Personal profile
Personal profile
Ela completed her BSc Mathematics degree from Royal Holloway in June 2013 with a First Class Honours, taking modules focusing on cryptography. During this time she completed a project in pseudo-random number generation. The following summer she was an intern at the Information Security team at QinetiQ, looking at protocols and key management. In 2013-2014 she completed the MSc Information Security at Royal Holloway, finishing with a Distinction. Her masters' thesis focused on flexibility within cryptographic primitives, particularly on the SHA-3 cryptographic hash standard.
Ela is happy to have joined the the CDT 2014 cohort for her PhD studies. For her first year summer project she worked with industry to provide a solution for verifying Cloud storage and encryption of files under the correct access keys. current research is on defining trust in the Cloud, as a means of clarifying the trust assumptions made in Cloud solutions and how this impacts security proofs.
Ela's current research is on cryptography in the Cloud, particularly proxy re-encryption and looking at how we define trust in cryptography.
Education/Academic qualification
Information Security, MSc
23 Sept 2013 → 5 Sept 2014
Award Date: 17 Dec 2014
Mathematics, BSc, Royal Holloway, University of London
20 Sept 2010 → 13 Jun 2013
Award Date: 18 Jul 2013
-
Advancements in Proxy Re-Encryption: Defining Security for wider Applications
Lee, E., 2020, (Unpublished) 221 p.Research output: Thesis › Doctoral Thesis
File455 Downloads (Pure) -
Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Strong Post-Compromise Secure Proxy Re-Encryption
Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, (E-pub ahead of print) Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Activities
-
24th Australasian Conference on Information Security and Privacy, ACISP 2019
Lee, E. (Speaker)
3 Jul 2019 → 5 Jul 2019Activity: Participating in or organising an event › Participation in a conference
-
Real World Crypto 2018
Lee, E. (Participant)
10 Jan 2018 → 12 Jan 2018Activity: Participating in or organising an event › Participation in a conference
-
Latincrypt 2017
Lee, E. (Speaker)
20 Sept 2017 → 22 Sept 2017Activity: Participating in or organising an event › Participation in a conference
-
Quantum Safe Workshop
Lee, E. (Participant)
14 Sept 2017 → 15 Sept 2017Activity: Participating in or organising an event › Workshop, seminar, course or webinar.