後退

講師

數碼創新及科技學系


聯絡方法

電郵: kenkychan@thei.edu.hk

電話: +852 3890 8372

  1. Cryptography
  2. Privacy-Preserving Technologies
  3. Blockchain Technologies
  4. Cybersecurity
  5. Artificial Intelligence
  • Doctor of Philosophy, University of Hong Kong, 2025
  • Bachelor of Engineering in Computer Science, The Hong Kong University of Science and Technology, 2020
  • Lecturer, Technological and Higher Education Institute of Hong Kong, 2026 – now
  • Assistant Lecturer, Hong Kong Metropolitan University, 2025
  • Part-time Cryptographic Engineer, Emali Limited / HKMA-BIS (mBridge), 2023
  • Cryptography
  • Blockchain Technologies
  • Privacy Enhancing Technologies
  • Educational Technologies
  • Artificial Intelligence
  • Speaker, Blockchain Olympic, Hong Kong Blockchain Society, 2023

Selected Publications

  • K.Y. Chan, H. Cui, T. H. Yuen, and S. M. Yiu (2025). DIDO+: Data Provenance from Restricted TLS 1.3 Websites with Selective Disclosure. IEEE Transactions on Dependable and Secure Computing.
  • K.Y. Chan, T. H. Yuen, and S. M. Yiu (2025). Universally Composable Traceable Ring Signature with Verifiable Random Function. Cryptography 9(3), 59.
  • K.Y. Chan, T. H. Yuen, and M. Co (2025). Using ChatGPT for Medical Education: The Technical Perspective. BMC Medical Education, 25, 201
  • Wu, T. H. Yuen, and K. Y. Chan (2024). O-Ring and K-Star: Efficient Multi-party Private Set Intersection. In 33rd USENIX Security Symposium
  • K.Y. Chan, L. Chen, Y. Tian, and T. H. Yuen (2024). Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. The 19th ACM on Asia Conference on Computer and Communications Security, ACM., (ACM AsiaCCS ‘24)
  • H. Xue, M. H. Au, M. Liu, K. Y. Chan, X. Xie, T. H. Yuen, and C. Zhang (2023). Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23). ACM.
  • K. Y. Chan, H. Cui, and T. H. Yuen (2023). DIDO: Data Provenance from Restricted TLS 1.3 Websites. In: Meng, W., Yan, Z., Piuri, V. (eds) Information Security Practice and Experience. ISPEC 2023.
  • H. Cui, K. Y. Chan, T. H. Yuen, X. Kang, and C. K. Chu (2023). Bandwidth-Efficient Zero-Knowledge Proofs for Threshold ECDSA. The Computer Journal, 2023
  • S. Pan, K. Y. Chan, H. Cui, and T. H. Yuen (2022). Multi-signatures for ECDSA and Its Applications in Blockchain. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds) Information Security and Privacy. ACISP 2022.
  • KY. Chan, and T. H. Yuen (2022). Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use. In: Beresford, A.R., Patra, A., Bellini, E. (eds) Cryptology and Network Security. CANS 2022.