Skip to main content

Design and Analysis of Cryptographic Protocols

Design and Analysis of Cryptographic Protocols

One of the strengths of the Cryptography Group at Royal Holloway is to design and formally analyse the security of a variety of cryptographic protocols.

This is typically done within the framework of provable security, a modern cryptography approach which allows to reason about the security guarantees of a scheme or protocol using formal definitions and rigorous proofs.

Our expertise in this area includes design and analysis of public-key encryption primitives, digital signature schemes and primitives with advanced functionalities (such as verifiable delay functions), and more complex, multi-party protocols such as secret sharing schemes, reputation systems and e-voting schemes.

  • Pradel G, Mitchell C. Privacy-preserving biometric matching using homomorphic encryption. In Zhao L, Kumar N, Hsu RC, Zou Z, editors, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Los Alamitos: IEEE Press. 2021
  • Garms L, Ng S-L, Quaglia E, Traverso G. Anonymity and Rewards in Peer Rating Systems. Journal of Computer Security. 2021 Nov 4;1-57.
  • Chen L, Ng S-L. Securing emergent behaviour in swarm robotics. Journal of Information Security and Applications. 2021 Oct 20.
  • Li W, Mitchell CJ. User Access Privacy in OAuth 2.0 and OpenID Connect. In Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press. 2020. p. 664-672
  • Li W, Mitchell CJ, Chen T. OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. In Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM. 2019. p. 35-44
  • Garms L, Martin K, Ng S-L. Reputation Schemes for Pervasive Social Networks with Anonymity. In Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE. 2017. p. 1-6
  • Laing T, Martin K, Ng S-L, Tomlinson A. Security in Swarm Robotics. In Tan Y, editor, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. IGI Global. 2015. p. 42-66

Explore Royal Holloway