Full List of Publications

Dr Man Ho Allen Au
aau@uow.edu.au

I.  Refereed Journal Articles

  1. Yong Yu, Man Ho Au, Yi Mu and Willy Susilo. Secure Delegation of Signing Power from Factorization. The Computer Journal. (Accepted on 24 November 2013) [ERA A*]
  2. Hui Cui, Yi Mu and Man Ho Au. Proof of Retrievability with Public Verifiability Resilient Against Related-Key Attacks. IET Information Security. (Accepted on 15 November 2013)  [ERA C]
  3. Yong Yu, Yi Mu, Willy Susilo and Man Ho Au. Security Pitfalls of an Efficient Threshold Proxy Signature Scheme for Mobile Agents. Information Processing Letters. (Accepted on 18 October 2013) [ERA B]
  4. Hui Cui, Yi Mu and Man Ho Au. Gateway-Based Verifiable and Anonymous Broadcast Encryption. International Journal of Security and Networks. (Accepted on 5 October 2013) 
  5. Joseph K. Liu, Tsz Hon Yuen, Man Ho Au and Willy Susilo. Improvements on an Authentication Scheme for Vehicular Sensor Networks. Expert Systems with Applications. (Accepted on 2 October 2013) [ERA B; Impact Factor 1.854]
  6. Man Ho Au, Joseph K. Liu, Willy Susilo and Jianying Zhou. Realizing Fully Secure Unrestricted ID-based Ring Signature in the Standard Model Based on HIBE. IEEE Transactions on Information Forensics and Security. (Accepted on 10 September 2013) [ERA A, Impact Factor 1.895]
  7. Man Ho Au, Joseph K. Liu, Junbin Fang, Zoe L. Jiang, Willy Susilo and Jianying Zhou. A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Transactions on Vehicular Technology. (Accepted on 11 July 2013) [EAR A, Impact Factor 2.063]
  8. Hui Cui, Yi Mu and Man Ho Au. Signcryption Secure Against Linear Related-Key Attacks. The Computer Journal. (Accepted on 1 July 2013) [ERA A*]
  9. Man Ho Au, Guomin Yang, Willy Susilo and Yunmei Zhang. (Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack. Concurrency and Computation: Practice and Experience, Wiley, 2013. (Accepted on 15 June 2013) [ERA A]
  10. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Linkable Ring Signature with Unconditional Anonymity. IEEE Transactions on Knowledge and Data Engineering. (Accepted on 2 Dec 2012) [ERA A, Impact Factor 1.892]
  11. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Secure ID-Based Linkable and Revocable-iff-Linked Ring Signature with Constant-Size Construction. Theoretical Computer Science 469: 1 ? 14 (2013). [ERA A]
  12. Man Ho Au, Willy Susilo, Yi Mu and Sherman S.M. Chow. Constant-Size Dynamic k-Times Anonymous Authentication. IEEE Systems Journal special issue on Security and Privacy of Complex Systems 7(2): 249 ? 261 (2013). [Impact Factor 1.27]
  13. Sherman S. M. Chow, Man Ho Au and Willy Susilo. Server-Aided Signatures Verification Secure against Collusion Attack. Information Security Technical Report 17(3): 46 -57 (2013). [ERA B, Top 20 Most Downloaded Journal of Information Security and Applications Articles in the last 90 days as of 20 Oct 2013]
  14. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Efficient Linkable and/or Threshold Ring Signature without Random Oracles. The Computer Journal 56(4): 407-421 (2013). [ERA A*]
  15. Man Ho Au, Patrick P. Tsang and Apu Kapadia. PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. ACM Transactions on Information and System Security (TISSEC), Volume 14 Issue 4, Article No.: 29, December 2011, ACM (2011). [ERA A]
    link to document
  16. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Transactions on Information and System Security (TISSEC), Volume 13 Issue 4, Article No.: 39, December 2010, ACM (2010). [ERA A, 29 Citations]
    link to document
  17. Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu and Duncan Wong. Escrowed Deniable Identification Schemes. International Journal of Security and Its Applications, Volume 4, No. 1, Pages: 49 - 67, January 2010.

II.  Refereed Conference Proceeding Articles

  1. Jongkil Kim, Willy Susilo, Man Ho Au and Jennifer Seberry. Efficient Semi-static Secure Broadcast Encryption Scheme. Proceedings of the 6th International Conference on Pairing-Based Cryptography (PAIRING 2013). (Accepted on 18 Oct 2013) [ERA C]
  2. Hui Cui, Yi Mu and Man Ho Au. Anonymous Signcryption Secure Against Linear Related-Key Attacks. Proceedings of the 7th International Conference on Provable Security (ProvSec 2013). (Accepted on 25 July 2013) [ERA B]
  3. Hui Cui, Yi Mu and Man Ho Au. Public-Key Encryption Resilient to Linear Related-Key Attacks. Proceedings of the 9th International Conference on Security and Privacy in Communication Networks (SecurCcomm 2013). (Accepted on 8 July 2013) [ERA A]
  4. Hui Cui, Yi Mu and Man Ho Au. Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). [ERA A]
  5. Miao Zhou, Mu Yi, Willy Susilo and Man Ho Au. Privacy-Enhanced Keyword Search in Clouds. Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). [ERA A]
  6. Willy Susilo, Man Ho Au, Yang Wang and Duncan S. Wong. Fairness in Concurrent Signatures Revisited. Proceedings of the 18th Australasian Conference on Information Security and Privacy (ACISP 2013), volume 7959 of Lecture Notes in Computer Science, pages 318 - 329, 2013, Springer (2013). [ERA B]
  7. Yang Wang, Mark Manulis, Man Ho Au and Willy Susilo. Relations among Privacy Notions for Signcryption and Key Invisible ``Sign-then-Encrypt''. Proceedings of the 18th Australasian Conference on Information Security and Privacy (ACISP 2013), volume 7959 of Lecture Notes in Computer Science, pages 187 - 202, 2013, Springer (2013). [ERA B]
  8. Yang Wang, Man Ho Au, Tsz Hon Yuen, Joseph K. Liu and Willy Susilo.  Threshold-Oriented Optimistic Fair Exchange. Proceedings of the 6th International Conference on Network and System Security (NSS 2013), volume 7873 of Lecture Notes in Computer Science, pages 424-438, 2013, Springer (2013).  [ERA B]
  9. Man Ho Au and Apu Kapadia. PERM: Practical Reputation Based Blacklisting without TTPs. Proceedings of the 19th ACM conference on Computer and communications security (ACM CCS 2012). Pages: 929-940, ACM (2012). [ERA A]
  10. Man Ho Au, Apu Kapadia, and Willy Susilo. BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS 2012). [ERA A, 19 Citations]
    link to document
  11. Yunmei Zhang, Man Ho Au, Guomin Yang and Willy Susilo. (Strong) Multi-Designated Verifiers Signatures Secure Against Rogue Key Attack. Proceedings of the 6th International Conference on Network and System Security (NSS 2012), volume 7645/2012 of Lecture Notes in Computer Science, pages 334-347, Springer (2012). [ERA B]
  12. Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo and Jianying Zhou. Forward Secure Attribute-Based Signature. Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), volume 7618/2012 of Lecture Notes in Computer Science, pages 167-177, Springer (2012).  [ERA B]
  13. Yang Wang, Man Ho Au and Willy Susilo. Perfect Ambiguous Optimistic Fair Exchange. Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), volume 7618/2012 of Lecture Notes in Computer Science, pages 142-153, Springer (2012). [ERA B]
  14. Yunmei Zhang, Joseph Liu, Xinyi Huang, Man Ho Au and Willy Susilo. Efficient Escrow-Free Identity-Based Signature. Proceedings of the 6th International Conference on Provable Security (ProvSec 2012), volume 7496/2012 of Lecture Notes in Computer Science, pages 161-174, Springer (2012). [ERA B]
  15. Joseph Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Enhancing Location Privacy for Electric Vehicles (at the right time). Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), volume 7459/2012 of Lecture Notes in Computer Science, pages 397-414, Springer (2012). [ERA A]
  16. Man Ho Au, Willy Susilo and Yi Mu. Electronic Cash with Anonymous User Suspension. Proceedings of the 16th Australasian Conference on Information Security and Privacy (ACISP 2011), volume 6812/2011 of Lecture Notes in Computer Science, pages 172-188, Springer (2011). [ERA B]
  17. Man Ho Au, Willy Susilo and Yi Mu. Proof-of-Knowledge of Representation of Committed Value and Its Applications. Proceedings of the 15th Australasian Conference on Information Security and Privacy (ACISP 2010), volume 6168/2010 of Lecture Notes in Computer Science, pages 352-369, Springer (2010). [ERA B]
  18. Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au and Jun Yan. Piracy-Preserved Access Control for Cloud Computing. Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). [ERA A]
  19. Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Threshold Ring Signature without Random Oracles. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pages 261-267, ACM (2011). [ERA B]
  20. Sherman S. M. Chow, Man Ho Au and Willy Susilo. Server-Aided Signatures Verification Secure against Collusion Attack. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pages 401-405, ACM (2011). [Short Paper] [ERA B]
  21. Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie and Kui Ren. Attribute-Based Signature and Its Applications. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), pages 60-69, ACM (2010). [ERA B, 62 Citations]
  22. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010), volume 6345/2010 of Lecture Notes in Computer Science, pages 168-181, Springer (2010). [ERA A]
  23. Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung and Siu-Ming Yiu. Oblivious Transfer with Access Control: Realizing Disjunction without Duplication. Proceedings of the 4th International Conference on Pairing-Based Cryptography (PAIRING 2010), volume 6487/2010 of Lecture Notes in Computer Science, pages 96-115, Springer (2010). [ERA C]
  24. Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo and Duncan S. Wong. A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). Proceedings of the 4th International Conference on Provable Security (ProvSec 2010), volume 6402/2010 of Lecture Notes in Computer Science, pages 166-183, Springer (2010). [ERA B, 22 Citations]
  25. Man Ho Au, Patrick P. Tsang, Willy Susilo and Yi Mu. Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Proceedings of Topics in Cryptology - CT-RSA 2009, The Cryptographers? Track at the RSA Conference 2009 (CT-RSA 2009), volume 5473/2009 of Lecture Notes in Computer Science, pages 295-308, Springer (2009). [ERA B, 20 Citations]
    Full version available here
  26. Man Ho Au, Willy Susilo and Yi Mu. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? Proceedings of the 3th International Conference on Provable Security (ProvSec 2009), volume 5848/2009 of Lecture Notes in Computer Science, pages 129-139, Springer (2009). [ERA B]
  27. Joseph K. Liu, Man Ho Au, Willy Susilo and Jianying Zhou. Online/Offline Ring Signature Scheme. Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009), volume 5927/2009 of Lecture Notes in Computer Science, pages 80-90, Springer (2009). [ERA B]
  28. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong and Guomin Yang. Traceable and Retrievable Identity-Based Encryption. Proceedings of the 6th International Conference on Applied Cryptography and Network Security (ACNS 2008), volume 5037/2008 of Lecture Notes in Computer Science, pages 94-110, Springer (2008). [ERA B, 21 Citations]
  29. Man Ho Au, Willy Susilo and Yi Mu. Practical Anonymous Divisible E-Cash from Bounded Accumulators. Proceedings of the 12th International Conference on Financial Cryptography and Data Security (FC 2008), volume 5143/2008 of Lecture Notes in Computer Science, pages 287-301, Springer (2008). [ERA A, 31 Citations]
  30. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. Proceedings of the 15th ACM conference on Computer and communications security (ACM CCS 2008), pages: 333-344, ACM (2008). [ERA A, 54 Citations]
  31. Man Ho Au, Willy Susilo and Yi Mu. Practical Compact E-Cash. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP 2007), volume 4586/2007 of Lecture Notes in Computer Science, pages 431-445, Springer (2007). [ERA B, 19 Citations]
  32. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Certificate Based (Linkable) Ring Signature. Proceedings of the 3th International Conference on Information Security Practice and Experience (ISPEC 2007), volume 4464/2007 of Lecture Notes in Computer Science, pages 79-92, Springer (2007).
    [ERA B, 46 Citations]
  33. Man Ho Au, Yi Mu, Jing Chen, Duncan S. Wong, Joseph K. Liu and Guomin Yang. Malicious KGC Attacks in Certificateless Cryptography. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pages 302-311, ACM (2007). [ERA B, 130 Citations]
  34. Joseph K. Liu, Man Ho Au and Willy Susilo. Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model: Extended Abstract. Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pages 373-383, ACM (2007). [ERA B, 121 Citations]
  35. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs. Proceedings of the 14th ACM conference on Computer and communications security (ACM CCS 2007), pages 72-81, ACM (2007). [ERA A, 100 Citations]
  36. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu and Willy Susilo. (Convertible) Undeniable Signatures without Random Oracles. Proceedings of the 9th International Conference on Information and Communications Security (ICICS 2007), volume 4861/2008 of Lecture Notes in Computer Science, pages 83-97, Springer (2008). [ERA B]
  37. Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu. Compact E-Cash from Bounded Accumulator. Proceedings of Topics in Cryptology - CT-RSA 2007, The Cryptographers? Track at the RSA Conference 2007 (CT-RSA 2007), volume 4377/2006 of Lecture Notes in Computer Science, pages 178-195, Springer (2006). [ERA B, 34 Citations]
    Note: We discovered a flaw in our construction that results in an anonymity attack. Specifically, spending of the same wallet can be linked. The attack, fix as well as security proof can be found in Section 5.4 of my thesis. Available here
  38. Man Ho Au, Willy Susilo and Siu-Ming Yiu. Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Proceedings of the 11th Australasian Conference on Information Security and Privacy (ACISP 2006), volume 4058/2006 of Lecture Notes in Computer Science, pages 223-234, Springer (2006). [ERA B]
  39. Man Ho Au, Sherman S. M. Chow, Willy Susilo and Patrick P. Tsang. Short Linkable Ring Signatures Revisited. Proceedings of the 3rd European PKI Workshop: Theory and Practice (EuroPKI 2006), volume 4043/2006 of Lecture Notes in Computer Science, pages 101-115, Springer (2006). [ERA B, 36 Citations]
  40. Man Ho Au, Joseph K. Liu, Willy Susilo and Tsz Hon Yuen. Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. Proceedings of Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India (INDOCRYPT 2006), volume 4329/2006 of Lecture Notes in Computer Science, pages 364-378, Springer (2006). [ERA B, 25 Citations]
    Note: The scheme is broken by Jeong, Kwon and Lee in IEICE Trans. Fundamentals, Vol.E92-A, No. 1 2009. We propose a fix together with a security proof in the full version. Full version available here
  41. Man Ho Au, Joseph K. Liu, Tsz Hon Yuen and Duncan S. Wong. ID-Based Ring Signature Scheme Secure in the Standard Model. Proceedings of Advances in Information and Computer Security, 1st International Workshop on Security (IWSEC 2006), volume 4266/2006 of Lecture Notes in Computer Science, pages 1-16, Springer (2006). [ERA B, 60 Citations]
    Note: There is a security flaw in the security proof of Theorem 2, discovered by Anna Lisa Ferrara and Susan Hohenberger. Later, a concrete attack is discovered by Brent Waters, demonstrating that the scheme in fact forgeable. Unfortunately, we are unable to fix the scheme. We construct a secure ID-based ring signature scheme in the standard model later in 2013 ([4]).
  42. Man Ho Au, Willy Susilo and Yi Mu. Constant-Size Dynamic k-TAA. Proceedings of the 5th International Conference on Security and Cryptography for Networks (SCN 2006), volume 4116/2006 of Lecture Notes in Computer Science, pages 111-125, Springer (2006). [ERA B, 66 Citations]
  43. Man Ho Au, Sherman S. M. Chow and Willy Susilo. Short E-Cash. Proceedings of Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India (INDOCRYPT 2005), volume 3797/2006 of Lecture Notes in Computer Science, pages 332-346, Springer (2005). [ERA B, 16 Citations]
  44. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu and Duncan S. Wong. Separable Linkable Threshold Ring Signatures. Proceedings of Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India (INDOCRYPT 2004), volume 3348/2004 of Lecture Notes in Computer Science, pages 384-398, Springer (2004). [ERA B, 72 Citations]

III.  Technical Reports

  1. Man Ho Au, Patrick P. Tsang, Apu Kapadia, and Willy Susilo. BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. IU School of Informatics and Computing Bloomington Computer Science Program Technical Report TR695, May 2011.
    link to document
  2. Man Ho Au, Patrick P. Tsang, Apu Kapadia. PEREA: Practical TTP-Free Revocation of Repeatedly Misbehaving Anonymous Users. IU School of Informatics and Computing Bloomington Computer Science Program Technical Report TR688, April 2011.
    link to document
  3. Man Ho Au, Patrick P. Tsang, Willy Susilo and Yi Mu . Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. Dartmouth Technical Report TR2009-643, April 2009.
    link to document
    Note: This report is the extended version of the paper appeared in CT-RSA ?09 under the same title.
  4. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs. Dartmouth Technical Report TR2008-635, October 2008.
    link to document
  5. Patrick P. Tsang, Man Ho Au, Apu Kapadia and Sean W. Smith. Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version). Dartmouth Technical Report TR2007-601, September 2007.
    link to document

IV.  Thesis

  1. Man Ho Au. Contribution to Privacy-Preserving Cryptographic Techniques. Ph.D. Thesis, University of Wollongong, May 2009. link to document
  2. Man Ho Au. Identity-Based Cryptography from Paillier Cryptosystem. M.Phil Thesis, Chinese University of Hong Kong, May 2005.

Back to main page.


Citations statistics are from Google scholar as of 9 November 2013.


This document was translated from LATEX by HEVEA.