董事长信箱
当前位置: 首页>公司团队
教师详情
  • 个人信息
    朱岩

    Zhu yan

    系      所:
    |计算机科学与技术系|
    职      称:
    教授  
    职      务:
    计算机系本科教学主任
    办公地点:
    机电楼202室(详情请参见网络安全实验室主页http://crypto.ustb.edu.cn)
    办公电话:
    62334905
    电子邮箱:
    zhuyan@ustb.edu.cn
    本 科 课 程:
    网络安全与管理 信息理论与编码 数字签名与身份认证计数 网络空间安全前沿技术研讨 密码学应用与实践
    员工课程:
    信息安全前沿讨论
    科 研 方 向:
    信息安全、区块链与智能合约、云计算、代码法律化、代数与密码学、安全计算
    学术与社会兼职:
    密码学会安全协议专委会委员、电子学会区块链分会专委会副主任
  • 简   历

     

    2005-2013就职于北京大学

    2008-2009美国亚利桑那州立大学

    2012-2012美国密西根大学

    2013-至今 kaiyun体育登录网页入口

     

  • 代表性论文

     

    1.       PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Transactions on Cloud Computing, 2018, 6(4): 1110-1124.

    2.       Dual-mode broadcast encryption. Science China Information Sciences, 2018, 61(11): 0-118101.

    3.       Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Transactions on Reliability, 2019, 68(4): 1330-1346.

    4.       Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2270-2283. 

    5.       From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Transactions on Services Computing, 2015, 8(4): 601-616.

    6.       Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud. International Journal of Cooperative Information Systems, 2017, 26(4): 0-1750003. 

    7.       Efficient Attribute-Based Comparable Data Access Control. IEEE Transactions on Computers, 2015, 64(12): 3430-3443.

    8.       Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mobile Networks and Applications, 2015, 20(3): 297-307.

    9.       New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. Frontiers of Computer Science, 2019, 13(6): 1182-1197.

    10.   Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers of Computer Science, 2020, 14(4): 0-144806.

    11.   Digital asset management with distributed permission over blockchain and attribute-based access control. In Proceedings of the 2018 IEEE International Conference on Services Computing, SCC 2018.

    12.   TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.

    13.   Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 10th ACM Symposium on Information, Computer and Communications Security, 2015-4-14

    14.   SPESC: A Specification Language for Smart Contracts. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.

    15.   Provably secure cryptographic ABAC system to enhance reliability and privacy using real-time token and dynamic policy. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability, and Security, QRS 2018, 2018-7-16.

    16.   Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Transactions on Parallel and Distributed Systems (TPDS). 2012, vol. 23, no.12, pp.2231-2244.

    17.   Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227-238. 

    18.   Efficient Audit Service Outsourcing for Data Integrity in Clouds. Journal of Systems and Software, 2012, 85(5): 1083-1095.

    19.   Zero-knowledge Proofs of Retrievability. Science China Information Sciences, 2011, 54(8): 1608-1617.

    20.   Efficient Provable Data Possession for Hybrid Clouds. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, 2010-10-4.

    21.   基于群组密码的对等VPN系统及多播密钥分发协议. 软件学报, 2018.

    22.   区块链技术及其研究进展. 工程科学学报, 2019, 41(11): 1361-1373.

    23.   基于安全多方计算的区块链智能合约执行系统. 密码学报, 2018, 6(02): 246-257.

    24.   一种高级智能合约转化方法及竞买合约设计与实现,计算机学报,2020.

     

  • 科研业绩

     

    1.   国家重点研发计划重点专项基于区块链技术的智能合约服务2019-2022

    2.   国家自然科学基金集合成员关系的密码学构造方法及其应用研究2020-2023

    3.   国家自然科学基金基于NP完全类问题的抗两字计算密码基础理论研究2017-2019

    4.   国家自然科学基金支持时空属性的安全访问控制技术研究2015-2018

    5.   国家自然科学基金外援存储中的数据完整性验证技术研究2012-2015

     

  • 获得奖励/专利

     

    1.      一种分布式计算中基于密码学的除法协议构造方法, CN200910222922.6

    2.     一种集合成员关系判定的密码学构造方法及系统, CN201510013367.1

    3.     一种具有层次关系的密钥控制与公钥广播加密方法, CN200910222921.1

    4.     一种具有选择和排除功能的群组加解密方法及系统, CN201510012649.X

    5.     一种分布式计算的逻辑比较方法, CN200910222920.7

    6.     一种基于属性集及关系谓词的加密系统及访问控制方法, CN201511000960.9

    7.     一种基于动态规则的密码学属性基访问控制方法与系统,CN201711100571.2

    8.     一种基于群组密码体制的电子邮件认证方法与系统, CN201711289023.9

    9.     一种基于信任网络的去中心化公钥管理方法和管理系统, CN201611218516.9

    10. Method and System for Cryptographic Decision-making of Set Membership, US2017/0359177A1

     

  • 计通NEWS
  • 索思