Prof. Lucas Chi Kwong Hui

Prof. Lucas Chi Kwong Hui

Department of Computer Science

University of Hong Kong, China




1992  Ph.D., University of California, USA

1990  M.Sc., University of California, USA

1986  B.Sc., University of Hong Kong, China

Publications (Selected)

  1. Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., OPQ: OT-based Private Querying in VANETs, to appear in IEEE Transactions on Intelligent Transportation Systems, 2011.
  2. Chim T.W., Yiu S.M., Hui C.K. and Li V.O.K., PASS: Privacy-preserving Authentication Scheme for Smart Grid Network') to appear in 2011 IEEE SmartGridComm 2011.
  3. Patrick P.F. Chan, Lucas Hui, S.M. "A Privilege Escalation Vulnerability Checking System for Android Applications" to appear in 13th IEEE International Conference on Communication Technology (IEEE ICCT 2011), Jinan, China. (Best Paper Award), 2011.
  4. Shuhui Hou, Tetsutaro Uehara, S.M. Yiu, Lucas C.K. Hui, K.P. Chow, “Privacy Preserving Confidential Forensic Investigation for Shared or Remote Servers”, to appear in The Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP11), Dalian, China. (Best Paper Award), 2011.
  5. Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui. “Checking Key Integrity Efficiently for High Speed Quantum Key Distribution by using Combinatorial Group Testing,” Optics Communications, 284(1), pp.531-535, 2010. doi:10.1016/j.optcom.2010.08.066.
  6. Junbin Fang, Zoe Lin Jiang, S.M. Yiu, Lucas C.K. Hui. “An Efficient Scheme for Hard Disk Integrity Check by Hashing with Combinatorial Group Testing,” to appear in International Journal of Digital Content Technology and its Applications, 2011.
  7. Junbin Fang, Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Zichen Li. "Efficient key integrity verification for quantum cryptography using combinatorial group testing" in Quantum Information and Computation VIII, Proc. of SPIE vol. 7702, 77020F, Orlando, USA, 2010. doi:10.1117/12.853234.
  8. WANG Meiqin, WANG Xiaoyun, CHOW KP & HUI Lucas C.K., “New Differential Cryptanalytic Results for Reduced-Round CAST-128”, to appear in IEICE 2010.
  9. WANG Meiqin, WANG Xiaoyun, & HUI Lucas C.K., “Differential-Algebraic Cryptanalysis of Reduced-Round of Serpent-256”, J. Science in China Series F: Information Science, 2010, 53: doi10.1007/s11432-010-0048-2.
  10. Zoe L. Jiang, S.M.Yiu, Y.Dong, L.C.K. Hui, S.H.Y.Wong. “Secure Chained Threshold Proxy Signature without and with Supervision”, Journal of Software Engineering and Applications, to appear 2010.
  11. Eric Ke Wang, L.C.K.Hui and S.M.Yiu. “A Practical SMS-Based Mutual Authentication Protocol for Secure Online Banking” in Proceeding of International Conference on Security & Management (SAM'09), U.S.A., July, 2009.
  12. Kin Ying Yu, S.M. Yiu, Lucas C.K. Hui. “RFID Forward Secure Authentication Protocol: Flaw and Solution”, the 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS 2009), in conjunction with 3rd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2009), Fukuoka, Japan, March 16-19, 2009, pp. 627-632.
  13. Frank Y.W. Law, Pierre K.Y. Lai, Zoe L. Jiang, Ricci S.C. Ieong, Michael Y.K. Kwan, K.P. Chow, Lucas C.K. Hui, S.M. Yiu, C.F. Chong. Protecting Digital Legal Professional Privilege (LPP) Data, in Proceedings of the third International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2008), Oakland, California, USA, May 18-22, 2008. pp. 91-101. (Best Paper Award).
  14. Zoe L. Jiang, Lucas C.K. Hui, and S.M. Yiu. Analysis of K-Dimension Hashing Scheme to Improve Disk Sector Integrity, Fourth Annual IFIP WG 11.9 International Conference on Digital Forensics, Kyoto, Japan, January 27 - 30, 2008. Japan, Springer Boston, 2008, 285: 87- 98.
  15. Zoe L. Jiang, S.M. Yiu, L.C.K. Hui, Y. Dong, S.H.Y. Wong. “ Chained Threshold Proxy Signature without and with Supervision”, in Proceedings of 2008 International Conference on Computer Science and Software Engineering (CSSE 2008), Wuhan, China, December 12-14, 2008.
  16. Z.C. Li, C.F. Chong, Lucas C.K. Hui, S.M. Yiu, K.P. Chow, W.W. Tsang, H.W. Chan, and K.H. Pun. ”An Attack on Libert et al.'s ID-Based Undeniable Signature Scheme”, in International Journal of Network Security, Vol.5, No.2, pp. 220-223, September 2007.
  17. K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu. BTM – An Automated Rule-based BT Monitoring System for Piracy Detection, in Proceedings of the Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE Computer Science Press.
  18. Y. Dong, A.F. Sui, S.M. Yiu, Victor O.K. Li, Lucas C.K. Hui, and H.W. Go. An Efficient Cluster-based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks, in 2007 IEEE International Conference on Communications (ICC 2007).
  19. E.Y.K. Chan, H.W. Chan, K.M. Chan, P.S. Chan, S.T. Chanson, M.H. Cheung, C.F. Chong, K.P. Chow, A.K.T. Hui, L.C.K. Hui, S.K. Ip, C.K. Lam, W.C. Lau, K.H. Pun, Y.F. Tsang, W.W. Tsang, C.W. Tso, D.Y. Yeung, S.M. Yiu, K.Y. Yu, W. Ju., “Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Test-bed”, in The IEEE Journal on Selected Areas in Communications, special issue on High-speed Network Security, 2006.
  20. Sherman S.M. Chow, Richard W.C. Lui, Lucas C.K. Hui, S.M. Yiu. Identity Based Ring Signature: Why, How and What Next, in Proceedings of the Second European PKI Workshop (EUROPKI 2005), The University of Kent, England, 30 June - 1 July 2005. Editors: D. Chadwick and G. Zhao, Lecture Notes in Computer Science 3545, pp.144-161, Springer-Verlag, 2005.
  21. Richard W.C. Lui, Sherman S.M. Chow, Lucas C.K. Hui and S.M. Yiu. Efficient Authorization In Delegation With Supervision, in Proceedings of the First International Workshop on Security in Networks and Distributed Systems (SNDS2005), pp. 240-244, in conjunction with the 11th International Conference on Parallel and Distributed Systems (ICPADS-2005), Fukuoka, Japan, July 20-22, 2005. IEEE Computer Society Press. (Best Paper Award)
  22. Sherman S.M. Chow, S.M. Yiu, and Lucas C.K. Hui. Efficient Identity Based Ring Signature, In Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, USA, June 7-10, 2005, Proceedings. Lecture Notes in Computer Science Volume 3531, pp.499-512, Springer-Verlag, 2005.
  23. Sherman S.M. Chow, S.M. Yiu, Lucas C.K. Hui, & K.P. Chow. “Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity”, in Jong In Lim and Dong Hoon Lee, editors, Proceedings of the Sixth Annual International Conference on Information Security and Cryptology (ICISC 2003), Volume 2971 of Lecture Notes in Computer Science, pages 352-369, Seoul, Korea, 2003, Springer-Verlag.
  24. Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, & H.W. Chan. ”Security of Tseng-Jan's Group Signature Schemes”, Information Processing Letters, Vol. 75, No. 5, pp.187-189, 2000.
  25. Z.C. Li, L.C.K. Hui, K.P. Chow, C.F. Chong, W.W. Tsang, & H.W. Chan. “Cryptanalysis of Harn's Digital Multisignature with Distinguished Signing Authorities”, Electronic Letters, Vol. 36, No. 4, pp.314-315, 2000.