Skip to main content

Design and Analysis of Cryptographic Protocols

Design and Analysis of Cryptographic Protocols

One of the strengths of the Cryptography Group at Royal Holloway is to design and formally analyse the security of a variety of cryptographic protocols.

This is typically done within the framework of provable security, a modern cryptography approach which allows to reason about the security guarantees of a scheme or protocol using formal definitions and rigorous proofs.

Our expertise in this area includes design and analysis of public-key encryption primitives, digital signature schemes and primitives with advanced functionalities (such as verifiable delay functions), and more complex, multi-party protocols such as secret sharing schemes, reputation systems and e-voting schemes.

  • Pradel G, Mitchell C. Privacy-preserving biometric matching using homomorphic encryption. In Zhao L, Kumar N, Hsu RC, Zou Z, editors, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Los Alamitos: IEEE Press. 2021
  • Garms L, Ng S-L, Quaglia E, Traverso G. Anonymity and Rewards in Peer Rating Systems. Journal of Computer Security. 2021 Nov 4;1-57.
  • Chen L, Ng S-L. Securing emergent behaviour in swarm robotics. Journal of Information Security and Applications. 2021 Oct 20.
  • Li W, Mitchell CJ. User Access Privacy in OAuth 2.0 and OpenID Connect. In Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press. 2020. p. 664-672
  • Li W, Mitchell CJ, Chen T. OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect. In Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM. 2019. p. 35-44
  • Garms L, Martin K, Ng S-L. Reputation Schemes for Pervasive Social Networks with Anonymity. In Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE. 2017. p. 1-6
  • Laing T, Martin K, Ng S-L, Tomlinson A. Security in Swarm Robotics. In Tan Y, editor, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. IGI Global. 2015. p. 42-66

Explore Royal Holloway

Arrivals Sept 2017 77 1.jpg

Get help paying for your studies at Royal Holloway through a range of scholarships and bursaries.

clubs-societies_REDUCED.jpg

There are lots of exciting ways to get involved at Royal Holloway. Discover new interests and enjoy existing ones.

Accommodation home hero

Heading to university is exciting. Finding the right place to live will get you off to a good start.

Support and wellbeing 2022 teaser.jpg

Whether you need support with your health or practical advice on budgeting or finding part-time work, we can help.

Founders, clock tower, sky, ornate

Discover more about our academic departments and schools.

REF_2021.png

Find out why Royal Holloway is in the top 25% of UK universities for research rated ‘world-leading’ or ‘internationally excellent’.

Immersive Technology

Royal Holloway is a research intensive university and our academics collaborate across disciplines to achieve excellence.

volunteering 10th tenth Anniversary Sculpture - research.jpg

Discover world-class research at Royal Holloway.

First years Emily Wilding Davison Building front view

Discover more about who we are today, and our vision for the future.

RHC PH.100.1.3 Founders south east 1886.w

Royal Holloway began as two pioneering colleges for the education of women in the 19th century, and their spirit lives on today.

Notable alumni Kamaladevi Chattopadhyay

We’ve played a role in thousands of careers, some of them particularly remarkable.

Governance

Find about our decision-making processes and the people who lead and manage Royal Holloway today.