题目: Ring Signatures andCrypto-Currencies
Introduced in 2001, a ringsignature is a type of digital signature that can be created by anyone in a groupof people. In contrast to group signatures, ring signatures are ad-hoc and donot require any coordination among the users. It is originally designed as away to leak a secret. Since then, it has found applications as a building inother cryptographic primitives, such as optimistic fair exchange, designatedverifier signatures and ad-hoc key exchange.
In this talk, we are going to reviewexisting results on ring signatures and their variants. Next, we introduceMonero, one of the most popular blockchain-based crypto-currencies. Inparticular, we discuss how variants of ring signatures are applied in Monero toensure its security and privacy.
We conclude the talk with someopen problems related to the use of ring signatures in blockchain-basedcrypto-currency and some promising directions.
Dr. Au is currently an assistant professorat the Department of Computing, the Hong Kong Polytechnic University. He hasbeen a lecturer at the School of Computer Science and Software Engineering,University of Wollongong, Australia.
Dr. Au’s research interests includeInformation Security and Privacy, Applied Cryptography, Accountable Anonymityand Cloud Computing. He has published over 100 refereed journal and papers,including the well-respected ACM Conference on Computer and CommunicationsSecurity (CCS) and the Network and Distributed System Security Symposium(NDSS). His work received many awards, including the 2009 PET runner-up awardfor outstanding research in privacy enhancing technologies and the best paperaward at ACISP 2016. According to Google Scholar, his work has been cited formore than 2000 times, with an h-index of 24 and i-10 index of 54.
Dr. Au is an active member in the communityand has served as a program committee member of around 30 international conferences.He has served as a PC co-chair of the 12th International Conference on Green,Pervasive and Cloud Computing, the 9th International Conference on ProvableSecurity and the 8th International Conference on Network and System Security.He is an associate editor of the Journal of Information Security andApplications, Elsevier. He has served as a guest editor for various journalsincluding Future Generation Computer Systems, Elsevier and Concurrency andComputation: Practice and Experience, Wiley.