Authentication. IEEE Systems Journal special issue on Security and Privacy of Complex Systems 7(2): 249-261 (2013)
  75. Sherman S. M. Chow, Man Ho Au and Willy Susilo. Server-Aided Signatures Verification Secure against Collusion Attack. Information Security Technical Report 17(3): 46-57 (2013)
  76. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Efficient Linkable and/or Threshold Ring Signature without Random Oracles. The Computer Journal 56(4): 407-421 (2013)
  77. Man Ho Au, Patrick P. Tsang and Apu Kapadia. PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. ACM Transactions on Information and System Security (TISSEC), volume 14 issue 4, Article No.: 29, December 2011, ACM (2011)
  78. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Transactions on Information and System Security (TISSEC), volume 13 issue 4, article no.: 39, December 2010, ACM (2010)
  79. Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu and Duncan Wong. Escrowed Deniable Identification Schemes. International Journal of Security and Its Applications, volume 4, no. 1, pages 49-67, January 2010

Refereed Conference Publications

  1. Rupeng Yang, Zuoxia Yu, Man Ho Au and Willy Susilo. Public-Key Watermarking Schemes for Pseudorandom Functions. The 42nd Annual International Cryptology Conference (CRYPTO 2022) (to appear)
  2. Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au and Jia Liu. AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. The 17th ACM ASIA Conference on Computer and Communications Security (AsiaCCS 2022) (to appear)
  3. Lixin Liu, Xinyu Li, Zhuoya Fan, Man Ho Au and Xiaofeng Meng. Metadata Privacy Preservation for Blockchain-based Healthcare Systems. Proceedings of the 27th International Conference on Database Systems for Advanced Applications (DASFAA-2022), volume 13245 of Lecture Notes in Computer Science, pages 404-412, Springer (2022) [Short Paper]
  4. Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li and Kim-Kwang Raymond Choo. Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. Proceedings of the 16th International Conference on Information Security Practice and Experience (ISPEC 2021), volume 13107 of Lecture Notes in Computer Science, pages 327-344, Springer (2021)
  5. Wang Fat Lau, Yan Wang Dennis Liu and Man Ho Au. Blockchain-Based Supply Chain System for Traceability, Regulation and Anti-Counterfeiting. Proceedings of the 4th IEEE International Conference on Blockchain (IEEE Blockchain 2021), pages 82-89, IEEE (2021)
  6. Ji Qi, Xusheng Chen, Yunpeng Jiang, Jianyu Jiang, Tianxiang Shen, Shixiong Zhao, Sen Wang, Gong Zhang, Li Chen, Man Ho Au and Heming Cui. BIDL: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks. Proceedings of the 28th ACM Symposium on Operating Systems Principles (SOSP 2021), pages 18-34, ACM (2021)
  7. Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen and Handong Cui. Efficient Online-friendly Two-Party ECDSA Signature. Proceedings of the ACM Conference on Computer and Communications Security (ACM CCS 2021), pages 558-573, ACM (2021)
  8. Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au and Zhimin Ding. DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. The 41st Annual International Cryptology Conference (CRYPTO 2021) (2021)
  9. Lei Xue, Hao Zhou, Xiapu Luo, Yijin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang and Man Ho Au. Happer:Unpacking Android Apps via a Hardware-Assisted Approach. The 42nd IEEE Symposium on Security and Privacy (IEEE S&P 2021)(2021)
  10. Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu and Willy Susilo. Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. The 26th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2020) (2020)
  11. Yu Chen, Xuecheng Ma, Cong Tang and Man Ho Au. PGC: Decentralized Confidential Payment System with Auditability. The 25th European Symposium on Research in Computer Security (ESORICS 2020) (2020)
  12. Rupeng Yang, Man Ho Au, Zuoxia Yu and Qiuliang Xu. Collusion Resistant Watermarkable PRFs from Standard Assumptions. The 40th Annual International Cryptology Conference (CRYPTO 2020) (2020)
  13. Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng and Xiaokui Xiao. LF-GDPR: A Framework for Estimating Graph Metrics with Local Differential Privacy. International Conference on Data Engineering (ICDE 2020) (2020) [Short Paper]
  14. Tsz Hon Yuen, Shi-feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang and Dawu Gu. RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography and Data Security 2020 (FC 2020) (2020)
  15. Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au and Song Tian. Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2019), pages 178-308 (2019)
  16. Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu and Zuoxia Yu. Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. The 25th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2019), pages 371-398 (2019)
  17. Kang Li, Wang Fat Lau and Man Ho Au. A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. 13th International Conference on Network and System Security (NSS 2019), pages 615-631 (2019)
  18. Kang Li, Man Ho Au, Wang Hei Ho and Yilei Wang. An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. Proceedings of the 13th International Conference on Provable Security (ProvSec 2019), pages 59-76 (2019)
  19. Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu and William Whyte. Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. Proceedings of the 39th Annual International Cryptology Conference (CRYPTO 2019), pages 147-175 (2019)
  20. Jiangshan Yu, Man Ho Au and Paulo Esteves-Verissimo. Re-thinking untraceability in the CryptoNote-style blockchain. The 32nd IEEE Computer Security Foundations Symposium (CSF 2019), pages 94-107 (2019)
  21. Xingye Lu, Man Ho Au and Zhenfei Zhang. (Linkable) Ring Signature from Hash-Then-One-Way Signature. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2019), pages 578-585 (2019)
  22. Borui Gong, Man Ho Au and Haiyang Xue. Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2019), pages 586-593 (2019)
  23. Jiazhuo Lyu, Zoe L. Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au and Junbin Fang. A Secure Decentralized Trustless E-Voting System Based on Smart Contract. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2019), pages 570-577 (2019)
  24. Borui Gong, Xingye Lu, Lau Wang Fat and Man Ho Au. Blockchain-Based Threshold Electronic Voting System. 5th International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2019), pages 238-250 (2019)
  25. Dipayan Das, Man Ho Au and Zhenfei Zhang. Ring Signatures Based on Middle-Product Learning with Errors Problems. The 11th International Conference on Cryptology (AFRICACRYPT 2019), pages 139-156 (2019)
  26. Xingye Lu, Man Ho Au and Zhenfei Zhang. Raptor: A Practical Lattice-Based (Linkable) Ring Signature. The 17th International Conference on Applied Cryptography and Network Security (ACNS 2019), pages 110-130 (2019). Sourcecode avaiable at: https://github.com/NTRUOpenSourceProject/raptor
  27. Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu and Joseph Liu. Strong Leakage and tamper-resilient Public Key Encryption from Refined Hash Proof Systems. The 17th International Conference on Applied Cryptography and Network Security (ACNS 2019), pages 486-506 (2019)
  28. Wenjuan Li, Yu Wang, Jin Li and Man Ho Au. Towards Blockchained Challenge-Based Collaborative Intrusion Detection. 1st International Workshop on Application Intelligence and Blockchain Security (In Conjunction with ACNS 2019) (AIBlock 2019), pages 122-139 (2019) [Best Paper Award]
  29. Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang and Man Ho Au. Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. Proceedings of the 17th IEEE International Conference on Pervasive Computing and Communications (PERCOM 2019), pages 1-10 (2019)
  30. Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu and Wang Fat Lau. New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Proc. of 23nd International Conference on Financial Cryptography and Data Security (FC 2019), pages 133-149 (2019)
  31. Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au and Zhi-Hui Zhan. Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. Proceedings of the 22rd European Symposium on Research in Computer Security (ESORICS 2018), pages 83-100 (2018)
  32. Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld and Man Ho Au. Platform-Independent Secure Blockchain-Based Voting System. Proceedings of the 21st International Conference on Information Security (ISC 2018), pages 369-386 (2018)
  33. Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu and Zuoxia Yu. Unforgeable Watermarking Schemes with Public Extraction. Proceedings of the 11th International Conference on Security and Cryptography for Networks (SCN 2018), pages 63-80 (2018)
  34. Cheng Xu, Jianliang Xu, Haibo Hu and Man Ho Au. When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach. Proceedings of the 2018 International Conference on Management of Data (SIGMOD 2018), pages 147-162 (2018)
  35. Rupeng Yang, Man Ho Au, Qiuliang Xu and Zuoxia Yu. Decentralized Blacklistable Anonymous Credentials with Reputation. Proceedings of the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), volume 10946 of Lecture Notes in Computer Sciences, pages 720-738 (2018) [Best Paper Award]
  36. Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai and Qiuliang Xu. Lattice-Based Universal Accumulator with Nonmembership Arguments. Proceedings of the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), volume 10946 of Lecture Notes in Computer Sciences, pages 502-519 (2018)
  37. Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au and Jacob Cheng. Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). Proceedings of the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), volume 10946 of Lecture Notes in Computer Sciences, pages 558-576 (2018)
  38. Junzuo Lai, Zhengan Huang, Man Ho Au and Xianping Mao. Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. Proceedings of the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), volume 10946 of Lecture Notes in Computer Sciences, pages 805-812 (2018)
  39. Xingye Lu, Zhenfei Zhang and Man Ho Au. Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. Proceedings of the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), volume 10946 of Lecture Notes in Computer Sciences, pages 813-820 (2018) [short paper]
  40. Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai and Qiuliang Xu. Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. Proceedings of the 2018 Asia Conference on Computer and Communications Security (AsiaCCS 2018), pages 659-672 (2018)
  41. Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng and Jin Li. Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Proceedings (Part I) of the 21st IACR International Conference on Practice and Theory of Public Key Cryptography (PKC 2018), volume 10769 of Lecture Notes in Computer Science, pages 253-279 (2018)
  42. Huang Zhang, Fangguo Zhang, Haibo Tian and Man Ho Au. Anonymous Post-Quantum Cryptocash. Proc. of 22nd International Conference on Financial Cryptography and Data Security (FC 2018), pages 461-479
  43. Shifeng Sun, Man Ho Au, Joseph K. Liu and Tsz Hon Yuen. RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. Proceedings (Part II) of the 22nd European Symposium on Research in Computer Security (ESORICS 2017), volume 10493 of Lecture Notes in Computer Science, pages 456-474, Springer (2017)
  44. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Evaluating Challenge-based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. IEEE GLOBECOM 2017, pages 1-6 (2017)
  45. Weizhi Meng, Lee Wang Hao, Man Ho Au and Zhe Liu. Exploring Effect of Location Number on Map-Based Graphical Password Authentication. Proceedings, Part II, of the 22nd Australasian Conference on Information Security and Privacy (ACISP 2017), volume 10343 of Lecture Notes in Computer Science, pages 301-313, Springer (2017
  46. Weizhi Meng and Man Ho Au. Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. Proceedings of Trust Management XI - 11th IFIP WG 11.11 International Conference (IFIPTM 2017), volume 505 of IFIP Advances in Information and Communication Technology, pages 152-159, Springer (2017)
  47. Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au and Xiaosong Zhang. An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. Proceedings of the 13th International Conference on Information Security Practice and Experience (ISPEC 2017), volume 10701 of Lecture Notes in Computer Science, pages 3-24, Springer (2017) [Best Paper Award]
  48. Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au and Surya Nepal. An Efficient KP-ABE with Short Ciphertexts in Prime Order Groups under Standard Assumption. Proceedings of the 2017 Asia Conference on Computer and Communications Security (AsiaCCS 2017), pages 823-834 (2017)
  49. Weizhi Meng, Wenjuan Li, Yu Wang and Man Ho Au. Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. Proceedings of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017), volume 10581 of Lecture Notes in Computer Science, pages 163-175, Springer (2017)
  50. Weizhi Meng, Fei Fei, Wenjuan Li and Man Ho Au. Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. Proceedings of the 20th International Conference on Information Security (ISC 2017), volume 10599 of Lecture Notes in Computer Science, pages 291-308, Springer (2017)
  51. Kang Li, Rupeng Yang, Man Ho Au and Qiuliang Xu. Practical Range Proof for Cryptocurrency Monero with Provable Security. Proceedings of the 19th International Conference on Information and Communication Security (ICICS 2017), volume 10631 of Lecture Notes in Computer Science, pages 255-262, Springer (2017)
  52. Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng and Xun Yi. Fuzzy Public-Key Encryption Based on Biometric Data. Proceedings of the 11th International Conference on Provable Security (ProvSec 2017), volume 10592 of Lecture Notes in Computer Science, pages 400-409, Springer (2017)
  53. Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo and Man Ho Au. AutoFlowLeaker: Circumventing Web Censorship through Automation Services. 36th IEEE Symposium on Reliable Distributed Systems (SRDS 2017), pages 214-223, IEEE (2017)
  54. Man Ho Au, Kaitai Liang, Joseph K. Liu and Rongxing Lu. While Mobile Encounters with Clouds. Proceedings of the 10th International Conference on Network and System Security (NSS 2016), volume 9955 of Lecture Notes in Computer Science, pages 3-18, Springer (2016)
  55. Tingting Wang, Man Ho Au and Wei Wu. An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. Proceedings of the 10th International Conference on Network and System Security (NSS 2016), volume 9955 of Lecture Notes in Computer Science, pages 251-265, Springer (2016)
  56. Jongkil Kim, Willy Susilo, Fuchun Guo and Man Ho Au. A Tag-Based Encoding: Efficient Encoding for Predicate Encryption in Prime Order Groups. Proceedings of the 10th International Conference on Security and Cryptography for Networks (SCN 2016), volume 9841 of Lecture Notes in Computer Science, pages 3-22, Springer (2016)
  57. Xingye Lu and Man Ho Au. Anonymous Identification for Ad Hoc Group. Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pages 583-591, ACM (2016)
  58. Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang and Jinguang Han. Leakage-Resilient Functional Encryption via Pair Encodings. Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), volume 9722 of Lecture Notes in Computer Science, pages 443-460, Springer (2016) [Best Paper Award]
  59. Kai He, Jian Weng, Man Ho Au, Yijun Mao and Robert H. Deng. Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. Proceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), volume 9723 of Lecture Notes in Computer Science, pages 207-222, Springer (2016)
  60. Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Raymoand Choo and Xinpeng Zhang. Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. Proceedings, Part I, of the 21st Australasian Conference on Information Security and Privacy (ACISP 2016), volume 9722 of Lecture Notes in Computer Science, pages 389-405, Springer (2016)
  61. Wai-Chow Yang, Willy Susilo, Guomin Yang, Man Ho Au and Cong Wang. Authentication and Transaction Verification Using QR Codes with a Mobile Device. Proceedings of the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016), volume 10066 of Lecture Notes in Computer Science, pages 437-451, Springer (2016)
  62. Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Au and Willy Susilo. PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme. Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015), pages: 282-289 (2015)
  63. Yang Wai-Chow, Willy Susilo, Man Ho Au and Ari Moesriami Barmawi. A Visual One-Time Password Authentication Scheme using Mobile Devices. Proceedings of the 16th International Conference on Information and Communications Security (ICICS 2014), volume 8958 of Lecture Notes in Computer Science, pages 243-257, Springer (2014)
  64. Chen Yuechen, Zoe L. Jiang, S. M. Yiu, Joseph K. Liu, Man Ho Au and Wang Xuan. Fully-Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. Proceedings of the 16th International Conference on Information and Communications Security (ICICS 2014), volume 8958 of Lecture Notes in Computer Science, pages 274-289, Springer (2014)
  65. Hui Cui, Yi Mu and Man Ho Au. Complete Robustness in Identity-Based Encryption. Proceedings of the 8th International Conference on Provable Security (ProvSec 2014), volume 8782 of Lecture Notes in Computer Science, pages 342-349, Springer (2014)
  66. Joseph Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou and Yong Yu. New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. Proceedings (Part II) of the 19th European Symposium on Research in Computer Security (ESORICS 2014), volume 8713 of Lecture Notes in Computer Science, pages 182-199, Springer (2014)
  67. Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou and Man Ho Au. PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption. Proceedings (Part II) of the 19th European Symposium on Research in Computer Security (ESORICS 2014), volume 8713 of Lecture Notes in Computer Science, pages 73-90, Springer (2014)
  68. Man Ho Au and Willy Susilo. Two-Party (Blind) Ring Signatures and Their Applications. Proceedings of the 10th International Conference on Information Security Practice and Experience (ISPEC 2014), volume 8434 of Lecture Notes in Computer Science, pages 403-417, Springer (2014)
  69. Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), pages 268-275, IEEE (2014)
  70. Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang and Yong Yu.An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. Proceedings of the 10th International Conference on Information Security Practice and Experience (ISPEC 2014), volume 8434 of Lecture Notes in Computer Science, pages 448-461, Springer (2014)
  71. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry. Efficient Semi-static Secure Broadcast Encryption Scheme. Proceedings of the 6th International Conference on Pairing-Based Cryptography (PAIRING 2013), volume 8365 of Lecture Notes in Computer Science, pages 62-76, Springer (2013)
  72. Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks. Proceedings of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 182-196, Springer (2013)
  73. Hui Cui, Yi Mu and Man Ho Au. Anonymous Signcryption Secure Against Linear Related-Key Attacks. Proceedings of the 7th International Conference on Provable Security (ProvSec 2013), volume 8209 of Lecture Notes in Computer Science, pages 165-183, Springer (2013)
  74. Hui Cui, Yi Mu and Man Ho Au. Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), pages 704-711, IEEE (2013)
  75. Miao Zhou, Yi Mu, Willy Susilo and Man Ho Au. Privacy-Enhanced Keyword Search in Clouds. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13), pages 447-451, IEEE (2013)
  76. Willy Susilo, Man Ho Au, Yang Wang and Duncan S. Wong. Fairness in Concurrent Signatures Revisited. Proceedings of the 18th Australasian Conference on Information Security and Privacy (ACISP 2013), volume 7959 of Lecture Notes in Computer Science, pages 318-329, Springer (2013)
  77. Yang Wang, Mark Manulis, Man Ho Au and Willy Susilo. Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". Proceedings of the 18th Australasian Conference on Information Security and Privacy (ACISP 2013), volume 7959 of Lecture Notes in Computer Science, pages 187-202, Springer (2013)
  78. Yang Wang, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu and Willy Susilo. Threshold-Oriented Optimistic Fair Exchange. Proceedings of the 7th International Conference on Network and System Security (NSS 2013), volume 7873 of Lecture Notes in Computer Science, pages 424-438, Springer (2013)
  79. Man Ho Au and Apu Kapadia. PERM: Practical Reputation Based Blacklisting without TTPs. Proceedings of the 19th ACM conference on Computer and communications security (ACM CCS 2012), pages 929-940, ACM (2012)
  80. Man Ho Au, Apu Kapadia, and Willy Susilo. BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS 2012)
  81. Yunmei Zhang, Man Ho Au, Guomin Yang and Willy Susilo. (Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack. Proceedings of the 6th International Conference on Network and System Security (NSS 2012), volume 7645/2012 of Lecture Notes in Computer Science, pages 334-347, Springer (2012)
  82. Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo and Jianying Zhou. Forward Secure Attribute-Based Signature. Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), volume 7618/2012 of Lecture Notes in Computer Science, pages 167-177, Springer (2012)
  83. Yang Wang, Man Ho Au and Willy Susilo. Perfect Ambiguous Optimistic Fair Exchange. Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), volume 7618/2012 of Lecture Notes in Computer Science, pages 142-153, Springer (2012)
  84. Yunmei Zhang, Joseph Liu, Xinyi Huang, Man Ho Au and Willy Susilo. Efficient Escrow-Free Identity-Based Signature. Proceedings of the 6th International Conference on Provable Security (ProvSec 2012), volume 7496/2012 of Lecture Notes in Computer Science, pages 161-174, Springer (2012)
  85. Joseph Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Enhancing Location Privacy for Electric Vehicles (at the right time). Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), volume 7459/2012 of Lecture Notes in Computer Science, pages 397-414, Springer (2012)
  86. Man Ho Au, Willy Susilo and Yi Mu. Electronic Cash with Anonymous User Suspension. Proceedings of the 16th Australasian Conference on Information Security and Privacy (ACISP 2011), volume 6812/2011 of Lecture Notes in Computer Science, pages 172-188, Springer (2011)
  87. Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au and Jun Yan. Privacy-Preserved Access Control for Cloud Computing. Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
  88. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Threshold Ring Signature without Random Oracles. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pages 261-267, ACM (2011)
  89. Sherman S. M. Chow, Man Ho Au and Willy Susilo. Server-Aided Signatures Verification Secure against Collusion Attack. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pages 401-405, ACM (2011) [Short Paper]
  90. Man Ho Au, Willy Susilo and Yi Mu. Proof-of-Knowledge of Representation of Committed Value and Its Applications. Proceedings of the 15th Australasian Conference on Information Security and Privacy (ACISP 2010), volume 6168/2010 of Lecture Notes in Computer Science, pages 352-369, Springer (2010)
  91. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie and Kui Ren. Attribute-Based Signature and Its Applications. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pages 60-69, ACM (2010)
  92. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010), volume 6345/2010 of Lecture Notes in Computer Science, pages 168-181, Springer (2010)
  93. Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung and Siu-Ming Yiu. Oblivious Transfer with Access Control: Realizing Disjunction without Duplication. Proceedings of the 4th International Conference on Pairing-Based Cryptography (PAIRING 2010), volume 6487/2010 of Lecture Notes in Computer Science, pages 96-115, Springer (2010)
  94. Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo and Duncan S. Wong. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). Proceedings of the 4th International Conference on Provable Security (ProvSec 2010), volume 6402/2010 of Lecture Notes in Computer Science, pages 166-183, Springer (2010)
  95. Man Ho Au, Patrick P. Tsang, Willy Susilo and Yi Mu. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Proceedings of Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009 (CT-RSA 2009), volume 5473/2009 of Lecture Notes in Computer Science, pages 295-308, Springer (2009)
  96. Man Ho Au, Willy Susilo and Yi Mu. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? Proceedings of the 3th International Conference on Provable Security (ProvSec 2009), volume 5848/2009 of Lecture Notes in Computer Science, pages 129-139, Springer (2009)
  97. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Online/Offline Ring Signature Scheme. Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009), volume 5927/2009 of Lecture Notes in Computer Science, pages 80-90, Springer (2009)
  98. Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu and Duncan Wong. Escrowed Deniable Identification Schemes. Proceedings of the International Conference on Security Technology (SecTech 2009), volume 58 of Communications in Computer and Information Science, pages 234-241, Springer (2009)
  99. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong and Guomin Yang. Traceable and Retrievable Identity-Based Encryption. Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), volume 5037/2008 of Lecture Notes in Computer Science, pages 94-110, Springer (2008)
  100. Man Ho Au, Willy Susilo and Yi Mu. Practical Anonymous Divisible E-Cash from Bounded Accumulators. Proceedings of the 12th International Conference on Financial Cryptography and Data Security (FC 2008), volume 5143/2008 of Lecture Notes in Computer Science, pages 287-301, Springer (2008)
  101. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. Proceedings of the 15th ACM conference on Computer and communications security (ACM CCS 2008), pages 333-344, ACM (2008) [Runner-up for PET Award 2009: Outstanding Research in Privacy Enhancing Technologies (pet award)]
  102. Man Ho Au, Willy Susilo and Yi Mu. Practical Compact E-Cash. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP 2007), volume 4586/2007 of Lecture Notes in Computer Science, pages 431-445, Springer (2007)
  103. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Certificate Based (Linkable) Ring Signature. Proceedings of the 3th International Conference on Information Security Practice and Experience (ISPEC 2007), volume 4464/2007 of Lecture Notes in Computer Science, pages 79-92, Springer (2007)
  104. Man Ho Au, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu and Guomin Yang. Malicious KGC Attacks in Certificateless Cryptography. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pages 302-311, ACM (2007)
  105. Joseph K. Liu, Man Ho Au and Willy Susilo. Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model: Extended Abstract. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pages 373-383, ACM (2007)
  106. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs. Proceedings of the 14th ACM conference on Computer and communications security (ACM CCS 2007), pages 72-81, ACM (2007) [Runner-up for PET Award 2009: Outstanding Research in Privacy Enhancing Technologies (pet award)]
  107. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu and Willy Susilo. (Convertible) Undeniable Signatures without Random Oracles. Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007), volume 4861/2008 of Lecture Notes in Computer Science, pages 83-97, Springer (2008)
  108. Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu. Compact E-Cash from Bounded Accumulator. Proceedings of Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007 (CT-RSA 2007), volume 4377/2006 of Lecture Notes in Computer Science, pages 178-195, Springer (2006)
  109. Man Ho Au, Willy Susilo and Siu-Ming Yiu. Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP 2006), volume 4058/2006 of Lecture Notes in Computer Science, pages 223-234, Springer (2006)
  110. Man Ho Au, Sherman S. M. Chow, Willy Susilo and Patrick P. Tsang. Short Linkable Ring Signatures Revisited. Proceedings of the 3rd European PKI Workshop: Theory and Practice (EuroPKI 2006), volume 4043/2006 of Lecture Notes in Computer Science, pages 101-115, Springer (2006)
  111. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. Proceedings of Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India (INDOCRYPT 2006), volume 4329/2006 of Lecture Notes in Computer Science, pages 364-378, Springer (2006)
  112. Man Ho Au, Joseph K. Liu, Tsz Hon Yuen and Duncan S. Wong. ID-Based Ring Signature Scheme Secure in the Standard Model. Proceedings of Advances in Information and Computer Security, 1st International Workshop on Security (IWSEC 2006), volume 4266/2006 of Lecture Notes in Computer Science, pages 1-16, Springer (2006) Remark: There is a flaw in the security proof which leads to an attack, see footnote 2 of this manuscript. Thanks Anna Lisa Ferrara for the communication of their findings. For a secure ID-based ring signature in the standard model, interested readers may refer to our result in 2013 [Au et al., Realizing Fully Secure Unrestricted ID-based Ring Signature in the Standard Model Based on HIBE in IEEE TIFS 8(12): 1909-1922 (2013)]
  113. Man Ho Au, Willy Susilo and Yi Mu. Constant-Size Dynamic k-TAA. Proceedings of the 5th International Conference on Security and Cryptography for Networks (SCN 2006), volume 4116/2006 of Lecture Notes in Computer Science, pages 111-125, Springer (2006)
  114. Man Ho Au, Sherman S. M. Chow and Willy Susilo. Short E-Cash. Proceedings of Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India (INDOCRYPT 2005), volume 3797/2006 of Lecture Notes in Computer Science, pages 332-346, Springer (2005)
  115. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu and Duncan S. Wong. Separable Linkable Threshold Ring Signatures. Proceedings of Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India (INDOCRYPT 2004), volume 3348/2004 of Lecture Notes in Computer Science, pages 384-398, Springer (2004)

Recent Research Grants (as PI)