|
Publications
Books and
contributions to books
·
L. Chen and
M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2009), LNCS
6163, ISBN: 978-3-642-14596-4, Springer-Verlag,
2010.
·
L. Chen, C.J. Mitchell and A. Martin
(editors), Trusted Computing (Proceedings
of Trust 2009), LNCS 5471, ISBN 978-3-642-00586-2, Springer, 2009.
·
L. Chen, M.D. Ryan and G. Wang
(editors), Information and Communications Security (Proceedings
of ICICS 2008), LNCS 5308, ISBN 978-3-540-88624-2, Springer, 2008.
·
L. Chen, Y. Mu
and W. Susilo (editors), Information Security
Practice and Experience (Proceedings
of ISPEC 2008), LNCS 4991, ISBN 978-3-540-79103-4, Springer, 2008.
·
E. Brickell,
J. Camenisch and L. Chen. Direct anonymous
attestation in context. Chapter 5 of Trusted Computing, pp.
143-174, edited by C. Mitchell, ISBN 0-86341-525-3, IEE, London, 2005.
·
B. Balacheff,
L. Chen, S. Pearson, D. Plaquin and G. Proudler. Trusted Computing Platforms: TCPA
Technology in Context. ISBN 0-13-009220-7, Prentice Hall PTR,
2003.
·
C. J. Mitchell and L. Chen. Security
in future mobile multimedia networks. Chapter 11 of Insights
into Mobile Multimedia Communications, pp. 177-190, edited by D. R.
Bull, C. N. Canagarajah and A. R. Nix,
ISBN-13: 978-0-12-140310-2, ISBN-10: 0-12-140310-6, Academic Press,
1999.
Journal articles
·
Q. Tang
and
L. Chen.
Extended KCI attack against two-party key establishment protocols.
Information Processing Letters,
111(15):–.
·
L. Chen, S.-L. Ng and G. Wang. Threshold
anonymous announcement in VANETs.
IEEE Journal on Selected Areas
in Communications,
29(3):605-615, 2011.
· L. Chen and J. Li. A note on the
Chen-Morrissey-Smart direct anonymous attestation scheme. Information Processing Letters, 110(12-13):485-488, 2010.
·
L. Chen and C.J. Mitchell. Parsing
ambiguities in authentication and key establishment protocols. International Journal of Electronic
Security and Digital Forensics, 3(1):82-94, 2010.
·
L. Chen and S. Ng.
Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et
al. IEEE
Transactions on Vehicular Technology, 59(3):1503-1505,
2010.
·
E. Brickell,
L. Chen and J. Li, Simplified security notions of direct anonymous
attestation and a concrete scheme from pairings. International Journal of Information Security, 8(5):315-330, 2009.
·
G. Bertoni, L.
Breveglieri, L. Chen, P. Fragneto,
K. A. Harrison, G. Pelosi: A pairing SW implementation for Smart-Cards.
Journal of Systems and Software 81(7):
1240-1247, 2008.
·
L. Chen and Q. Tang. Bilateral unknown
key-share attacks in key agreement protocols. Journal of Universal
Computer Science, 14(3):416-440, 2008.
·
L. Chen, Z. Cheng and N. Smart. Identity-based key agreement
protocols from pairings. International Journal of
Information Security, 6(4):213-241,
Springer Berlin / Heidelberg, 2007.
·
Z. Cheng and L. Chen. On security proof of McCullagh-Barreto's
key agreement protocol and its variants. International
Journal of Security and Networks, 2(3/4): 251-259, 2007.
·
L. Chen, Z. Cheng, J. Malone-Lee and N.
Smart. Efficient ID-KEM based on the Sakai-Kasahara
key construction. IEE Proceedings Information Security, 153(1):19-26,
2006.
·
B. Balacheff,
L. Chen, S. Pearson, G. Proudler and D. Chan.
Computing platform security in cyberspace. Elsevier Information
Security Technical Report, 5(1):54-63, 2000.
·
L.
Chen, D. Gollmann and C.J.
Mitchell. Authentication
using minimally trusted servers. ACM Operating Systems Review,
31(3):16-28, 1997.
·
C.J. Mitchell and L. Chen. Comments
on the S/KEY user authentication scheme. ACM Operating Systems Review,
30(4):12-16, 1996.
·
L.
Chen, D. Gollmann and C. Mitchell.
Distributing trust amongst multiple authentication servers. Journal
of Computer Security, 3(4):255-267, 1994/95.
·
B. Wu and L. Chen. Cipher rolling in the
speech scrambling system requiring no frame synchronization. Journal
of Southeast
University, 21(5):1-8,
1991.
·
L. Chen and B. Wu. Generation of T
and T-1 matrices for a speech scrambling system
without frame synchronization. Communication security, 44(4):1–5,
1990.
Conference
proceedings articles
·
L. Chen, M. Lee and B. Warinschi. Security of the enhanced TCG
privacy-CA solution. To appear in
the Proceedings of the 6th International Symposium on Trustworthy Global
Computing (TGC 2011).
·
Y. Chen, L. Chen and Z. Chen. Generic methods to achieve tighter
security reductions for a category of IBE schemes. In
the Proceedings of the 7th
Information Security Practice and Experience Conference (ISPEC 2011),
Springer LNCS 6672, pp. 40–54, 2011.
·
H. Balinsky, L. Chen and S. Simske. Premature silent workflow
termination in publicly posted composite documents. To appear in
IEEE International conference on
Systems, Man and Cybernetics (SMC 2011).
·
H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents
with identity based encryption. To appear in
the 11th ACM Symposium
on Document Engineering (DocEng 2011).
·
C. Wachsmann,
A. Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight anonymous
authentication with TLS and DAA for embedded mobile
devices. To appear in the
proceedings of 13th Information Security Conference (ISC
2010).
· Y. Chen and
L. Chen.
The twin bilinear Diffie-Hellman inversion problem and applications. To appear in the
Proceedings of
the 13th
International Conference on
Information Security and Cryptology (ICISC 2010).
· L. Chen and
J. Li.
Revocation of direct anonymous attestation. To appear in the Proceedings of the 2nd International
Conference on Trusted Systems (INTRUST 2010).
· L. Chen and B. Warinschi.
Security of the TCG privacy-CA solution. To appear in the Proceedings of the 6th
IEEE/IFIP International Symposium on Trusted Computing and
Communications (TrustCom 2010).
· L. Chen and J. Li. VLR group signatures
with indisputable exculpability and efficient revocation. To appear in the Proceedings of the Second IEEE
International Conference on Information Privacy, Security, Risk and
Trust (PASSAT2010), IEEE Computer Society Press, 2010. (Best PASSAT
Conference Paper Award).
·
F. Armknecht,
L. Chen, A. Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems.
To appear in the Proceedings of the
6th Workshop on RFID Security (RFIDSec 2010).
·
L. Chen. A DAA scheme using batch proof
and verification. In the
Proceedings of the 3rd International Conference on Trust
(Trust 2010), LNCS 6101, pp. 166–180, Springer, 2010.
·
L. Chen, D. Page and N. Smart. On the
design and implementation of an efficient DAA scheme. In the Proceedings of the Ninth Smart
Card Research and Advanced Application IFIP Conference (CARDIS 2010),
LNCS Volume 6035, pp. 223–237, Springer, 2010.
·
S. Cabuk, L.
Chen, D. Plaquin and M. Ryan. Trusted
integrity measurement and reporting for virtualized platforms. In the Proceedings of the International
Conference on Trusted Systems (INTRUST 2009), LNCS 6163, pp.
181–197, Springer, 2010.
·
L. Chen. A DAA scheme requiring less TPM
resources. To appear in the
Proceedings of the 5th China International
Conference on Information Security and Cryptology (Inscrypt
2009).
·
D. Khader, L.
Chen and J. Davenport. Certificate-free attribute authentication. In
the Proceedings of the Twelfth
IMA International Conference on Cryptography and Coding (IMACC 2009),
LNCS 5921, pp. 301–325, Springer-Verlag,
2009.
·
L. Chen and M. Ryan. Attack, solution
and verification for shared authorisation data in TCG TPM. To appear in
the Proceedings of the sixth
International Workshop on Formal Aspects in Security and Trust
(FAST2009), 2009.
·
L. Chen, P. Morrissey, N. P. Smart and
B. Warinschi. Security notions and generic
constructions for client puzzles. To appear in the Proceedings of Advances
in Cryptology – Asiacrypt'09, Springer-Verlag,
2009.
·
Q. Tang and L. Chen. Public-key
encryption with registered keyword search. To appear in the Proceedings of the 6th
European Workshop on Public Key Services, Applications and
Infrastructures (EuroPKI'09), Springer-Verlag,
2009.
·
H. Balinsky,
E. McDonnell, L. Chen and K. Harrison. Anti-counterfeiting using memory
spots. In the Proceedings of the
3rd Workshop in Information Security Theory and Practices
– WISTP'09, LNCS 5746, pp. 52 – 67, Springer-Verlag, 2009.
·
L. Chen, P. Morrissey and N. P. Smart. On Proofs of
Security for DAA Schemes. In the
Proceedings of the Second International Conference
on Provable Security (ProvSec 2008), LNCS
5324, pp. 156-175, Springer-Verlag, 2008.
·
L. Chen, H. Löhr,
M. Manulis, and A.Sadeghi.
Property-based attestation without a trusted third party. In the Proceedings of the 11thInternational
Conference on Information Security (ISC 2008), LNCS 5222, pp. 31-46, Springer-Verlag,
2008.
·
L. Chen, P. Morrissey and N.P. Smart. Pairings
in trusted computing. To appear in the Proceedings of the Second
International Conference on Pairing-based Cryptography (Pairing 2008),
Royal Holloway, University of London, UK, September 2008.
·
L. Chen and M. Ryan. Offline dictionary
attack on TCG TPM weak authorisation data, and solution. To appear in the
Proceedings of the International conference on the Future of Trust in Computing, Berlin, Germany, June 30 - July 2, 2008.
·
A. Leung, L. Chen, and C. J. Mitchell.
On a possible privacy flaw in direct anonymous attestation (DAA). In the Proceedings of the 1st
International Conference on Trust (TRUST 2008), LNCS 4968, pp. 179-190,
Springer-Verlag, 2008.
·
E. Brickell,
L. Chen and J. Li. A new direct anonymous attestation scheme from
bilinear maps. In the Proceedings
of the 1st International Conference on Trust (TRUST 2008),
LNCS 4968, pp. 166-178, Springer-Verlag,
2008.
·
Yi Mu, Duncan
Wong, Liqun Chen, Willy Susilo,
Qianhong Wu. Concurrent signatures without a
conventional keystone. In the
Proceedings of the First International Workshop on Coding and
Cryptology, Series on Coding Theory and Cryptology, Vol. 4, World
Scientific, 2007.
·
L. Chen. An interpretation of
identity-based cryptography. In A. Aldini and R. Gorrieri (Eds.): Foundations of Security Analysis and Design IV, FOSAD
2006/2007, LNCS 4677, pp. 183–208, Springer-Verlag,
2007.
·
B. Smyth, L. Chen and M. Ryan. Direct
Anonymous Attestation (DAA): ensuring privacy with corrupt
administrators. In F. Stajano, editor, the
Proceedings of Fourth European Workshop on Security and Privacy in Ad
hoc and Sensor Networks (ESAS 2007), LNCS 4572, pp. 218-231, Springer-Verlag, 2007.
·
L. Chen, A. Escalante, H. Löhr, M. Manulis and A. Sadeghi. A privacy-protecting multi-coupon scheme
with stronger protection against splitting. In S. Dietrich
and R. Dhamija (Eds.), Proceedings of the
11th International Conference on Financial Cryptography and
Data Security (FC 2007), LNCS 4886, pp. 29-44, Springer-Verlag, 2008.
·
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble.
A protocol for property based attestation. In G. Tsudik, S. Xu and M. Yung
(Eds.), proceedings of the First ACM Workshop on Scalable Trusted
Computing (STC'06), pp. 7-16, the ACM Press, 2006.
·
Z. Cheng, L. Chen, R. Comley and Q. Tang. Identity-based key agreement
with unilateral identity privacy using pairings. In K. Chen and R. Deng (Eds), Proceedings of the Second Information
Security Practice and Experience Conference (ISPEC 2006), LNCS 3903, pp. 202-213, Springer-Verlag, 2006.
·
L. Chen and Z. Cheng. Security proof of
Sakai-Kasahara's identity-based encryption
scheme. In N. Smart (Ed.), Proceedings of the 10th IMA
International Conference on Cryptography and Coding, LNCS
3796, pp. 442-459, Springer-Verlag, 2005.
·
L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M.
Steiner. A privacy-protecting coupon system. In A.
Patrick and M. Yung (Eds), Proceedings of
the 9th International Conference on Financial
Cryptography and Data Security (FC 2005), LNCS
3570, pp. 93-108, Springer-Verlag,
2005.
·
L. Chen and J. Malone-Lee. Improved
identity-based signcryption. In V. Serge
(Ed.), Proceedings of the 8th International
Workshop on Theory and Practice in Public Key Cryptography (PKC 2005),
LNCS 3386, pp. 362-379, Springer-Verlag,
2005.
·
L. Chen, H. Lim and W. Mao.
User-friendly grid security architecture and protocols. In B. Christianson, B. Crispo, J.
A. Malcolm, M. Roe (Eds.), Proceedings of 13th
International Workshop on Security Protocols, Cambridge, UK, April
20-22, 2005, LNCS 4631, pp. 139-156, Springer-Verlag,
2007.
·
E. Brickell,
J. Camenisch, and L. Chen. Direct anonymous
attestation. In B. Pfitzmann and P. Liu
(Eds.), Proceedings of the 11th ACM Conference on Computer and
Communications Security (CCS 2004), pp. 132-145, ACM press, 2004.
·
L. Chen, C. Kudla
and K. Paterson. Concurrent signatures. In C. Cachin
and J. Camenisch (Eds.), Proceedings of
Advances in Cryptology – EUROCRYPT 2004, LNCS 3027, pp.
287-305, Springer-Verlag, 2004.
·
L. Chen and C. Kudla.
Identity based key agreement protocols from pairings. In R. Focardi (Ed.), Proceedings of the 16th IEEE
Computer Security Foundations Workshop (CSFW-16 2003), pp. 219-233,
IEEE Computer Society Press, 2003. A revised version is available at Cryptology ePrint Archive, Report 2002/184, 2002.
·
L. Chen, K. Harrison, A. Moss, D. Soldera, and N. Smart. Certification of public keys
within an identity based system. In A. Chan and V. Gligor
(Eds.), Proceedings of the 5th International Conference
on Information Security (ISC 2002), LNCS 2433, pp. 322-333,
Springer-Verlag, 2002.
·
L. Chen, K. Harrison, D. Soldera, and N.P. Smart. Applications of multiple
trust authorities in pairing based cryptosystems. In G. Davida, Y. Frankel, O. Rees (Eds.), Proceedings
of the International Conference on Infrastructure Security (InfraSec 2002), LNCS 2437, pp. 260-275, Springer-Verlag, 2002.
·
B. Balacheff,
L. Chen, D. Plaquin and G. Proudler. A trusted process to digitally sign a
document. In V. Raskin and C. Hempelmann (Eds.), Proceedings of the 2001 New
Security Paradigms Workshop (NSPW'01), pp. 79-86, ACM Press, 2001.
·
L. Chen and W. Mao. An auditable
metering scheme for web advertisement applications. In G. Davida and Y. Frankel (Eds.), Proceedings of the
4th International Conference on Information Security (ISC
2001), LNCS 2200, pp. 475-485, Springer-Verlag,
2001.
·
B. Balacheff,
D. Chan, L. Chen, S. Pearson, and G. Proudler.
Securing intelligent adjuncts using trusted computing platform
technology. In J. Domingo-Ferrer, D. Chan and
A. Watson (Eds.), Proceedings of the 4th Working Conference
on Smart Card Research and Advanced Applications, pp. 177-195, Kluwer Academic Publishers, 2000.
·
B. Balacheff,
D. Chan, L. Chen, S. Pearson, and G. Proudler.
How can you trust a computing platform? In Proceedings of
Information Security Solutions Europe Conference (ISSE 2000), Spain,
2000.
·
L. Chen, S. Pearson and A. Vamvakas. On enhancing biometric authentication
with data protection. In R. Howlett and L.
Jain (Eds.), Proceedings of the 4th International
Conference on Knowledge-Based Intelligent Engineering Systems &
Allied Technologies (KES 2000), pp. 249-252, IEEE press, 2000.
·
L. Chen. Efficient fair exchange with
verifiable confirmation of signatures. In K. Ohta
and D. Pei (Eds.), Proceedings of Advances in Cryptology –
Asiacrypt'98, LNCS 1514, pp. 286-299, Springer-Verlag,
1998.
·
L.
Chen, D. Gollmann and C.J.
Mitchell. Key
escrow in mutually mistrusting domains. In M. Lomas (Ed.), Proceedings
of International Workshop on Security Protocols, LNCS
1189, pp.139-153, Springer-Verlag, 1997.
·
L.
Chen and C.J. Mitchell. Key escrow in
multiple domains. In J. Lamere
(Ed.), Proceedings of the International Congress on Information
Systems and Telecommunications Security (INFOSEC'COM '97), pp.101-116,
MCI Paris, 1997.
·
L.
Chen, D. Gollmann, C.J. Mitchell
and P. Wild. Secret
sharing with reusable polynomials. In V. Varadharajan,
J. Pieprzyk and Y. Mu
(Eds.), Proceedings of the 2nd Australasian Conference on
Information Security and Privacy (ACISP'97), LNCS
1270, pp. 183-193, Springer-Verlag, 1997.
·
L.
Chen and C.J. Mitchell. An
anonymous and undeniable payment scheme. In Y. Han, T.
Okamoto and S. Qing (Eds.), Proceedings of the 1st
International Conference on Information and Communications Security
(ICICS'97), LNCS
1334, pp. 478-482, Springer-Verlag,
1997.
·
L.
Chen, D. Gollmann and C.J.
Mitchell. Tailoring
authentication protocols to match underlying mechanisms. In
J. Pieprzyk and J. Seberry
(Eds.), Proceedings of the 1st Australasian Conference on
Information Security and Privacy (ACISP'96), LNCS
1172, pp. 121-133, Springer-Verlag, 1996.
·
L.
Chen, H.-J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J.
Mitchell and C. Radu. The
use of trusted third parties and secure billing in UMTS. In Proceedings
of the 1st ACTS Mobile Communications Summit,
Volume 2, pp. 493-499, Spain, 1996.
·
L.
Chen, D. Gollmann and C.J.
Mitchell. Key
distribution without individual trusted authentication servers.
In L. Gong (Ed.), Proceedings of the 8th IEEE Computer Security
Foundations Workshop (CSFW'95), pp. 30-36, IEEE Computer Society
Press, 1995.
·
L. Chen and D. Edwards. Applications of
non-uniform sampling techniques and fast Fourier transform in plane
near-field antenna measurements. In J. Norbury,
A. Brown and M. Mehler (Eds.), Proceedings
of the 8th International Conference on Antennas and
Propagation, IEE Conference Publication Number 370, pp.
1.311-1.314, IEE London, 1993.
·
L. Chen and B. Wu. An asynchronous
speech scrambling using the fast number-theoretic transform technique.
In Proceedings of the 1st International Conference on
Communication Systems (ICCS '88), pp. 10.9.1 – 10.9.5, IEEE
press, 1988.
·
L. Chen and B. Wu. Short-time Fourier
transform and an asynchronous speech scrambler. In Proceedings of
the 3rd West Pacific Conference on Acoustics (WESTPAC III),
pp. 723-726, 1988.
Other publications
·
L. Chen, P. Morrissey and N. P. Smart.
DAA: Fixing the pairing based protocols. Cryptology ePrint
Archive, Report 2009/198, 2009
·
Q. Tang and L. Chen. Weaknesses in two
group Diffie-Hellman key exchange protocols. Cryptology ePrint Archive, Report 2005/197, 2005.
·
L. Chen and K. Harrison. Multiple
trusted authorities in identifier based cryptography from pairings on
elliptic curves. HP Labs Technical Reports, HPL-2003-48, 2003.
·
L. Chen. Study of an asynchronous
speech scrambling system. PhD Thesis. Southeast University,
P. R. China, 1988 (in Chinese).
Last updated: 17-July-2011
You can reach me at:
|
Email:
|
liqun.chen <at> hp.com
|
Phone:
|
+44 117 312 8217
|
Address:
|
Hewlett Packard Labs
Long Down Avenue, Stoke Gifford
Bristol, BS34 8QZ,
UK
|
|
|
|
|
|
|
|