top of page

Publications

newspaper-folded.png
Hash-based Direct Anonymous Attestation
Published by: The International Association for Cryptologic Research (IACR)
University of Surrey is the partner from ENTRUST that contributed to this paper.

In this paper, we propose the first post-quantum DAA scheme from symmetric primitives. We make use of a hash-based signature scheme, which is a slight modification of SPHINCS+, as a DAA credential.

newspaper-folded.png
Adaptable Runtime Monitoring for Intermittent Systems
Published by: Nineteenth European Conference on Computer Systems (EuroSys 2024)
 
SINTEF and TU Eindhoven are the ENTRUST partners that contributed to this paper.

Batteryless energy harvesting devices compute intermittently due to power failures that frequently interrupt the computational activity and lead to charging delays. In this paper, we present ARTEMIS, the first framework designed to facilitate flexible property checking of intermittent programs at runtime.

newspaper-folded.png
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization
Published by: 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023)
 
SINTEF is the partner from ENTRUST that contributed to this paper.

In this paper, we propose, apply, and assess an automated approach (AutoConf) for configuring unsupervised learning systems using clustering, leveraging metamorphic testing and Bayesian optimization.

newspaper-folded.png
RETRACT: Expressive Designated Verifier Anonymous Credentials
Published by: ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
 
UBITECH is the partner from ENTRUST that contributed to this paper.

In this paper, we propose verifiers defining policies as high-level programs executed by holders on their credentials. We also propose making the proofs designated verifier to prevent the misuse or leakage of sensitive information by dishonest verifiers to any unwanted third party.

newspaper-folded.png
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets
Published by: Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023)
 
UBITECH and University of Surrey are the ENTRUST partners that contributed to this paper.
 

In this paper, we design and showcase DOOR; a library that enables Identity Wallets to leverage hardware Roots-of-Trust (RoT) for binding user authentication factors to HW-based keys, thus, allowing for both proof of (User) identity and (Wallet) integrity, bringing them in alignment with emerging regulations and standards that require higher LoA for services (e.g. eIDAS).

newspaper-folded.png
A Practical Forward-Secure DualRing
Published by: Cryptology and Network Security (CANS 2023)
University of Surrey is the partner from ENTRUST that contributed to this paper.

In this work, we introduce forward-secure DualRing. We present a practical scheme based on the discrete logarithm assumption. We show a detailed evaluation to validate its practicality.

newspaper-folded.png
Towards Community-Driven Generative AI
Published by: Annals of Computer Science and Information Systems, Volume 36
Dautov, Rustem; Husom, Erik Johannes; Sen, Sagar; Song, Hui

This paper discusses how the crowd-souring principles and federated learning techniques together with some other emerging technologies, can be effectively combined to build a community-driven Generative AI ecosystem, allowing even small actors to participate in the training of Generative AI models by securely contributing their training data.

newspaper-folded.png
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting
Published by: ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security
 
University of Surrey is the partner from ENTRUST that contributed to this paper.

Chameleon hash (CH) function differs from a classical hash function in a way that a collision can be found with the knowledge of a trapdoor secret key. CH schemes have been used in various cryptographic applications such as sanitizable signatures and redactable blockchains. In this work, we reconstruct CH to ensure advanced security and usability.

newspaper-folded.png
Raft Protocol for Fault Tolerance and Self-Recovery in Federated Learning
Published by: 19th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS'24)
 
SINTEF is the partner from ENTRUST that contributed to this paper.

To demonstrate the viability of our approach, we present a proof-of-concept implementation based on the existing FL framework Flower. We conduct a series of experiments to measure the aggregator re-election time and traffic overheads associated with the state replication.

newspaper-folded.png
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance
Published by: IEEE Transactions on Industrial Informatics, vol. 20, no. 3, pp. 4940-4952
 
Suhui Liu , Liquan Chen , Senior Member, IEEE, Liqun Chen , Senior Member, IEEE, and Jianchang Lai
 

In this article, we design a meter–fog–cloud-blockchain data-sharing architecture for smart grids where the fog nodes are not only data relay stations but also semitrusted local data processing points, and the dual blockchains are responsible for device key management and data integrity audit, respectively.

newspaper-folded.png
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Published by: International Journal of Information Security
Aristeidis Farao, Georgios Paparis, Sakshyam Panda, Emmanouil Panaousis, Apostolis Zarras & Christos Xenakis
 

In this article, we present INCHAIN, an innovative architecture that utilizes Blockchain technology to provide data transparency and traceability. The backbone of the architecture is complemented by Smart Contracts, which automate cyber insurance processes, and Self-Sovereign Identity for robust identification.

newspaper-folded.png
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumptions
Published by: Cryptology ePrint Archive, Paper 2024/054
Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis

In this paper, we propose novel fast key-policy and ciphertext-policy ABE schemes that (1) support both AND and OR gates for access policies, (2) have no restriction on the size and type of policies or attributes, (3) achieve adaptive security under the standard DLIN assumption, and (4) only need 4 pairings for decryption.

newspaper-folded.png
Drowsiness Detection Using Federated Learning: Lessons Learnt from Dealing with Non-IID Data
Published by: 17th International Conference on PErvasive Technologies Related to Assistive Environments (PETRA'24)
 
SINTEF is the partner from ENTRUST that contributed to this paper.

In this paper, we report on our hands-on experience of building a FL system for drowsiness detection using non-IID data.We compare this federated setup with a traditional, centralised approach to model training by identifying and discussing the associated challenges from multiple perspectives, as well as possible solutions and recommendations for further research.

newspaper-folded.png
Context-Aware Digital Twins to Support Software Management at the Edge
Published by: 17th International Conference Research Challenges in Information Science: Information Science and the Connected World (RCIS 2023)
 
Rustem Dautov and Hui Son

This paper aims to address this lack of context-awareness in digital twins required for edge software assignment by introducing two modelling principles, which allow focusing on the device fleet as a whole and capturing the diverse cyber-physical-social context of individual devices.

newspaper-folded.png
BAHS: A Blockchain-Aided Hash-Based Signature Scheme
Published by: Information Security Practice and Experience (ISPEC 2023)
Yalan Wang, Liqun Chen, Long Meng & Yangguang Tian

In this paper, we introduce a new one-time signature scheme, called Blockchain-Aided Hashbased Signature (BAHS), in which a hash-based commitment scheme acts as the building block, and signers’ commitments and opened commitments are publicly accessible via a distributed blockchain.

newspaper-folded.png
Accountable Fine-Grained Blockchain Rewriting in the Permissionless Setting
Published by: IEEE Transactions on Information Forensics and Security ( Volume: 19) Page(s): 1756 - 1766
 
Yangguang Tian , Bowen Liu, Yingjiu Li , Pawel Szalachowski , and Jianying Zhou

In this work, we introduce accountable fine-grained blockchain rewriting in a permissionless setting. The property of accountability allows the modifier’s identity and their rewriting privileges to be held accountable for the modified transactions in case of malicious rewriting. Our contributions are three-fold.

newspaper-folded.png
A Way Forward for the MDCG 2019-16 Medical Device Security Guidance
Published by: PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive Environments
 
Steve Taylor, Martin Gilje Jaatun, Karin Bernsmed, Christos Androutsos, Dietmar Frey, Simone Favrin, João Rodrigues, DušKo Milojević, Dimitrios Karras, Ioannis Siachos, Gregory Epiphaniou, Nabil Moukafih, Sotiris Messinis, Ioannis Rallis, Nicholas Protonotarios, Paul Gedeon, Andres Castillo, Carsten Maple, Nikolaos Matragkas, Rance DeLong, Theodoros Arvanitis, Konstantinos Katzis
 

This work has been undertaken by a selection of current (2023-2025) projects, all funded under the Horizon Europe call “Enhancing cybersecurity of connected medical devices”: HORIZON-HLTH-2022-IND-13-01, and this paper summarises observations and recommendations from across these projects.

bottom of page