Liqun Chen

Liqun Chen

Principal Research Scientist, Bristol, UK

Biography

I am a principal research scientist at HP LabsSecurity and Cloud Laboratory in Bristol, the UK. Prior to joining HP Labs in 1997, I worked at Royal Holloway, University of London, University of Oxford, and Southeast University. 
 
I received my B.Sc, M.Sc and Ph.D in Information Science and Engineering from Southeast University, P.R.China.
 
I am a visiting professor in the College of Computer Science, Beijing University of Technology.


Professional activities

I am currently serving as

  • associate editor of IEEE Transactions on Information Forensics and Security 
  • member of the editorial board of the International Journal of Information Security
  • member of the editorial board of the Computer Journal
  • deputy chairman of Technical Sub-Committee 2 of BSI IST/33, which deals with security mechanisms and provides input to ISO/IEC JTC1/SC27
  • UK Expert in ISO/IEC JTC1/SC27
  • co-editor with Pil Joong Lee, ISO/IEC 14888-3 (revision)
  • member of Industrial Advisory Board, Cryptography Group, University of Bristol

This year (2015), I am involved in the following conference

as a program committee co-chair

  • SSR 2015, program committee co-chair with Shin'ichiro Matsuo

as a program committee member

My previous activities include

I have served as an external examiner in assessing PhD theses for the following universities

  • University of Bath, UK
  • University of Birmingham, UK 
  • University of Bristol, UK
  • Graz University of Technology, Austria
  • Queensland University of Technology, Australia
  • University of Wollongong, Australia

I have edited several ISO/IEC standard documents

I have served in several journals as

I have spent enjoyable time at several universities as

  1. Third Generation Mobile Telecommunications Systems Security Studies (3GS3), the DTI/EPSRC LINK project funded by the UK EPSRC under research grant GR/J17173;
  2. Advanced Security for Personal Communications Technologies (ASPeCT), the European Commission under ACTS programme project AC095. 
  • visitor and searcher in Department of Engineering Science, Oxford University 
  • lecturer in School of Information Science and Engineering, Southeast University

I have been involved in conference organizations 

as program (co-)chair 

as program committee member of      

I have also contributed to   

  • TCG: Contributed to multiple cryptographic protocols in the trusted computing technology, and the major contribution is design of a special digital signature scheme titled "Direct Anonymous Attestation (DAA)", which allows a computing platform to communicate with other computing platforms in a trust and privacy manner. Working with E. Brickell and J. Camenisch, we designed the first DAA scheme that was specified in TCG TPM Version 1.2, and this specification was later adopted by ISO/IEC as an international standard (ISO/IEC 11889). This work has drawn a lot of attentions by both academics and industry; for example, it was introduced in Grossman's article, "Anonymous trust: making trusted computer work with privacy", in Scientific American (August 2004), and the paper of Direct Anonymous Attestation in ACM CCS 2004 has been well-cited and won the ACM CCS 2014 Test of Time Award. After that, working with several colleagues, including J. Li, we have developed a number of more efficient DAA schemes, some of which have been adapted by TCG and specified in TPM version 2.0, and have also been adopted by ISO/IEC (in ISO/IEC 20008-2).
  • IEEE P1363: The following two works have contributed to IEEE P1363.3 and are available at IEEE P1363.3 web site
  1. M. Barbosa, L. Chen, Z. Cheng, M. Chimley, A. Dent, P. Farshim, K. Harrison, J. Malone-Lee, N.P. Smart and F. Vercauteren. SK-KEM: an identity-based KEM.
  2. L. Chen, Z. Cheng and N.P. Smart. Identity-based key agreement protocols from pairings.


Publications

You can see the google scholar page.

You can find my granted US patents (by clicking here) and published US patent applications (by clicking here) from http://patft.uspto.gov/. All of these patents and patent applications are assigned to Hewlett-Packard.

Here is a list of selected books/papers:

Books/Edited Books/Book Chapters

  • L. Chen and S. Matsuo (eds.), Security Standardisation Research (Proc. SSR 2015), Springer LNCS 9497, 2015.
  • G. Proudler, L. Chen and C. Dalton. Trusted Computing Platforms – TPM2 in Context. Springer, 2014.
  • L. Chen and C. Mitchell (eds.), Security Standardisation Research (Proc. SSR 2014), Springer LNCS 8893.
  • L. Chen, M. Yung and L. Zhu (eds.), Trusted Systems (Proc. INTRUST 2011), Springer LNCS 7222, 2012.
  • L. Chen (ed.), Cryptography and Coding (Proc. Cryptography and Coding 2011), Springer LNCS 7089, 2011.
  • L. Chen and M. Yung (eds.), Trusted Systems (Proc. INTRUST 2010), Springer LNCS 6802, 2011.
  • L. Chen and M. Yung (eds.), Trusted Systems (Proc. INTRUST 2009), Springer LNCS 6163, 2010.
  • L. Chen, C.J. Mitchell and A. Martin (eds.), Trusted Computing (Proc. Trust 2009), Springer LNCS 5471, 2009.
  • L. Chen, M. Ryan and G. Wang (eds.), Information and Communication Security (Proc. ICICS 2008), Springer LNCS 5308, 2008.
  • L. Chen, Y. Mu and W. Susilo (eds.), Information Security Practice and Experience (Proc. ISPEC 2008), Springer LNCS 4991, 2008.
  • E. Brickell, J. Camenisch and L. Chen. Direct anonymous attestation in context. Chapter 5 of Trusted Computing, pp. 143-174, edited by C. Mitchell, IEE, London, 2005.
  • B. Balacheff, L. Chen, S. Pearson, D. Plaquin and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, 2003.  
  • C. J. Mitchell and L. Chen. Security in future mobile multimedia networks. Chapter 11 of Insights into Mobile Multimedia Communications, pp. 177-190, edited by D. R. Bull, C. N. Canagarajah and A. R. Nix, Academic Press, 1998. 

Refereed Journal Articles

  • B. Smyth, M. Ryan and L. Chen. Formal analysis of privacy in direct anonymous attestation schemes. Science of Computer Programming (November 1, 2015), 111(P2):300-317.
  • J. Y. Hwang, L. Chen, H. S. Cho and D. Nyang. Short dynamic group signature scheme supporting controllable linkability. IEEE transactions on Information Forensics and Security, (June 2015), 10(6):1109-1124.
  • L. Chen, H.W. Lim and G. Yang. Cross-domain password-based authenticated key exchange revisited. ACM Transactions on Information and System Security (April 2014), 16(4), Article no. 15.
  • Z. Chen, J. Wang, L. Chen and X. Song. Review of how to construct a fully homomorphic encryption scheme. International Journal of Security and Its Applications (March 2014), 8(2), 221-230.
  • Z. Chen, J. Wang, L. Chen and X. Song. A Regev-type fully homomorphic encryption scheme using modulus switching. Scientific World Journal (June 25, 2014), 2014, Article no. 983862.
  • M. Beiter, M. Casassa Mont, L. Chen, S. Pearson. End-to-end policy based encryption techniques for multi-party data management. Computer Standards and Interfaces, ISI Journal Citation Reports, North Holland, D.G. Rosado (ed.), December 2013.
  • Y. Chen, L.Chen, D.Lin. Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme. Science China: Mathematics (July 2013), 56(7):1385-1401.
  • L. Chen and Y. Chen. The n-Diffie-Hellman problem and multiple-key encryption. International Journal of Information Security, Volume 11, Issue 5 (2012), Page 305-320.
  • L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. The International Journal of Information Privacy, Security and Integrity (IJIPSI 1(2/3): 129-159 (2012))
  • Q. Tang and L. Chen. Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111(15):744–747, 2011.
  • L. Chen, S.-L. Ng and G. Wang. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Communications and Networks, 29(3):605–615, March 2011.
  • L. Chen and S.-L. Ng. Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al. IEEE Transactions on Vehicular Technology, 59(3):1503–1505, 2010.
  • L. Chen and J. Li. A note on the Chen-Morrissey-Smart direct anonymous attestation scheme. Information Processing Letters, 110(12-13):485–488, 2010.
  • L. Chen and C. Mitchell. Parsing ambiguities in authentication and key establishment protocols. International Journal of Electronic Security and Digital Forensics, 3(1):82–94, 2010.
  • E. Brickell, L. Chen and J. Li, Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. International Journal of Information Security, 8(5):315–330, 2009.
  • G. Bertoni, L. Breveglieri, L. Chen, P. Fragneto, K. A. Harrison and G. Pelosi: A pairing SW implementation for smart-cards. Journal of Systems and Software, 81(7): 1240–1247, 2008.
  • L. Chen and Q. Tang. Bilateral unknown key-share attacks in key agreement protocols. Journal of Universal Computer Science, 14(3):416–440, 2008.
  • L. Chen, Z. Cheng and N. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213–241, 2007.
  • Z. Cheng and L. Chen. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2(3/4):251–259, 2007.
  • L. Chen, Z. Cheng, J. Malone-Lee and N. Smart. Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings Information Security, 153(1):19–26, 2006.
  • B. Balacheff, L. Chen, S. Pearson, G. Proudler and D. Chan. Computing platform security in cyberspace. Elsevier Information Security Technical Report, 5(1):54–63, 2000.
  • L. Chen, D. Gollmann and C. Mitchell. Distributing trust amongst multiple authentication servers. Journal of Computer Security, 3(4):255–267, 1994/95.
  • B. Wu and L. Chen. Cipher rolling in the speech scrambling system requiring no frame synchronization. Journal of Southeast University, 21(5):1–8, 1991.
  • L. Chen and B. Wu. Generation of T and T-1 matrices for a speech scrambling system without frame synchronization. Communication security, 44(4):1–5, 1990.

Refereed Conference Papers

  • M. Urquidi, J. Lancrenon, D. Khader and L. Chen. Attribute-based signatures with controllable linkability. Appear at InTrust 2015.
  • L. Chen and R. Urian. DAA-A: Direct anonymous attestation with attributes. TRUST 2015: 8th International Conference on Trust and Trustworthy Computing, August 24-26, 2015, Heraklion, Greece, Lecture Notes in Computer Science 9229, pp. 228-245, Springer 2015.
  • Y. Xun, F. Hao, L. Chen and J. K. Liu. Practical threshold password-authenticated secret sharing protocol. ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, pp. 347-365, Springer 2015.
  • S. Zhang, X. Zhang, X. Ou, L. Chen, N. Edwards and J. Jin. Assessing attack surface with component-based package dependency. In Proc. 9th International Conference on Network and System Security (NSS 2015), LNCS 9408, pp. 405-417, Springer, 2015.
  • G. S. Grewal, M. D. Ryan, L. Chen and M. R. Clarkson. Du-Vote: Remote electronic voting with untrusted computers. IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015. pp. 155-169.
  • F. Hao, X. Yi, L. Chen and S. Shahandashti. The fairy-ring dance: password authenticated key exchange in a group. IoTPTS 2015: 1st ACM Workshop on IoT Privacy, Trust, and Security, In conjunction with ASIACCS 2015, April 14, 2015, Singapore, pp. 27-34.
  • A. El Kaafarani, L. Chen, E. Ghadafi and J. Davenport. Attribute Based Signatures with User-Controlled Linkability. In Proc. 13th International Conference on Cryptography and Network Security (CANS 2014), LNCS 8813, pp. 256-269, Springer 2014.
  • J. Liu, M. Ryan and L. Chen. Balancing societal security and individual privacy: accountable escrow system. In Proc. 27th Computer Security Foundations Symposium (CSF-27), pp. 427-440, IEEE 2014.
  • C. Dong and L. Chen. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. In Proc. 19th European Symposium on Research in Computer Security (ESORICS 2014), Part 1, LNCS 8712, pp. 380-399, Springer, 2014.
  • C. Dong and L. Chen. A fast secure dot product protocol with application to privacy preserving association rule mining. In Proc. 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2014), LNCS 8443, pp. 606-617, Springer, 2014.
  • L. Chen and J. Li. Flexible and scalable digital signatures in TPM 2.0. In Proc. 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 37-48.
  • L. Chen, Q. Li, K. M. Martin and S.-L. Ng. A privacy-aware reputation-based announcement scheme for VANETs. In Proc. 5th International Symposium on Wireless Vehicular Communications (IEEE WiVeC 2013).
  • L. Chen, H.W. Lim and G. Yang. Cross-domain password-based authenticated key exchange revisited. In Proc. IEEE INFOCOM 2013: 32nd IEEE International Conference on Computer Communications, April 14-19, 2013, Turin, Italy, 1052-1060. DOI: 10.1109/INFCOM.2013.6566895
  • C. Dong, L. Chen and Z. Wen. When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. In Proc. 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 789-800.
  • C. Dong, L. Chen, J. Camenisch and G. Russello. Fair private set intersection with a semi-trusted arbiter. In Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '13), LNCS 7964, pp. 128-144.
  • K. Potzmader, J. Winter, D. Hein, C. Hanser, P. Teufl and L. Chen. Group signatures on mobile devices: Practical experiences. In Proc. 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), LNCS 7904, pp. 47-64.
  • E. Brickell, L. Chen and J. Li. A static Diffie-Hellman attack on several direct anonymous attestation schemes. In Proc. 4th International Conference on Trusted Systems (InTrust 2012), LNCS 7711. Springer 2012. (Best Paper Award)
  • L. Chen. Ring group signatures. In Proc. 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), pp. 409-418.
  • E. Brickell, L. Chen and J. Li. A (corrected) DAA scheme using batch proof and verification. In Proc. INTRUST 2011, LNCS 7222, pp.304–337, Springer, 2012.
  • N. Edwards and L. Chen. An historical examination of open source releases and their vulnerabilities. In Proc. 19th ACM Conference on Computer and Communications Security (ACM CCS 2012), pp. 183-194.
  • Y. Chen, L. Chen and Z. Zhang. CCA secure IBE from computational bilinear Diffie-Hellman assumption in the standard model. In Proc. 14th International Conference on Information Security and Cryptology (ICISC 2011).
  • G. Kounga and L. Chen. Enforcing sticky policies with TPM and virtualization technologies. In Proc. INTRUST 2011, LNCS 7222, pp. 32–47, Springer, 2012.
  • L. Chen, M. Lee and B. Warinschi. Security of the enhanced TCG privacy-CA solution. In Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2011).
  • L. Chen and Y. Chen. The n-Diffie-Hellman problem and its applications. In Proc. 14th Information Security Conference (ISC 2011). LNCS 7001, pp 119-134, Springer, 2011.
  • S. Pearson, M. Casassa Mont, L. Chen and A. Reed. End-to-end policy-based encryption and management of data in the cloud. In Proc. IEEE CloudCom, pp. 764-771, 2011.
  • Y. Chen, L. Chen and Z. Chen. Generic methods to achieve tighter security reductions for a category of IBE schemes. In Proc. 7th Information Security Practice and Experience Conference (ISPEC 2011), Springer LNCS 6672, pp. 40–54, 2011.
  • H. Balinsky, L. Chen and S. Simske. Premature silent workflow termination in publicly posted composite documents. In IEEE International conference on Systems, Man and Cybernetics (SMC 2011).
  • H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents with identity based encryption. In Proc. 11th ACM Symposium on Document Engineering (DocEng 2011), pp. 239-248, 2011.
  • Y. Chen, L. Chen and Z. Zhang. CCA secure IBE from computational bilinear Diffie-Hellman assumption in the standard model. In Proc. 14th International Conference on Information Security and Cryptology (ICISC 2011).
  • H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents in variably ordered workflows. In Proc. 7th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2011).
  • B. Smyth, M. Ryan and L. Chen. Formal analysis of anonymity in Direct Anonymous Attestation schemes. In Proc. 8th International Workshop on Formal Aspects of Security & Trust (FAST 2011). Formal Aspects in Security and Trust 2011: 245-262.
  • Y. Chen and L. Chen. The twin bilinear Diffie-Hellman inversion problem and applications. In Proc. 13th Annual International Conference on Information Security and Cryptology (ICISC 2010).
  • L. Chen and J. Li. Revocation of direct anonymous attestation. In Proc. INTRUST 2010, LNCS 6802, Volume 6802, Trusted Systems, Pages 128-147
  • L. Chen and B. Warinschi. Security of the TCG privacy-CA solution. In Proc. 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010).
  • L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. In Proc. 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), pp. 727–734, IEEE Computer Society Press, 2010. (Best Paper Award)
  • C. Wachsmann, A.Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight anonymous authentication with TLS and DAA for embedded mobile devices. In Proc. 13th Information Security Conference (ISC 2010).
  • F. Armknecht, L. Chen, A. Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems. In Proc. 6th Workshop on RFID Security (RFIDSec 2010).
  • L. Chen. A DAA scheme using batch proof and verification. In Proc. 3rd International Conference on Trust (Trust 2010), Springer LNCS 6101, pp. 166–180, 2010.
  • L. Chen, D. Page and N. Smart. On the design and implementation of an efficient DAA scheme. In Proc. 9th Smart Card Research and Advanced Application IFIP Conference (CARDIS 2010), Springer LNCS 6035, pp. 223–237, 2010.
  • S. Cabuk, L. Chen, D. Plaquin and M. Ryan. Trusted integrity measurement and reporting for virtualized platforms. In Proc. International Conference on Trusted Systems (INTRUST 2009), Springer LNCS 6163, pp. 181–197, 2010.
  • L. Chen. A DAA scheme requiring less TPM resources. In Proc. 5th China International Conference on Information Security and Cryptology (Inscrypt 2009), Springer LNCS 6151, pp. 350–365, 2010. The full paper can be found at Cryptology ePrint Archive, Report 2010/008.
  • D. Khader, L. Chen and J. Davenport. Certificate-free attribute authentication. In Proc. 12th IMA International Conference on Cryptography and Coding (IMACC 2009), Springer LNCS 5921, pp. 301–325, 2009.
  • L. Chen and M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. 6th International Workshop on Formal Aspects in Security and Trust (FAST2009).
  • L. Chen, P. Morrissey, N. P. Smart and B. Warinschi. Security notions and generic constructions for client puzzles. In Advances in Cryptology – Asiacrypt 2009, Springer LNCS 5912, pp. 505–523, 2009.
  • Q. Tang and L. Chen. Public-key encryption with registered keyword search. In Proc. 6th European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI'09).
  • H. Balinsky, E. McDonnell, L. Chen and K. Harrison. Anti-counterfeiting using memory spots. In Proc. 3rd Workshop in Information Security Theory and Practices (WISTP'09), Springer LNCS 5746, pp. 52 – 67, 2009.
  • L. Chen and M. Ryan. Offline dictionary attack on TCG TPM weak authorisation data, and solution. In Proc. 1st International conference on the Future of Trust in Computing, pp. 193–196, Teubner, 2009.
  • L. Chen, P. Morrissey and N. P. Smart. On proofs of security for DAA schemes. In Proc. 2nd International Conference on Provable Security (ProvSec 2008), Springer LNCS 5324, pp. 156–175, 2008.
  • L. Chen, H. Löhr, M. Manulis, and A.Sadeghi. Property-based attestation without a trusted third party. In Proc. 11th International Conference on Information Security (ISC 2008), Springer LNCS 5222, pp. 31–46, 2008.
  • L. Chen, P. Morrissey and N.P. Smart. Pairings in trusted computing. In Proc. 2nd International Conference on Pairing-based Cryptography (Pairing 2008), Springer LNCS 5209, PP. 1–17, 2008.
  • A. Leung, L. Chen, and C. J. Mitchell. On a possible privacy flaw in direct anonymous attestation (DAA). In Proc. 1st International Conference on Trust (TRUST 2008), Springer LNCS 4968, pp. 179–190, 2008.
  • E. Brickell, L. Chen and J. Li. A new direct anonymous attestation scheme from bilinear maps. In Proc. 1st International Conference on Trust (TRUST 2008), Springer LNCS 4968, pp. 166–178, 2008.
  • Z. Cheng, L. Chen, L. Ling, R. Comley. General and efficient certificateless public key encryption Constructions. In Proc. First International Conference on Pairing-Based Cryptography (Pairing 2007), Springer LNCS 4575, pp. 83–107, 2007.
  • Y. Mu, D. Wong, L. Chen, W. Susilo and Q. Wu. Concurrent signatures without a conventional keystone. In Proc. 1st International Workshop on Coding and Cryptology, Series on Coding Theory and Cryptology, Vol. 4, World Scientific, 2007.
  • B. Smyth, L. Chen and M. Ryan. Direct Anonymous Attestation (DAA): ensuring privacy with corrupt administrators. In Proc. 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), Springer LNCS 4572, pages 218–231, 2007.
  • L. Chen, A. Escalante, H. Löhr, M. Manulis and A. Sadeghi. A privacy-protecting multi-coupon scheme with stronger protection against splitting. In Proc. 11th International Conference on Financial Cryptography and Data Security (FC 2007), Springer LNCS 4886, pp. 29–44, 2007.
  • L. Chen, H. Lim and W. Mao. User-friendly grid security architecture and protocols. In Proc. 13th International Workshop on Security Protocols. Springer LNCS 4631, pp. 139–156, 2007.
  • L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble. A protocol for property based attestation. In Proc. 1st ACM Workshop on Scalable Trusted Computing (STC'06), pp. 7–17, the ACM Press, 2006.
  • Z. Cheng, L. Chen, R. Comley and Q. Tang. Identity-based key agreement with unilateral identity privacy using pairings. In Proc. 2nd Information Security Practice and Experience Conference (ISPEC 2006), Springer LNCS 3903, pp. 202–213, 2006.
  • L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. In Proc. 10th IMA International Conference on Cryptography and Coding, Springer LNCS 3796, pp. 442–459, 2005.
  • L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M. Steiner. A privacy-protecting coupon system. In Proc. 9th International Conference on Financial Cryptography and Data Security (FC 2005), Springer LNCS 3570, pp. 93–108, 2005.
  • L. Chen and J. Malone-Lee. Improved identity-based signcryption. In Proc. 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2005), Springer LNCS 3386, pp. 362–379, 2005.
  • E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In Proc. 11th ACM Conference on Computer and Communications Security (ACMCCS 2004), pp. 132–145, ACM press, 2004. Security proof is at Cryptology ePrint Archive, Report 2004/205. This paper is received a test of time award at ACMCCS 2014.
  • L. Chen, C. Kudla and K. Paterson. Concurrent signatures. In Advances in Cryptology – EUROCRYPT 2004, Springer LNCS 3027, pp. 287–305, 2004.
  • L. Chen and C. Kudla. Identity based key agreement protocols from pairings. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219–233, IEEE Computer Society Press, 2003.
  • L. Chen, K. Harrison, A. Moss, D. Soldera, and N. Smart. Certification of public keys within an identity based system. In Proc. 5th International Conference on Information Security (ISC 2002), Springer LNCS 2433, pp. 322–333, 2002.
  • L. Chen, K. Harrison, D. Soldera, and N.P. Smart. Applications of multiple trust authorities in pairing based cryptosystems. In Proc. International Conference on Infrastructure Security (InfraSec 2002), Springer LNCS 2437, pp. 260–275, 2002.
  • B. Balacheff, L. Chen, D. Plaquin and G. Proudler. A trusted process to digitally sign a document. In Proc. New Security Paradigms Workshop (NSPW'01), pp. 79–86, ACM Press 2001.
  • L. Chen and W. Mao. An auditable metering scheme for web advertisement applications. In Proc. 4th International Conference on Information Security (ISC 2001), Springer LNCS 2200, pp. 475–485, 2001.
  • B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. Securing intelligent adjuncts using trusted computing platform technology. In Proc. 4th Working Conference on Smart Card Research and Advanced Applications, pp. 177–195, Kluwer Academic Publishers, 2000.
  • B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. How can you trust a computing platform? In Proc. Information Security Solutions Europe Conference (ISSE 2000), Spain, 2000.
  • L. Chen, S. Pearson and A. Vamvakas. On enhancing biometric authentication with data protection. In Proc. 4th International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies (KES 2000), pp. 249–252, IEEE press, 2000.
  • L. Chen. Efficient fair exchange with verifiable confirmation of signatures. In Advances in Cryptology – Asiacrypt'98, Springer LNCS 1514, pp. 286–299, 1998.
  • L. Chen, D. Gollmann and C.J. Mitchell. Key escrow in mutually mistrusting domains. In Proc. International Workshop on Security Protocols, Springer LNCS 1189, pp.139–153, 1997.
  • L. Chen and C.J. Mitchell. Key escrow in multiple domains. In Proc. International Congress on Information Systems and Telecommunications Security (INFOSEC'COM '97), pp.101–116, MCI Paris, 1997.
  • L. Chen, D. Gollmann, C.J. Mitchell and P. Wild. Secret sharing with reusable polynomials. In Proc. 2nd Australasian Conference on Information Security and Privacy (ACISP'97), Springer LNCS 1270, pp. 183–193, 1997.
  • L. Chen and C.J. Mitchell. An anonymous and undeniable payment scheme. In Proc. 1st International Conference on Information and Communications Security (ICICS'97), Springer LNCS 1334, pp. 478–482, 1997.
  • L. Chen, D. Gollmann and C.J. Mitchell. Tailoring authentication protocols to match underlying mechanisms. In Proc. 1st Australasian Conference on Information Security and Privacy (ACISP'96), Springer LNCS 1172, pp. 121–133, 1996.
  • L. Chen, H.-J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J. Mitchell and C. Radu. The use of trusted third parties and secure billing in UMTS. In Proc. 1st ACTS Mobile Communications Summit, Volume 2, pp. 493–499, Spain, 1996.
  • L. Chen, D. Gollmann and C.J. Mitchell. Key distribution without individual trusted authentication servers. In Proc. 8th IEEE Computer Security Foundations Workshop (CSFW'95), pp. 30–36, IEEE Computer Society Press 1995.
  • L. Chen and D. Edwards. Applications of non-uniform sampling techniques and fast Fourier transform in plane near-field antenna measurements. In Proc. 8th International Conference on Antennas and Propagation, IEE Conference Publication Number 370, pp. 1.311–1.314, IEE London, 1993.
  • L. Chen and B. Wu. An asynchronous speech scrambling using the fast number-theoretic transform technique. In Proc. 1st International Conference on Communication Systems (ICCS '88), pp. 10.9.1–10.9.5, IEEE Press, 1988.
  • L. Chen and B. Wu. Short-time Fourier transform and an asynchronous speech scrambler. In Proc. 3rd West Pacific Conference on Acoustics (WESTPAC III), pp. 723–726, 1988.

Other Publications

  • L. Chen. An interpretation of identity-based cryptography (invited paper). In Foundations of Security Analysis and Design IV, FOSAD 2006/2007, Springer LNCS 4677, pp. 183–208, 2007.
  • L. Chen, D. Gollmann and C.J. Mitchell. Authentication using minimally trusted servers. ACM Operating Systems Review, 31(3):16–28, 1997.
  • C. J. Mitchell and L. Chen. Comments on the S/KEY user authentication scheme. ACM Operating Systems Review, 30(4):12–16, 1996.
  • L. Chen. Study of an asynchronous speech scrambling system. PhD Thesis. Southeast University, P. R. China, 1988.


Awards

  • Test of time award: the ward received at the 21st ACM Conference on Computer and Communications Security (CCS 2014) for the paper "direct anonymous attestation" originally published at CCS 2004
  • Best paper award: International Conference on Trusted Systems (InTrust 2012)
  • Best paper award: IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010)


Patents

57