徐秋亮教授为山东大学软件学院教授。现任中国密码学会理事,中国电子学会区块链专委会副主任委员,山东网络空间安全专委会主任委员。中国密码学会密码算法专委会、安全协议专委会委员,密码学会密码应用工作委员会委员,中国保密协会隐私保护专委会委员,山东计算机学会常务理事。长期从事密码学与信息安全的研究,在安全多方计算、群组密码等方面具有长期的积累,承担国家自然科学基金面上&重点项目、国家发改委创新示范工程、山东科技重大创新工程等多项国家及省部级项目,在密码学三大顶级会议Asiacrypt,CCF顶级期刊TDSC等高水平刊物发表论文100余篇。现在的主要研究兴趣包括密码算法与协议、安全多方计算理论及实用化、云环境下的数据安全、区块链理论与实践。
承担项目
1. 实用安全多方计算理论研究,国家自然科学基金,2016-2019
2. 安全多方计算基础理论研究,国家自然科学基金,2012-2015
3. 支持国密算法的区块链平台研发与产业化,山东省科技重大创新工程项目,2018.01-2020.12
4. 消息认证码的安全性分析与可证明安全理论的研究,国家自然科学基金,2012.1-2014.12
5. 安全多方计算基本运算与UC安全研究,教育部博士点基金,2012-2014
6. 基于公钥密码的跨域认证技术及其支撑理论的研究,山东省自然科学基金重点项目,2012-2014
7. 基于属性的密码协议的研究,山东省自然科学基金,2012.7-2015.7
8. 广播加密方案研究,山东省自然科学基金,2011.1-2013.12
9. 山东省电子政务信息安全实验室专项资金,山东省经信委,2010-2013
学术成果
01. Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao, Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency,, IEEE Transactions on Dependable and Secure Computing, 2018, eprint.
02. Pingyuan Zhang, Han Jiang, Zhihua Zheng, Peichu Hu, Qiuliang Xu A New Post-Quantum Blind Signature From Lattice Assumptions. IEEE Access. 2018, 6: 27251-27258
03. Chao Ning, Qiuliang Xu, Multiparty computation for modulo reduction without bit-decomposition and a generalization to bit-decomposition, ASIACRYPT 2010, 2010.12.5-2010.12.9.
04. Chao Ning, Qiuliang Xu, Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security, ASIACRYPT 2011, 2011.12.4-2011.12.8.
05. Yang R, Xu Q, Zhou Y, et al. Updatable Hash Proof System and Its Applications. Computer Security–ESORICS 2015. Springer International Publishing, 2015: 266-285.
06. Junwei Wang, Praveen Kumar Vadnala, Johann Großsch adl, Qiuliang Xu, Higher-Order Masking in Practice: A Vector Implementation of Masked AES on ARM NEON, CT-RSA 2015, San Francisco, 2015.4.20-2015.4.24.
07. Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu, Fair two-party computation with rational parties holding private types, Security and Communication Networks, 2015, 8(2): 284-297.
08. Yilei Wang, Zhe Liu, Qiuliang Xu, New rational parties relying on reputation, Security and Communication Networks, 2014, 7: 1128-1137.
09. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao,Cut-and-Choose Bilateral Oblivious Transfer and Its Application. The 14th IEEE International Conf on Trust, Security and Privacy in Computing and Communications.2015: 384–391
10. Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu, Fair secure computation with reputation assumptions in the mobile social networks, Mobile Information Systems, 2014, 014: 1-12.
11. Yilei Wang, Zhe Liu, Hao Wang, Qiuliang Xu, Social rational secure multi-party computation, Concurrency and Computation Practice and Experience, 2014, 26: 1067-1083.
12. 王伊蕾, 郑志华, 王皓, 徐秋亮, 满足可计算序贯均衡的理性公平计算, 计算机研究与发展, 2014, 51(7): 1527-15 37.
13. Rui LI , Qiu-Liang XU, A new construction of concurrent non-malleable zero-knowledge, Chinese Journal of Computers, 2012, 35(4): 682-692.
14. 张斌, 徐秋亮, 蒋瀚, 新的可抵抗自适应敌手的可组合茫然传输协议, 通信学报, 2011, 32(11A): 1-8.
15. 柳欣, 徐秋亮, 实用的强不可分割多重息票方案, 计算机研究与发展, 2012, 12: 2575-2590.
16. 王伊蕾, 徐秋亮, 理性安全多方计算研究, 密码学报, 2014, 1(5): 481-490.
17. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Jiang Han, Cryptanalysis on identity-based authenticated key agreement protocols from pairings, Journal of Networks, 2010, 5(7): 855-862.
18. Hou Mengbo, Xu Qiuliang, Guo Shanqing, Secure Key-Escrowless Explicit Authenticated Key Agreement Protocol in ID-based Public Key Cryptography, Journal of Information Assurance and Security, 2010, (5): 130-137.
19. Xiu-Feng ZHAO , Qiu-Liang XU, An efficient multi-PKG ID-based signcryption scheme, Chinese Journal of Computers, 2012, 35(4): 673-681.
20. Bin Zhang, Qiuliang Xu, Han Jiang, Xiufeng Zhao, Research on the round complexity of vss in the information theory model, International Journal of Digital Content Technology and Its Applications, 2012, 6(8): 45-53.
21. Jiang Han, Xu Qiuliang, Shang Jiuqing, An efficient dynamic identity-based broadcast encryption scheme, 2nd International Symposium on Data, Privacy and E-Commerce, ISDPE 2010, 2010.9.13-2010.9.14.
22. 王皓, 徐秋亮, 抗适应性选择身份攻击的匿名HIBE方案, 计算机学报, 2011, 34(1): 25-37.
23. 张波, 徐秋亮, 无随机预言机的基于身份多签密方案, 计算机学报, 2010, 33(1): 103-110.
24. 张忠, 徐秋亮, 物联网环境下UC安全的组证明RFID协议, 计算机学报, 2011, 34(7): 1188-1194.