徐秋亮教授

 


徐秋亮


徐秋亮教授为山东大学软件学院教授。现任中国密码学会理事,中国电子学会区块链专委会副主任委员,山东网络空间安全专委会主任委员。中国密码学会密码算法专委会、安全协议专委会委员,密码学会密码应用工作委员会委员,中国保密协会隐私保护专委会委员,山东计算机学会常务理事。长期从事密码学与信息安全的研究,在安全多方计算、群组密码等方面具有长期的积累,承担国家自然科学基金面上&重点项目、国家发改委创新示范工程、山东科技重大创新工程等多项国家及省部级项目,在密码学三大顶级会议Asiacrypt,CCF顶级期刊TDSC等高水平刊物发表论文100余篇。现在的主要研究兴趣包括密码算法与协议、安全多方计算理论及实用化、云环境下的数据安全、区块链理论与实践。

承担项目

1. 实用安全多方计算理论研究,国家自然科学基金,2016-2019
2. 安全多方计算基础理论研究,国家自然科学基金,2012-2015
3. 支持国密算法的区块链平台研发与产业化,山东省科技重大创新工程项目,2018.01-2020.12
4. 消息认证码的安全性分析与可证明安全理论的研究,国家自然科学基金,2012.1-2014.12
5. 安全多方计算基本运算与UC安全研究,教育部博士点基金,2012-2014
6. 基于公钥密码的跨域认证技术及其支撑理论的研究,山东省自然科学基金重点项目,2012-2014
7. 基于属性的密码协议的研究,山东省自然科学基金,2012.7-2015.7
8. 广播加密方案研究,山东省自然科学基金,2011.1-2013.12
9. 山东省电子政务信息安全实验室专项资金,山东省经信委,2010-2013

学术成果

01. Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao, Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency,IEEE Transactions on Dependable and Secure Computing, 2018, eprint.

02. Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access. 2018, 6: 27251-27258

03. Chao Ning, Qiuliang Xu, Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decompositionASIACRYPT 2010, 2010.12.5-2010.12.9.

04. Chao Ning, Qiuliang Xu, Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect SecurityASIACRYPT 2011, 2011.12.4-2011.12.8.

05. Yang R, Xu Q, Zhou Y, et al. Updatable Hash Proof System and Its Applications. Computer Security–ESORICS 2015. Springer International Publishing, 2015: 266-285.

06. Junwei Wang, Praveen Kumar Vadnala, Johann Großsch adl, Qiuliang Xu, Higher-Order Masking in Practice: A Vector Implementation of Masked AES on ARM NEONCT-RSA 2015, San Francisco, 2015.4.20-2015.4.24.

07. Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu, Fair two-party computation with rational parties holding private typesSecurity and Communication Networks, 2015, 8(2): 284-297.

08. Yilei Wang, Zhe Liu, Qiuliang Xu, New rational parties relying on reputationSecurity and Communication Networks, 2014, 7: 1128-1137.

09. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao,Cut-and-Choose Bilateral Oblivious Transfer and Its ApplicationThe 14th IEEE International Conf on Trust, Security and Privacy in Computing and Communications.2015: 384–391

10. Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu, Fair secure computation with reputation assumptions in the mobile social networksMobile Information Systems, 2014, 014: 1-12.

11. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu, Social rational secure multi-party computationConcurrency and Computation Practice and Experience, 2014, 26: 1067-1083.

12. 王伊蕾, 郑志华, 王皓, 徐秋亮, 满足可计算序贯均衡的理性公平计算计算机研究与发展, 2014, 51(7): 1527-15 37.

13. Rui LI , Qiu-Liang XU, A new construction of concurrent non-malleable zero-knowledgeChinese Journal of Computers, 2012, 35(4): 682-692.

14. 张斌, 徐秋亮, 蒋瀚, 新的可抵抗自适应敌手的可组合茫然传输协议通信学报, 2011, 32(11A): 1-8.

15. 柳欣, 徐秋亮, 实用的强不可分割多重息票方案计算机研究与发展, 2012, 12: 2575-2590.

16. 王伊蕾, 徐秋亮, 理性安全多方计算研究密码学报, 2014, 1(5): 481-490.

17. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Jiang Han, Cryptanalysis on identity-based authenticated key agreement protocols from pairingsJournal of Networks, 2010, 5(7): 855-862.

18. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography, Journal of Information Assurance and Security, 2010, (5): 130-137.

19. Xiu-Feng ZHAO , Qiu-Liang XU, An efficient multi-PKG ID-based signcryption schemeChinese Journal of Computers, 2012, 35(4): 673-681.

20. Bin Zhang, Qiuliang Xu, Han Jiang, Xiufeng Zhao, Research on the round complexity of vss in the information theory modelInternational Journal of Digital Content Technology and Its Applications, 2012, 6(8): 45-53.

21. Jiang Han, Xu Qiuliang, Shang Jiuqing, An efficient dynamic identity-based broadcast encryption scheme, 2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, 2010.9.13-2010.9.14.

22. 王皓, 徐秋亮, 抗适应性选择身份攻击的匿名HIBE方案计算机学报, 2011, 34(1): 25-37.

23. 张波, 徐秋亮, 无随机预言机的基于身份多签密方案计算机学报, 2010, 33(1): 103-110.

24. 张忠, 徐秋亮, 物联网环境下UC安全的组证明RFID协议计算机学报, 2011, 34(7): 1188-1194.