Prof. Lucas Chi Kwong Hui
Department of Computer Science
University of Hong Kong, China
Email: hui@cs.hku.hk
Qualifications
1992 Ph.D., University of California, USA
1990 M.Sc., University of
California, USA
1986 B.Sc., University of
Hong Kong, China
Publications (Selected)
-
Chim T.W., Yiu S.M., Hui C.K.
and Li V.O.K., OPQ: OT-based Private Querying in VANETs, to appear in IEEE
Transactions on Intelligent Transportation Systems, 2011.
-
Chim T.W., Yiu S.M., Hui C.K.
and Li V.O.K., PASS: Privacy-preserving Authentication Scheme for Smart Grid
Network') to appear in 2011 IEEE SmartGridComm 2011.
-
Patrick P.F. Chan, Lucas Hui,
S.M. "A Privilege Escalation Vulnerability Checking System for Android
Applications" to appear in 13th IEEE International Conference on
Communication Technology (IEEE ICCT 2011), Jinan, China. (Best Paper Award),
2011.
-
Shuhui Hou, Tetsutaro Uehara,
S.M. Yiu, Lucas C.K. Hui, K.P. Chow, “Privacy Preserving Confidential Forensic
Investigation for Shared or Remote Servers”, to appear in The Seventh
International Conference on Intelligent Information Hiding and Multimedia
Signal Processing (IIHMSP11), Dalian, China. (Best Paper Award), 2011.
-
Junbin Fang, Zoe Lin Jiang,
S.M. Yiu, Lucas C.K. Hui. “Checking Key Integrity Efficiently for High Speed
Quantum Key Distribution by using Combinatorial Group Testing,” Optics
Communications, 284(1), pp.531-535, 2010. doi:10.1016/j.optcom.2010.08.066.
-
Junbin Fang, Zoe Lin Jiang,
S.M. Yiu, Lucas C.K. Hui. “An Efficient Scheme for Hard Disk Integrity Check by
Hashing with Combinatorial Group Testing,” to appear in International Journal
of Digital Content Technology and its Applications, 2011.
-
Junbin Fang, Zoe L. Jiang, S.M.
Yiu, L.C.K. Hui, Zichen Li. "Efficient key integrity verification for
quantum cryptography using combinatorial group testing" in Quantum
Information and Computation VIII, Proc. of SPIE vol. 7702, 77020F, Orlando,
USA, 2010. doi:10.1117/12.853234.
-
WANG Meiqin, WANG Xiaoyun, CHOW
KP & HUI Lucas C.K., “New Differential Cryptanalytic Results for
Reduced-Round CAST-128”, to appear in IEICE 2010.
-
WANG Meiqin, WANG Xiaoyun,
& HUI Lucas C.K., “Differential-Algebraic Cryptanalysis of Reduced-Round of
Serpent-256”, J. Science in China Series F: Information Science, 2010, 53:
doi10.1007/s11432-010-0048-2.
-
Zoe L. Jiang, S.M.Yiu, Y.Dong,
L.C.K. Hui, S.H.Y.Wong. “Secure Chained Threshold Proxy Signature without and
with Supervision”, Journal of Software Engineering and Applications, to
appear 2010.
-
Eric Ke Wang, L.C.K.Hui and
S.M.Yiu. “A Practical SMS-Based Mutual Authentication Protocol for Secure
Online Banking” in Proceeding of International Conference on Security &
Management (SAM'09), U.S.A., July, 2009.
-
Kin Ying Yu, S.M. Yiu, Lucas
C.K. Hui. “RFID Forward Secure Authentication Protocol: Flaw and Solution”, the
3rd International Workshop on Intelligent, Mobile and Internet Services in
Ubiquitous Computing (IMIS 2009), in conjunction with 3rd International
Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009),
Fukuoka, Japan, March 16-19, 2009, pp. 627-632.
-
Frank Y.W. Law, Pierre K.Y.
Lai, Zoe L. Jiang, Ricci S.C. Ieong, Michael Y.K. Kwan, K.P. Chow, Lucas C.K.
Hui, S.M. Yiu, C.F. Chong. Protecting Digital Legal Professional Privilege
(LPP) Data, in Proceedings of the third International Workshop on Systematic
Approaches to Digital Forensic Engineering (SADFE 2008), Oakland, California,
USA, May 18-22, 2008. pp. 91-101. (Best Paper Award).
-
Zoe L. Jiang, Lucas C.K. Hui,
and S.M. Yiu. Analysis of K-Dimension Hashing Scheme to Improve Disk Sector
Integrity, Fourth Annual IFIP WG 11.9 International Conference on Digital
Forensics, Kyoto, Japan, January 27 - 30, 2008. Japan, Springer Boston,
2008, 285: 87- 98.
-
Zoe L. Jiang, S.M. Yiu, L.C.K.
Hui, Y. Dong, S.H.Y. Wong. “ Chained Threshold Proxy Signature without and with
Supervision”, in Proceedings of 2008 International Conference on Computer
Science and Software Engineering (CSSE 2008), Wuhan, China, December 12-14,
2008.
-
Z.C. Li, C.F. Chong, Lucas C.K.
Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, H.W. Chan, and K.H. Pun. ”An Attack on
Libert et al.'s ID-Based Undeniable Signature Scheme”, in International Journal
of Network Security, Vol.5, No.2, pp. 220-223, September 2007.
-
K.P. Chow, K.Y. Cheng, L.Y.
Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W.
Chan, S.M. Yiu. BTM – An Automated Rule-based BT Monitoring System for Piracy
Detection, in Proceedings of the Second International Conference on Internet
Monitoring and Protection (ICIMP 2007), IEEE Computer Science Press.
-
Y. Dong, A.F. Sui, S.M. Yiu,
Victor O.K. Li, Lucas C.K. Hui, and H.W. Go. An Efficient Cluster-based
Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks, in 2007 IEEE
International Conference on Communications (ICC 2007).
-
E.Y.K. Chan, H.W. Chan, K.M.
Chan, P.S. Chan, S.T. Chanson, M.H. Cheung, C.F. Chong, K.P. Chow, A.K.T. Hui,
L.C.K. Hui, S.K. Ip, C.K. Lam, W.C. Lau, K.H. Pun, Y.F. Tsang, W.W. Tsang, C.W.
Tso, D.Y. Yeung, S.M. Yiu, K.Y. Yu, W. Ju., “Intrusion Detection Routers:
Design, Implementation and Evaluation Using an Experimental Test-bed”, in The
IEEE Journal on Selected Areas in Communications, special issue on High-speed
Network Security, 2006.
-
Sherman S.M. Chow, Richard W.C.
Lui, Lucas C.K. Hui, S.M. Yiu. Identity Based Ring Signature: Why, How and What
Next, in Proceedings of the Second European PKI Workshop (EUROPKI 2005), The
University of Kent, England, 30 June - 1 July 2005. Editors: D. Chadwick and G.
Zhao, Lecture Notes in Computer Science 3545, pp.144-161, Springer-Verlag,
2005.
-
Richard W.C. Lui, Sherman S.M.
Chow, Lucas C.K. Hui and S.M. Yiu. Efficient Authorization In Delegation With
Supervision, in Proceedings of the First International Workshop on Security in
Networks and Distributed Systems (SNDS2005), pp. 240-244, in conjunction with
the 11th International Conference on Parallel and Distributed Systems
(ICPADS-2005), Fukuoka, Japan, July 20-22, 2005. IEEE Computer Society Press.
(Best Paper Award)
-
Sherman S.M. Chow, S.M. Yiu,
and Lucas C.K. Hui. Efficient Identity Based Ring Signature, In Applied
Cryptography and Network Security, Third International Conference, ACNS 2005,
New York, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science
Volume 3531, pp.499-512, Springer-Verlag, 2005.
-
Sherman S.M. Chow, S.M. Yiu,
Lucas C.K. Hui, & K.P. Chow. “Efficient Forward and Provably Secure
ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext
Authenticity”, in Jong In Lim and Dong Hoon Lee, editors, Proceedings of the
Sixth Annual International Conference on Information Security and Cryptology
(ICISC 2003), Volume 2971 of Lecture Notes in Computer Science, pages 352-369,
Seoul, Korea, 2003, Springer-Verlag.
-
Z.C. Li, L.C.K. Hui, K.P. Chow,
C.F. Chong, W.W. Tsang, & H.W. Chan. ”Security of Tseng-Jan's Group
Signature Schemes”, Information Processing Letters, Vol. 75, No. 5, pp.187-189,
2000.
-
Z.C. Li, L.C.K. Hui, K.P. Chow,
C.F. Chong, W.W. Tsang, & H.W. Chan. “Cryptanalysis of Harn's Digital
Multisignature with Distinguished Signing Authorities”, Electronic Letters,
Vol. 36, No. 4, pp.314-315, 2000.