Sherman S.M. CHOW [BEng(1st Hon.), MPhil, MS, PhD]
Fresh PhD Graduate, Cryptography Group, Department of Computer Science, Courant Institute of Mathematical Sciences, New York University
- I am looking for a long-term research position in industry/academia, program committee and editorial board participations. Research/Teaching statement and CV are available upon request.

 PhD Thesis: New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption

 [Committee: Yevgeniy Dodis (co-advisor), Victor Shoup (co-advisor), Rosario Gennaro (IBM), Craig Gentry (IBM), Lakshminarayanan Subramanian (NYU), Moti Yung (Columbia/Google)]

 - Melissa Chase, S. Chow.
   Improving Privacy and Security in Multi-Authority Attribute-Based Encryption.
   ACM Conference on Computer and Communications Security, CCS 2009, p.121-130.
 - S. Chow.
   Removing Escrow from Identity-based Encryption.
   Public Key Cryptography - PKC 2009, LNCS 5443, p.256-276.
 

 Selected Publications (06 - 10)

 - S. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters.
   Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions.
   ACM Conference on Computer and Communications Security, CCS 2010, p. 152-161.
 - S. Chow. Jian Weng, Yanjiang Yang, Robert H. Deng
   Efficient Unidirectional Proxy Re-Encryption. AfricaCrypt 2010, LNCS 6055, p.316-332.
 - S. Chow.
   Real Traceable Signatures.
   Selected Areas in Cryptography, SAC 2009, LNCS 5867, p.92-107.
 - S. Chow, Jie-Han Lee, Lakshminarayanan Subramanian.
   Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
   Network and Distributed System Security Symposium, NDSS 2009.
 - S. Chow, Volker Roth, Eleanor G. Rieffel.
   General Certificateless Encryption and Timed-Release Encryption.
   Security and Cryptography for Networks, SCN 2008, LNCS 5229, p.126-143.
 - S. Chow, Joseph K. Liu, Duncan S. Wong.
   Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
   Network and Distributed System Security Symposium, NDSS 2008, p.81-94.
 - S. Chow, Colin Boyd, Juan Manuel Gonzalez Nieto.
   Security-Mediated Certificateless Cryptography.
   Public Key Cryptography - PKC 2006, LNCS 3958, p.508-524.
 - For a list of elder papers, please refer to my page at http://www.cs.hku.hk/~smchow.
 

 Work in Progress / Under Submission (Collaboration is always welcome!)

 - Optimal Sybil-Resilient Node Admission Control (with Tran, Li and Subramanian)
   Brief announcement in PODC 2010
 - Secure Information Flow in Trust Networks: Secure Routing in Sparse Networks (with Subramanian, Tierney, Sankararaman and Ramasubramanian)
 - Secure Information Flow in Trust Networks: Establishing Trust in Decentralized Online Trust Networks (with Subramanian, Tierney, Sankararaman and Ramasubramanian)
 - Scalable Data Sharing in Secure Cloud Storage (with Chu, Tzeng, Zhou and Deng)
 - Privacy-Preserving Public Auditing for Secure Cloud Storage (with Wang, Wang, Ren and Lou)
   Preliminary version appeared in Infocom 2010
 

 Program Committee Memberships (10 - 11)

 - 12thInternational Conference on Cryptology in India, Indocrypt 11 PC chairs: Daniel J. Bernstein and Sanjit Chatterjee
 - 10th International Conference on Cryptography and Network Security, CANS 11 - PC chairs: Xiaoyun Wang and Gene Tsudik
 - 13th International Conference on Information and Communications Security, ICICS 11 - PC chairs: Sihan Qing, Willy Susilo and Guilin Wang
 - 8th European Workshop on Public Key Infrastructures, Services, and Applications, EuroPKI 11 - PC chairs: Svetla Nikova and Gunther Pernul
 - 14th International Conference on Information Security, ISC 11 PC chairs: Xuejia Lai and Jianying Zhou
 - 5th International Conference on Provable Security, ProvSec 11 PC chairs: Xavier Boyen and Xiaofeng Chen
 - 16th Australasian Conference on Information Security and Privacy, ACISP 11 PC chairs: Udaya Parampalli and Phillip Hawkes
 - 1st International Workshop on Security in Computers, Networking and Communications, SCNC 11 (in conjunction with IEEE INFOCOM 11) PC chairs: Hui Chen, Xu Li, Rongxing Lu and Bo Sun
 - 9th International Conference on Cryptology and Network Security, CANS 10 PC chairs: Swee-Huay Heng and Rebecca Wright
 - 11th International Conference on Cryptology in India, Indocrypt 10 PC chairs: Guang Gong and Kishan Chand Gupta
 

 Courses Taken (Fall 05 - Spring 08)

  Computer Science
 - G22.2270-001 Computer Graphics by Ken Perlin [My Work]
 - G22.3033-006 Producing Production Quality Software by Arthur Goldberg
 - G22.3033-007 What if a Computer Lies? by Lakshmi Subramanian
 - G22.3033-008 Computer Games by Ken Perlin [My Work]
 - G22.3110-001 Honors Programming Languages by Benjamin Goldberg
 - G22.3520-001 Honors Analysis of Algorithms by Victor Shoup
  Cryptography
 - G22.3033-013 Exposure-Resilient Cryptography by Yevgeniy Dodis
 - G22.3210-001 Introduction to Cryptography by Yevgeniy Dodis
 - G22.3220-001 Advanced Cryptography by Victor Shoup
 - G22.3220-001 Cryptography and Imperfect Randomness by Yevgeniy Dodis
 - G22.3813-005 Independent Study with Yevgeniy Dodis
 - G22.3813-005 Independent Study with Victor Shoup
 - G22.3850-001 PhD Research Seminar - Cryptography by Yevgeniy Dodis
  Mathematics
 - G22.3033-002 Introduction to Computational Number Theory and Algebra by Victor Shoup
 - G22.3033-008 Introduction to Finance for CS by Eran Fishler
 - G63.2043-001 Scientific Computing by Jonathan Goodman
 - G63.2110-001 Linear Algebra I by Ray Michalek
 - G63.2120-001 Linear Algebra II by Ray Michalek
  Internships
 - G22.3813-008 Curriculum Practical Training
 

 Crypto Presentations (06 - 09) (*: presenting others' papers)

 - Improving Privacy and Security in Multi-Authority Attribute-Based Encryption (CCS 09, reading group, and invited talks)
    (December 3, 09 | 1:30-2:30pm | DC 1304, University of Waterloo, Canada)
    (November 10, 09 | 10:50-11:15am | Hyatt Regency, Chicago, IL, USA)
    (November 4, 09 | 2:30-3:30pm | ACES 2.404B, University of Austin, Texas, USA)
    (October 22, 09 | 3:30-5:00pm | WWH 312, NYU)

 - Real Traceable Signatures (SAC 09)
    (August 13, 09 | 11:05-11:30am | Science Theater, University of Calgary, Canada)
 - Removing Escrow from Identity-Based Encryption (PKC 09)
    (March 19, 09 | 10:15-10:40am | Bren School of Information and Computer Sciences, UCI, USA)
 - Zero-Knowledge Proofs with Witness Elimination* (PKC 09)
    (March 18, 09 | 3:15-3:40pm | Bren School of Information and Computer Sciences, UCI, USA)
 - General Certificateless Encryption and Timed-Release Encryption (SCN 08)
    (September 11, 08 | 3:00-3:25pm | Sala Ibsen, Amalfi, Italy)
 - Robust Receipt-Free Election System with Ballot Secrecy and Verifiability (NDSS 08)
    (February 11, 08 | 2:30-3:00pm | The Dana on Mission Bay, San Diego)
 - Batch Pairing Delegation (IWSEC 07)
    (October 31, 07 | 11:00-11:30am | New Public Hall, Nara, Japan)
 - Strongly-Secure Identity-Based Key Agreement and Anonymous Extension (ISC 07)
    (October 12, 07 | 11:35-11:59am | Hotel Del Mar, Chile)
 - Token-Controlled Public Key Encryption in the Standard Model (ISC 07)
    (October 12, 07 | 9:00-9:30am | Hotel Del Mar, Chile)
 - Authenticated Key Exchange Secure Against Dictionary Attacks* (reading group)
    (October 5, 07 | 2:00-3:45pm | WWH102, NYU)
 - Full-Domain Subgroup Hiding and Constant-Size Group Signatures* (reading group)
    (March 29, 07 | 1:45-3:00pm | WWH102, NYU)
 - Practical Identity-Based Encryption Without Random Oracles* (reading group)
    (October 5 | 12:15-1:45pm | WWH1302, NYU)
 - Security Mediated Certificateless Cryptography (PKC 06)
    (April 26, 06 | 4:00-4:30pm | Davis Auditorium, CESPR, Columbia University)
 - Ring Signatures without Random Oracles (reading group)
    (February 3, 06 | 1:00-2:30pm | WWH101, NYU)
  

 Conferences Attended (06 - 10)

 - CCS 2010: ACM Conference on Computer and Communications Security
    (October 4-8 | Hyatt Regency, Chicago, IL, USA)
 - CCS 2009: ACM Conference on Computer and Communications Security
    (November 9-13 | Hyatt Regency, Chicago, IL, USA)
 - Face of Modern Cryptography
    (September 11 | Shepard Hall, The City College of New York, NY, USA)
 - SAC 2009: Selected Areas in Cryptography - 16th International Workshop
    (August 13-14 | University of Calgary, Alberta, Canada)
 - Crypto in the Cloud Workshop
    (August 2-5 | CSAIL, Massachusetts Institute of Technology, Cambridge, MA, USA)
 - PKC 2009: Practice and Theory in Public Key Cryptography - 12th International Conference
    (March 18-20 | University of California, Irvine, CA, USA)
 - SCN 2008: Security and Cryptography for Networks - 6th International Conference
    (September 10-12 | Sala Ibsen, Amalfi, Italy)
 - TCC 2008: Theory of Cryptography - 5th Conference
    (March 19-21 | New York University, New York, NY, USA)
 - NDSS 2008: Network and Distributed System Security - 15th Annual Symposium
    (February 10-13 | San Diego, CA, USA)
 - IWSEC 2007: Advances in Information and Computer Security - 2nd International Workshop
    (October 29-31 | Nara, Japan)
 - ISC 2007: Information Security - 10th International Conference
    (October 9-12 | Valparaiso, Chile)
 - CRYPTO 2006: Advances in Cryptology - 26th Annual International Cryptology Conference
    (August 20-24 | University of California, Santa Barbara, CA, USA)
 - PKC 2006: Practice and Theory in Public Key Cryptography - 9th International Conference
    (April 24-26 | Columbia University, New York, NY, USA)
 - TCC 2006: Theory of Cryptography - 3rd Conference
    (March 4-7 | Columbia University, New York, NY, USA)
 

 Schedule

10/09DCC Review
11/30FC Review
12/24INS Review


Click for New York, New York Forecast
Last updated: 11/12/13