Cybersecurity Lecture Series - Shan Chen

Event Details
  • Date/Time:
    • Friday March 10, 2017 - Saturday March 11, 2017
      12:00 pm - 12:59 pm
  • Location: Klaus Advanced Computing Building, KACB #1116W, 266 Ferst Dr., Atlanta, GA
  • Phone:
  • URL:
  • Email:
  • Fee(s):
  • Extras:

Lindsey Panetta,


Summary Sentence: Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions.

Full Summary: No summary paragraph submitted.

  • Cybersecurity Lecture Series Cybersecurity Lecture Series

Meet academic and industry leaders for intimate discussions about new cyber threats, trends and technologies.

The Cybersecurity Lecture Series is a free, open-to-the-public lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from private companies, government agencies, start-up incubators as well as Georgia Tech faculty and students presenting their research.

Held weekly each Friday at Noon through Apr. 21, lectures are open to all -- students, faculty, industry, government, or simply the curious. Graduate students may register for credit under seminar course CS-8001-INF.

Complimentary lunch provided for registered guests. Please bring your own beverage.

Sign up to receive future lecture announcements.


Featuring Shan Chen on Mar. 10, 2017

"Human Computing for Handling Strong Corruptions in Authenticated Key Exchange"


ABSTRACT   |   Ph.D. Student Shan Chen presents user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. He will define the security model for Human Authenticated Key Exchange (HAKE) protocols and propose two generic protocols based on human-compatible (HC) functions, password-authenticated key exchange (PAKE), commitment, and authenticated encryption. Chen will prove that HAKE protocols can remain secure under reasonable assumptions and will discuss efficient instantiations. He'll also propose a variant where users get help from a small device such as RSA SecurID. This allows implementation of an HC function with stronger security and weakens required assumptions on the PAKE. Overall, this leads to the very efficient HAKE, which can withstand strong corruptions.


BIO   |   Shan Chen is a Ph.D. student in the School of Computer Science at the Georgia Institute of Technology. His research interests are in the areas of cryptography and applied cryptography.



Additional Information

In Campus Calendar

College of Computing, College of Computing Events, Institute for Information Security and Privacy, School of Computational Science and Engineering, School of Computer Science, School of Interactive Computing

Invited Audience
Faculty/Staff, Public, Undergraduate students, Graduate students
  • Created By: Tara La Bouff
  • Workflow Status: Published
  • Created On: Feb 28, 2017 - 5:15pm
  • Last Updated: Apr 13, 2017 - 5:12pm