(aside image)

Kaitai Liang

Ph.D., Post-doctoral Researcher

Office:
Room T-B251 in Computer Science Building,
Konemiehentie 2, Otaniemi campus area, Espoo

Postal Address:
Aalto University, School of Science and Technology,
Department of Computer Science,
P.O. Box 15400, FI-00076 Aalto, Finland

Telephone:
+358 50 430 1157

Email:
kaitai(dot)liang(at)aalto(dot)fi

Sincerely thanks all the excellent workmates (Celine and Kimmo) and my supervisor (Kaisa) for strongly supporting me over the past two years! All the best! Kiitos, kaikki parhaat!


About me

Stay hungry, stay foolish, and never be afraid of stepping into the unknown.

I am currently a Post-doctoral researcher at Department of Computer Science, Aalto university in Finland. I work in the cryptographic team supervised by Prof. Kaisa Nyberg. I had my Ph.D. degree in August 2014 at Department of Computer Science, City University of Hong Kong under the supervision of Dr. Duncan Wong.

Research Interest

Cybersecurity, privacy and security in information technology; in particular, cloud security, big data security, genomic privacy, privacy enhancing technology, cryptocurrencies, blockchain, privacy in internet of things, and lightweight secure systems. Currently, I am interested in bringing back security and privacy to big data analysis, and exploring secure blockchain technology in other commercial/business scenarios. In addition, I am also interested in some crazy projects or ideas, such as self-learning/developing/recovering cryptosystem. If you have any crazy idea, please feel free to contact me.

Wordle

Curriculum vitae

CV.

For updated CV, please feel free to email me.

Some of My Publications

Note that there might be some differences between the original version and the submitted version of the papers. All my publications are in the fields of computer and information science/engineering and technology (based on the classification in Finnish Publication Guidline - http://www.tsv.fi/julkaisufoorumi/haku.php?lang=en).


Journal

  • A Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Public Clouds, Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo, Concurrency and Computation: Practice and Experience 27(8): 2004-2027, 2015 [PDF]

  • Privacy Concerns for Photo Sharing in Online Social Networks, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Duncan S. Wong, IEEE Internet Computing 19(2): 58-63, 2015 [PDF]

  • Secure Sharing and Searching for Real-Time Video Data in Mobile Cloud, Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan, IEEE Network 29(2): 46-50, 2015 [PDF]

  • Cost-Effective Authentic and Anonymous Data Sharing with Forward Security, Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou, IEEE Trans. Computers 64(4): 971-983, 2015 [PDF]

  • Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage, Kaitai Liang, Willy Susilo, Joseph K. Liu, IEEE Transactions on Information Forensics and Security 10(8): 1578-1589, 2015 [PDF]

  • Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage, Kaitai Liang, Willy Susilo, IEEE Transactions on Information Forensics and Security 10(9): 1981-1992, 2015 [PDF]

  • Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption, Kaitai Liang, Willy Susilo, Joseph K. Liu, Duncan S. Wong, Comput. J. 58(10): 2778-2792, 2015 [PDF]

  • Chosen-Ciphertext Secure Multi-Hop Identity-Based Conditional Proxy Re-Encryption with Constant-Size Ciphertexts, Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang and Jianying Zhou, Theor. Comput. Sci. 539: 87-105, 2014 [PDF]

  • A DFA-based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing, Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Xuan Phuong Tran and Qi Xie, IEEE Transactions on Information Forensics and Security 9(10): 1667-1680, 2014 [PDF]


  • Conference

  • Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data, Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou, ESORICS (2) 2015: 146-166 , 2015 [PDF| Best research paper award.]

  • An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing, Kaitai Liang, Joseph K. Liu, Duncan S. Wong and Willy Susilo, ESORICS (1) 2014: 257-272 , 2014 [PDF]

  • An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing, Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, ISPEC 2014: 448-461, 2014 [PDF]

  • RCCA-Secure Multi-use Bidirectional Proxy Re-Encryption with Master Secret Security, Rongxing Lu, Xiaodong Lin, Jun Shao, and Kaitai Liang, ProvSec, ProvSec 2014: 194-205 [PDF]

  • Publications in DBLP


    DBLP


    Government/Industrial Projects Involved as Key Member

    • Privacy-aware retrieval and modelling of genomic data (PRIGENDA), Academy of Finland (No. 13283250), Finland.
    • Secure Data Sharing in Cloud Computing Environment, Institute for Infocomm Research, A*STAR, Singapore.
    • Practical Unified Framework for Secure E-Consent Mechanism for Health Records, Australian Research Council Linkage Project (No. LP120200052), Australia.
    • On the Theory and Application of Attribute-Based Cryptography, Research Grants Council of Hong Kong (No. 123511).
    • Secure and Efficient Optimistic Fair Exchange Protocols, National Natural Science Foundation of China (No. 61103232), China.
    • Secure Multiparty Computational Geometry, National Natural Science Foundation of China (No. 60973134), China.
    • Key Management based on Biometric Data, National Natural Science Foundation of China (No. 60773175), China.
    • Sensitive Information Protection in Trusted Network, Foundation of National Laboratory for Modern Communications (No. 9140C1108020906), China.

    Awards and Grants

    • Post-doc researcher funding, PI, Academic of Finland , acceptance rate~11%, 2016.
    • Austrian researcher career grant (interview grant), 2016.
    • Short Term Visit Fund, Europe COST Action Association, September to November 2015.
    • ESORICS best research paper, 2015.
    • Research Activities Fund , City University of Hong Kong, Hong Kong, June to December 2013.
    • Certificate of Merit in the Teaching Students: Fist Steps Course, City University of Hong Kong, Hong Kong, March 2013.
    • Conference Grant (ICISC 2012), City University of Hong Kong, Hong Kong, November 2012.
    • PhD scholarship, City University of Hong Kong, Hong Kong, September 2011-August 2014.

    Teaching

    2015

    • T-79.4502 Cryptography and Data SEcurity, Aalto University, Finland.

    2012-2013

    • CS1302 Introduction to Computer Programing, City University of Hong Kong.

    2011-2012

    • CS3342 Software Design, City University of Hong Kong.
    • CS3391 Advanced Programming, City University of Hong Kong.

    Professional Experience

    Academic Visiting/Internship

  • COSIC KU LEUVEN, Security group of Sapienza Rome, privacy group of University College London, Institute for Infocomm Research, University of Wollongong
  • Talks/Seminar on security, privacy aspects

    (unorganized yet).
  • COSIC KU LEUVEN, Newcastle University, University of Birmingham, City University of Hong Kong, Nanyang Technological University, Singapore Management University, Japan Advanced Institute of Science and Technology, Sapienza University of Rome, Austrian Institute of Technology, genomic privacy@Dagstuhl, University of Oulu
  • Program Committee

  • IEEE TrustCom 2015/2016
  • 1st International Workshop on Cyber Security (CS-2015)
  • ACM ASIACCS 2016, Publication Chair
  • NSS 2016
  • ACISP 2016, Publication Chair
  • Provsec 2016
  • Reviewer/Sub-reviewer

  • ACM TISSEC, IEEE TIFS, TC, TDSC; Information Science; IJIS; SCN; CCPE; PMC; Design, Codes and Cryptography
  • ASIACCS (2012/2013/2014/2015); ASIACRYPT (2014); ACISP (2013/2014/2015/2016); ACNS (2012/2013/2014); CSF (2015); EUROCRYPT (2012/2016); SOFSEM (2015); TrustCom (2015/2016); ProvSec (2014);


  • THANKS ERIKA C. FOR LOVING AND SUPPORTING ME REGARDLESS.