Publications

At SCRIPTS, we have research focus in privacy-preserving technologies and bring together a team of active researchers with a range of expertise.

Selected Publications

Lets Stride Blindfolded in a Forest Sublinear Multi-Client Decision Trees Evaluation
Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S.M. Chow, NDSS Symposium, 2021

Secure hot path crowdsourcing with local differential privacy under fog computing architecture
Meng Meng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Jun Zhao, Lin Sun, IEEE Transactions on Services Computing, 26 Dec 2020

Local Differential Privacy based Federated Learning for Internet of Things
Yang Zhao, Jun Zhao, Meng Meng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam, IEEE Internet of Things Journal,19 Apr 2020

Lower Bounds for Total Storage of Multiset Combinatorial Batch Codes Using Linear Programming
Yeow Meng Chee, Han Mao Kiah, Hui Zhang, IEEE Transactions on Information Theory, 26 September 2019

Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation
X. Yi, K.Y. Lam, E. Bertino and F.Y. Rao, The 24th European Symposium on Research in Computer Security (ESORICS 2019), 23-27 September, 2019, Luxembourg

Beyond the Power of Mere Repetition: Forms of Social Communication on Twitter through the Lens of Information Flows and Its Effect on Topic Evolution
Y.W. Zhao, C. Wang, C.H. Chi, W-J. van den Heuvel, K.Y. Lam and S. Min., The 2019 International Joint Conference on Neural Networks (IJCNN), July 14-19, 2019, Budapest, Hungary

Efficient Threshold Password-Authenticated Secret Sharing Protocols for Cloud Computing 
X. Yi, Z. Tari, F. Hao, L.Q. Chen, J. Liu, K.Y. Lam, X.C., Yang, I. Khalil, A. Zomaya, Journal of Parallel and Distributed Computing, Springer, 15 February 2019

Privacy-Preserving User Profile Matching in Social Networks 
X. Yi, E. Bertino, F.Y. Rao, K.Y. Lam, S. Nepal and A. Bouguettaya., IEEE Transactions on Knowledge and Data Engineering, IEEE, accepted, 2019

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs against Malicious Auditors
Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Hongwei Li, Huaxiong Wang & Yuan Zhang, IEEE Transactions on Cloud Computing, accepted, 2019

Person Re- Identification over Encrypted Outsourced Surveillance Videos
Hang Cheng, Huaxiong Wang, Ximeng Liu, Yan Fang, Meiqing Wang & Xiaojun Zhang, IEEE Transactions on Dependable and Secure Computing, accepted, 2019

Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang & Shixiong Wang, IEEE Transactions on Dependable and Secure Computing, accepted, 2019

Privacy Preserving User based Web Service Recommendations
S.Badsha, X. Yi, I. Khalil, S. Nepal, D. Liu and K.Y. Lam., IEEE Access, IEEE, Volume 6, Issue 1, December, 2018

Fully Homomorphic Encryption over the Integers for Non-Binary Plaintexts
K M M Aung, H T Lee, N H M Tan and H Wang, Theoretical Computer Science, 2018

A Blockchain-Based Application System for Product Anti-Counterfeiting
Jinhua Ma, Shih-Ya Lin, Xin Chen, Hung-Min Sun, Yeh-Cheng Chen, (Graduate Student Member, IEEE) and Huaxiong Wang, IEEE Access, 06 February 2020

X. Yi, K.Y. Lam., The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019), July 7th - 2th, 2019, Auckland, New Zealand

Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu: . IACR Trans. Symmetric Cryptology. 2019(2): 1-54 (2019)

Zhenzhen Bao, Jian Guo, San Ling, Yu Sasaki, IACR Trans. Symmetric Cryptol. 2019(1): 330-394 (2019)

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo, IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019)

Ling Song, Xianrui Qin, Lei Hu, IACR Trans. Symmetric Cryptol. 2019(1): 118-141 (2019)

Jian Guo, Guohong Liao, Guozhen Liu, Meicheng Liu, Kexin Qiao, Ling Song, Journal of Cryptology, 2019

Zhenzhen Bao, Itai Dinur, Jian Guo, Gaetan Leurent, Lei Wang, Journal of Cryptology, 2019

J.L. Guo, W.Z. Yang, K.Y. Lam and X. Yi., The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), December 14-17, 2018, Fuzhou, China, Springer LNCS 11449

Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method
Feng Li, Kwok-Yan Lam, Xin Liu, Li Wang, IEEE Access,16 June 2020

Y. Huang, AWK Kong and K.Y. Lam., The 16th Pacific Rim International Conference on Artificial Intelligence (PRICA 2019), August 26th - 30th 2019, 2019, Yanuca Island, Cuvu, Fiji

FF. Li, K.Y. Lam, K. Zhao, M. Jia, X. Li, L. Wang, IEEE Systems Journal, IEEE, 26 April 2019
 
F. Li, K.Y. Lam, H.W. Chen, N. Zhao, IEEE Wireless Communications, IEEE, accepted, 26 August 2019
 

F. Li, K.Y. Lam, L. Meng and L. Wang, IEEE Access, IEEE, accepted, 26 August 2019

F. Li, K.Y. Lam, J.Y. Hua, K Zhao, N. Zhao, L. Wang, IEEE Wireless Communications Letters, IEEE, 17 January 2019

 

PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model
Meng Meng Yang, Ivan Tjuawinata, Kwok-Yan Lam, Jun Zhao, Lin Sun, IEEE Transactions on Services Computing, 29 April 2020

A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses
Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang & Duncan S. Wong, accepted, ESORICS 2019, 23-27 September

Jun Xu, Santanu Sarkar, Lei Hu, Huaxiong Wang & Yanbin Pan, accepted, Crypto 2019, August 18-22

Benoit Libert, Khoa Nguyen, Benjamin Hong Meng Tan & Huaxiong Wang, PKC 2019, Lecture Notes in Computer Science (11442), 255-285. Springer, 06 April 2019

Shu Liu; Chaoping Xing; Chen Yuan. IEEE Transactions on Information Theory, 14 March 2019

Venkatesan Guruswami; Chaoping Xing; Chen Yuan, IEEE Transactions on Information Theory, 10 January 2019