Peter Ryan

Peter Ryan

Professor in Applied Security

Research Topics Information assurance/security, Cryptography, Secure voting systems
Faculty or Centre Faculté des Sciences, de la Technologie et de la Communication
Research Unit CSC
Postal Address Campus Kirchberg, Université du Luxembourg
6, rue Richard Coudenhove-Kalergi
L-1359 Luxembourg
Campus Office F 212
Email
Telephone (+352) 46 66 44 5667
Fax (+352) 46 66 44 5500
Video Prof. Peter Ryan (SnT)
Prof. Peter Ryan (SnT)
 
Peter Ryan - Professor in Applied Security

In February of 2009, Peter Ryan took up a position as full Professor of Applied Security at the University of Luxembourg. He has over 20 years of experience in cryptography, information assurance and formal verification. He pioneered the application of process algebras to modelling and analysis of secure systems, presenting the first process algebra (CSP) formulation of non-intereference at the Computer Security Foundations Workshop in 1989. In 1993, while at DRA, he initiated and led the "Modelling and Analysis of Security Protocols" research project that developed the CSP and model-checking approach to the analysis of security protocols. This project broke away from the trend of employing bespoke frameworks such as the epistemic BAN-logic and used mainstream formal methods notations and tools. Notable achievements of this project were the discovery by Gavin Lowe of the now famous flaw in the Needham-Schroeder Public Key protocol that had lain undiscovered for around 17 years.

He has published extensively on cryptography, cryptographic protocols, mathematical models of computer security and, most recently, high assurance voting systems. He is the creator of Prêt à Voter, Pretty Good Democracy (with Vanessa Teague) and OpenVote (with Feng Hoa) verifiable voting schemes. Also with Feng Hao he has been developing and analysing a novel Password Authenticated Key Establishment Protocol J-PAKE.

Prior to joining the University of Luxembourg he was a Professor of Computing Science at Newcastle University. He has worked at GCHQ, the Defence Research Agency, the Stanford Research Institute in Cambridge and the Software Engineering Institute, CMU Pittsburgh.

He holds a PhD in mathematical physics from the University of London.

Peter Ryan has been on program committees of numerous prestigious security conferences, notably: IEEE Security and Privacy, IEEE Computer Security Foundations Workshop, the European Symposium On Research In Computer Security (ESORICS), WITS (Workshop on Issues in Security). He was Chair of WITS’04 (Workshop on Issues in the Theory of Security) and Co-chair of ESORICS’04, co-chair of Frontiers of Electronic Elections FEE 2005, Chair WOTE 2007 (Workshop On Trustworthy Elections). From 1999 to 2007 he was the Chair of the ESORICS Steering Committee. He is a Fellow of the BCS and IMA.

He is also a Visiting Professor at the University of Surrey (UK).

Research topics:Information assurance, cryptography, cryptographic protocols, modelling and analysis of secure systems and security policies, analysis of information flow, cryptographic voting schemes, quantum cryptography and soico-technical aspects of security.

The book "Modelling and Analysis of Security Protocols" is now available online:

http://www.computing.surrey.ac.uk/personal/st/S.Schneider/books/MASP.pdf
 
 

Last updated on: Wednesday, 14 October 2015

powered by
orbilu.uni.lu

2016

Full Text
See detailSelene: Voting with Transparent Verifiability and Coercion-Mitigation
Ryan, Peter; Roenne, Peter; Iovino, Vincenzo

in 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

Top of Page

2015

Full Text
See detailInformation Leakage due to Revealing Randomly Selected Bits
Atashpendar, Arash; Roscoe, Bill; Ryan, Peter

in Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (2015, November 25)

Full Text
See detailA Secure Exam Protocol Without Trusted Parties
Bella, Giampaolo; Giustolisi, Rosario; Lenzini, Gabriele; Ryan, Peter

in ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 (2015)

Full Text
See detailFormal Security Analysis of Traditional and Electronic Exams
Dreier, Jannik; Giustosi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele; Ryan, Peter

in Communications in Computer and Information Science (2015), 554

Full Text
See detailEnd-to-end verifiability
Ryan, Peter; Benaloh, Josh; Rivest, Ronald; Stark, Philip; Teague, Vanessa; Vora, Poorvi

in arXiv preprint arXiv:1504.03778 (2015)

Full Text
See detailPrivacy and Security in an Age of Surveillance
Ryan, Peter; Preneel, Bart; Rogaway, Phillip; Ryan, Mark D.

Report (2015)

Full Text
See detailSelene: Voting with Transparent Verifiability and Coercion-Mitigation
Ryan, Peter; Roenne, Peter; Iovino, Vincenzo

in 1st Workshop on Advances in Secure Electronic Voting (2016), 2015

Full Text
See detailEnd-to-End Verifiability in Voting Systems, from Theory to Practice
Ryan, Peter; Schneider, Steve; Teague, Vanessa

in IEEE SECURITY & PRIVACY (2015), 13(3), 59-62

Top of Page

2014

Full Text
See detailvVote: a Verifiable Voting System
Culnane, Chris; Ryan, Peter; Schneider, Steve; Teague, Vanessa

in Jets (2014)

Full Text
See detailTrapdoor Privacy in Asymmetric Searchable Encryption Schemes
Delerue Arriaga, Afonso; Tang, Qiang; Ryan, Peter

in Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014 (2014)

Full Text
See detailFormal Analysis of Electronic Exams
Dreier, Jannik; Giustolisi, Rosario; Kassem, Ali; Lafourcade, Pascal; Lenzini, Gabriele; Ryan, Peter

in SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014 (2014)

Full Text
See detailRemark!: A Secure Protocol for Remote Exams
Giustolisi, Rosario; Lenzini, Gabriele; Ryan, Peter

in Security Protocols XXII - Lecture Notes in Computer Science (2014)

Full Text
See detailPrivacy and Security in an Age of Surveillance
Preneel, Bart; Rogaway, Phillip; Ryan, Mark D.; Ryan, Peter

in Dagstuhl Reports (2014), 4(9), 106-123

Full Text
See detailDoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity
Ryan, Peter; Phatak, Dhananjay S.; Tang, Qiang; Smith, Warren D.; Sherman, Alan T.; Kalpakis, Kostas

in IACR Cryptology ePrint Archive (2014)

Top of Page

2013

Full Text
See detailFaster Print on Demand for Prêt à Voter
Culnane, Chris; Heather, James; Joaquim, Rui; Ryan, Peter; Schneider, Steve; Teague, Vanessa

in Journal of Election Technology and Systems (2013), 2(1),

Full Text
See detailProving Prêt à Voter Receipt Free Using Computational Security Models
Khader, Dalia; Ryan, Peter; Tang, Qiang

in USENIX Journal of Election Technology and Systems (2013), 1(1), 62-81

See detailPassword-based Authenticated Key Establishment Protocols
Lancrenon, Jean; Khader, Dalia; Ryan, Peter; Hao, Feng

in Computer And Information Security Handbook (2013)

Full Text
See detailVerifiable postal voting
Ryan, Peter; Benaloh, Josh; Teague, Vanessa

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailEnhancements to prepare-and-measure based QKD protocols
Ryan, Peter; Christianson, Bruce

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailPrêt à Voter providing everlasting privacy
Ryan, Peter; Demirel, Denise; Henning, Maria; van de Graaf, Jeroen; Buchmann, Johannes

in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2013)

Full Text
See detailCaveat Coercitor: coercion-evidence in electronic voting
Ryan, Peter; Grewal, Gurchetan S.; Ryan, Mark D.; Bursuc, Sergiu

in 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)

Full Text
See detailVerifiable Voting Systems
Ryan, Peter; Peacock, Thea; Schneider, Steve; Xia, Zhe

in Computer and Information Security Handbook (2013)

Full Text
See detailGeneralized Information Theory for Hints
Ryan, Peter; Pouly, Marc; Kohlas, Juerg

in International Journal of Approximate Reasoning (2013), 54(1), 228-251

Full Text
See detailTesting Voters' Understanding of a Security Mechanism Used in Verifiable Voting
Ryan, Peter; Schneider, Steve; Xia, Zhe; Llewellyn, Morgan; Heather, James; Culnane, Chris

in 53 USENIX Journal of Election Technology and Systems (JETS) (2013), 1(1), 53-61

Full Text
See detailFaster print on demand for Prêt à Voter
Ryan, Peter; Teague, Vanessa; Schneider, Steve; Joaquim, Rui; Heather, James; Culnane, Chris

in USENIX Journal of Election Technology and Systems (JETS) (2013), 2(1),

Full Text
See detailPreventing Coercion in E-Voting: Be Open and Commit
Tabatabaei, Masoud; Jamroga, Wojciech; Ryan, Peter

Scientific Conference (2013, March 17)

Top of Page

2012

Full Text
See detailA Supervised Verifiable Voting Protocol for the Victorian Electoral Commission
Burton, Craig Burton; Culnane, Chris; Heather, James; Peacock, Thea; Ryan, Peter; Schneider, Steve; Teague, Vanessa; Wen, Roland; Xia, Zhe; Srinivasan, Sriramkrishnan

in EVOTE 2012 (2012)

Full Text
See detailA Fair and Robust Voting System by Broadcast
Khader, Dalia; Smyth, Ben; Ryan, Peter; Hao, Feng

in Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) (2012)

Full Text
See detailForeword from the Programme Chairs-STAST 2012
Ryan, Peter; Coles-Kemp, Lizzie

in Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on (2012)

Full Text
See detailUsing Prêt à Voter in Victorian State Elections
Ryan, Peter; Schneider, Steve; Peacock, Thea; Heather, James; Srinivasan, Sriramkrishnan; Teague, Vanessa; Xia, Zhe; Wen, Roland; Culnane, Chris; Burton, Craig

in Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (2012)

Top of Page

2011

See detailSTAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust
Coles-Kemp, Lizzie; Lenzini, Gabriele; Ryan, Peter; Bella, Giampaolo

Book published by IEEE (2011)

Full Text
See detailA Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems
Kramer, Simon; Ryan, Peter

in 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (2011)

Top of Page

2010

Full Text
See detailSecurity protocols for Secret Santa
Mauw, Sjouke; Radomirovic, Sasa; Ryan, Peter

in Proc. 18th Security Protocols Workshop (2010)

Full Text
See detailVersatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
Xia, Zhe; Culnane, Chris; Heather, James; Jonker, Hugo; Ryan, Peter; Schneider, Steve; Srinivasan, Sriramkrishnan

in Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (2010)

Top of Page