教师名录

龙 宇 副教授

主页: [点击这里]

办公室电话:+86-21-3420-5539

办公地点:SEIEE-3-527

电子邮件:longyu@cs.sjtu.edu.cn

实验室: 密码与信息安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务
Public key encryption, in particular of distributed network surrounding
Sep 2004 - Feb 2008, Doctor’s 
   Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China 
   Supervisors: Prof. Kefei Chen 
   Doctoral Dissertation: The Formal Study of Secure Threshold Cryptographic schemes
Sep 2002 - March 2005, Master’s 
   Department of Information Security Engineering , Shanghai Jiao Tong University, Shanghai, China 
   Supervisor: Prof. Zhenfu Cao 
   Master Thesis: Research of Threshold Key Escrow 
Sep 1998-Jul 2002, B.S. 
   Department of Computer and Communication Engineering, SouthWest Jiao Tong University, Chengdu, China

Feb 2008-, Research Assitant, Shanghai Jiao Tong University

June 2012-June 2013,  Visiting Researcher, ENS, France

Sep 2008- Mar 2009, Visiting Researcher, IBM Chinese Research Center

2009, Hilary term, Master of Computer Technique Engineering, Cryptography and Computer Security 
2009, Autumn term, Master of Computer Technique Engineering, Cryptography and Computer Security
  • 2009, spring term, master of Computer Technique Engineering, Cryptography and Computer Security
  • 2009, autumn term, master of Computer Technique Engineering,Cryptography and Computer Security
  • 2009, autumn term, master of Computer Technique Engineering,Cryptography and Computer Security
Yu Long, Kefei Chen, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Information Sciences, Vol. 177, 2007, pp. 5620-5637. 
Long Yu, Chen Kefei, Gong Zheng, Efficient Chosen-Ciphertext secure Certificateless Threshold Key Encapsulation Mechanism, Proceeding of the China Cryptography Conference 2007. 
Yu Long, Zheng Gong, Kefei Chen, Shengli Liu, Provably secure Identity-based threshold key escrow form pairing, International Journal of Network Security, Accepted, 2007. 
Yu Long, Kefei Chen, Shengli Liu, ID-based threshold decryption secure against adaptive chosen-ciphertext attack, Computers and Electrical Engineering, Vol. 33, 2007, pp. 166-176. 
Yu Long, Kefei Chen, Shengli Liu, Adaptive chosen ciphertext secure threshold key escrow scheme from pairing, INFORMATICA, Vol. 17, No. 4, 2006, pp.519-534. 
Long Yu, Li Shiqun, Liu Shengli, Chen kefei, How to construct provably secure ID-based mediated threshold cryptosystems without key escrow, Proceeding of the China Cryptography Conference 2006. 
Long Yu, Chen Kefei, Hong Xuan, A new chosen ciphertext secure ID-based threshold decryption scheme from pairing, Chinese Journal of Computers, Vol.29. No.9, 2006, pp. 1679-1687. 
Yu Long, Kefei Chen, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, Vol. 2, No.2, 2006, pp.111–113. 
Yu Long, Kefei Chen, Shengli Liu, ID-based threshold decryption secure against chosen plaintext attack, Journal of Shanghai Jiao Tong University (Science), Vol. E-11, No.2, 2006, pp.127-133. 
Yu Long, Zhenfu Cao, Kefei Chen, A dynamic threshold commercial key escrow scheme based on conic, Applied Mathematics and Computation, Vol. 171, No. 2, 2005, pp. 972-982. 
Zheng Gong, Yu Long, Kefei Chen, Efficient partially blind signature from LFSR, Proceedings of the SNPD 2007, 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing In conjunction with 3rd ACIS International Workshop on Self-Assembling Wireless Networks (SAWN2007), Qingdao, China, IEEE Press, 2007, pp.717-722. 
Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Two Certificateless Aggregate Signature from Bilinear Maps, Proceedings of the SNPD 2007, Qingdao, China, IEEE Press, 2007, pp.188-193. 
Ruishan Zhang, Yu Long, Kefei Chen, An efficient proactive secret sharing scheme for disjoint large scale ad hoc networks, 5th Workshop on Applications and Services in Wireless Networks (ASWN2005), Paris, France, IEEE Press, 2005 pp.1-7. 
龙宇,曹珍富,对密钥托管系统中LEAF结构的研究 ,计算机工程,2005 
龙宇,曹珍富,一种动态(k,n)门限方案,计算机工程,2005
  1. Long YuChen KefeiMao Xian PingNew Constructions of Dynamic Threshold Cryptosystem, Journal of SJTU, Vol. 19. No. 4, 431-435, 2014.

  2. Jianhong Chen, Yu Long, Kefei Chen, Attribute-based Key Insulated Signature and Its Applications, Information Sciences, 275 (2014) 57–672014.

  3. Mao Xian Ping, Long Yu, Chen Kefei, Attribute-Based Signature on Lattice, Journal of SJTU, Vol. 19. No. 4, 406-411, 2014.

  4. Xianping Mao, Yu Long, Kefei Chen, On the Security of a Lattice-Based Multi party Concurrent Signature Scheme,  InCoS 2014.

  5. 毛贤平 ,龙宇, 陈克非,基于格的代理签名方案分析,通信学报 2014,已录用

  6. Wang liang liang, Kefei Chen, Yu Long A New RSA-based Proxy Re-encryption Scheme, J. of Computational Info. Sys. 2014, Accepted

  7. Yongtao Wang, Kefei Chen, Yu Long, Accountable Authority Key Policy Attribute-based Encryption, SCIENCE CHINA, Vol. 55, No. 7: 1631-1638, 2012.

  8. Xuan Hong, Yu Long, A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETS, Journal of Computers, Vol. 7, No. 7: 1796-1800, 2012.

  9. 陈剑洪, 陈克非, , 万中美, , 孙成富, 陈礼青,密文策略的属性基并行密钥隔离加密,软件学报,第23卷, 10期, 页码:2795-2804页,2012.

  10. Yu Long, Xian Xu, Kefei Chen, Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG, 计算机研究与发展, Vol. 49, No. 5: 932-938, 2012.

  11. Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan, Identity Based Key Insulated Signcryption, INFORMATICA, Vol. 23, No. 1: 27-45, 2012.

  12. 徐贤,龙宇,基于TPM的强身份认证研究,计算机工程,第38卷,第4期,23-27页,2012.

  13. Shengli Liu, Yu Long, Kefei Chen, Key Updating Technique in Identity-based EncryptionInformation Sciences, Vol. 181: 2436–2440, 2011.

  14. Jianhong Chen, Yu Long, Kefei Chen, Yongtao Wang, Identity Based Key Insulated Proxy Signature without Random Oracles, Journal of Shanghai Jiao Tong University, Vol. 16, No. 5: 557-566, 2011.

  15. Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen, Restrictive partially blind signature for resource-constrained information systems, Knowledge Information Systems, Vol. 26:87–103, 2011.

  16. Chen Jianhong, Long Yu, Chen Kefei, Wang Yongtao, Li Xiangxue, An Efficient Threshold Key-Insulated Signature Scheme, Journal of Shanghai Jiao Tong University, Vol. 16, No. 6: 658-662, 2011.

  17. Yu Long, Kefei Chen, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Information Sciences, Vol. 80, No. 7: 1167-1181, 2010.

  18. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Practical Certificateless Aggregate Signatures from Bilinear Maps, Journal of Information Science and Engineering, Vol. 26: 2093-2106, 2010.

  19. Mi Wen, Zhi Yin, Yu Long, Yong Wang, An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks, Wireless Sensor Network, Vol. 2: 689-697, 2010.

  20. Long Yu, Li Xiangxue, Chen Kefei, Hong Xuan, Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary, Journal of Shanghai Jiao Tong University, Vol. 14, No. 1: 102-107, 2009.

  21. Yu Long, Zheng Gong, Kefei Chen, Shengli Liu, Provably Secure Identity-based Threshold Key Escrow from Pairing, International Journal of Network Security, Vol. 8, No. 3: 227-234, 2009.

  22. Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG, Certificateless key-insulated signature without random oracles, Journal of Zhejiang University  (Science A), Vol. 10, No. 12: 1790-1800, 2009.

  23. Hong Xuan, Chen Kefei, Long Yu, Universally Composable Proactive Threshold RSA Signature Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 659-663, 2008.
  24. Wan Zhong mei, Lai Xue-jia, Weng Jian, Hong Xuan, Long Yu, Jia Wei WeiOn Constructing Certificateless Proxy Signature From Certificateless signatureJournal of Shanghai Jiao Tong University, Vol. 13, No. 6: 692-694, 2008.


    1. Yu Long, Kefei Chen, Certificateless Threshold Cryptosystem Secure Against Chosen-Ciphertext Attack, Information Sciences, Vol. 177: 5620-5637, 2007.

    2. Long Yu, Chen Kefei, Gong Zheng, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Proceeding of the China Cryptography Conference 2007.

    3. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Adaptive Chosen-Ciphertext Attack, Computers and Electrical Engineering, Vol. 33: 166-176, 2007.

    4. Z. Gong, Yu Long, K.F. Chen, Efficient Partially Blind Signature from LFSR, SNPD 2007, Vol. 2: 717-722, Qindao, China.

    5. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD 2007, Vol. 3: 188-193, Qindao, China.

    6. Yu Long, Kefei Chen, Shengli Liu, Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing, INFORMATICA, Vol. 17, No. 4: 519-534, 2006.

    7. Yu Long, Li Shiqun, Liu Shengli, Chen Kefei, How to Construct Provably Secure ID-based Mediated Threshold Cryptosystems without Key Escrow, Proceeding of the China Cryptography Conference 2006.

    8. Yu Long, Chen Kefei, Hong Xuan, A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing, Chinese Journal of Computers, Vol.29. No.9: 1679-1687, 2006.

    9. Yu Long, Kefei Chen, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, Vol. 2, No.2: 111–113, 2006.

    10. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack, Journal of Shanghai Jiao Tong University (Science), Vol. E-11, No. 2: 127-133, 2006.

    11. Yu Long, Zhenfu Cao, Kefei Chen, A Dynamic Threshold Commercial Key Escrow Scheme Based on Conic, Applied Mathematics and Computation, Vol. 171, No. 2: 972-982, 2005.

    12. Ruishan Zhang, Yu Long, Kefei Chen, An Efficient Proactive Secret Sharing Scheme for Disjoint Large Scale Ad Hoc Networks, 5th Workshop on Applications and Services in Wireless Networks (ASWN2005), IEEE Press, 2005 pp.1-7.

    13. 龙宇,曹珍富,对密钥托管系统中LEAF结构的研究 计算机工程,第31卷,第 12期,156-160, 2005

    14. 龙宇,曹珍富,一种动态(kn)门限方案,计算机工程,第31卷,第 12期,154-155, 2005

       




    1. Long YuChen KefeiMao Xian PingNew Constructions of Dynamic Threshold Cryptosystem, Journal of SJTU, Vol. 19. No. 4, 431-435, 2014.

    2. Jianhong Chen, Yu Long, Kefei Chen, Attribute-based Key Insulated Signature and Its Applications, Information Sciences, 275 (2014) 57–672014.

    3. Mao Xian Ping, Long Yu, Chen Kefei, Attribute-Based Signature on Lattice, Journal of SJTU, Vol. 19. No. 4, 406-411, 2014.

    4. Xianping Mao, Yu Long, Kefei Chen, On the Security of a Lattice-Based Multi party Concurrent Signature Scheme,  InCoS 2014.

    5. 毛贤平 ,龙宇, 陈克非,基于格的代理签名方案分析,通信学报 2014,已录用

    6. Wang liang liang, Kefei Chen, Yu Long A New RSA-based Proxy Re-encryption Scheme, J. of Computational Info. Sys. 2014, Accepted

    7. Yongtao Wang, Kefei Chen, Yu Long, Accountable Authority Key Policy Attribute-based Encryption, SCIENCE CHINA, Vol. 55, No. 7: 1631-1638, 2012.

    8. Xuan Hong, Yu Long, A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETS, Journal of Computers, Vol. 7, No. 7: 1796-1800, 2012.

    9. 陈剑洪, 陈克非, , 万中美, , 孙成富, 陈礼青,密文策略的属性基并行密钥隔离加密,软件学报,第23卷, 10期, 页码:2795-2804页,2012.

    10. Yu Long, Xian Xu, Kefei Chen, Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG, 计算机研究与发展, Vol. 49, No. 5: 932-938, 2012.

    11. Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan, Identity Based Key Insulated Signcryption, INFORMATICA, Vol. 23, No. 1: 27-45, 2012.

    12. 徐贤,龙宇,基于TPM的强身份认证研究,计算机工程,第38卷,第4期,23-27页,2012.

    13. Shengli Liu, Yu Long, Kefei Chen, Key Updating Technique in Identity-based EncryptionInformation Sciences, Vol. 181: 2436–2440, 2011.

    14. Jianhong Chen, Yu Long, Kefei Chen, Yongtao Wang, Identity Based Key Insulated Proxy Signature without Random Oracles, Journal of Shanghai Jiao Tong University, Vol. 16, No. 5: 557-566, 2011.

    15. Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen, Restrictive partially blind signature for resource-constrained information systems, Knowledge Information Systems, Vol. 26:87–103, 2011.

    16. Chen Jianhong, Long Yu, Chen Kefei, Wang Yongtao, Li Xiangxue, An Efficient Threshold Key-Insulated Signature Scheme, Journal of Shanghai Jiao Tong University, Vol. 16, No. 6: 658-662, 2011.

    17. Yu Long, Kefei Chen, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Information Sciences, Vol. 80, No. 7: 1167-1181, 2010.

    18. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Practical Certificateless Aggregate Signatures from Bilinear Maps, Journal of Information Science and Engineering, Vol. 26: 2093-2106, 2010.

    19. Mi Wen, Zhi Yin, Yu Long, Yong Wang, An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks, Wireless Sensor Network, Vol. 2: 689-697, 2010.

    20. Long Yu, Li Xiangxue, Chen Kefei, Hong Xuan, Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary, Journal of Shanghai Jiao Tong University, Vol. 14, No. 1: 102-107, 2009.

    21. Yu Long, Zheng Gong, Kefei Chen, Shengli Liu, Provably Secure Identity-based Threshold Key Escrow from Pairing, International Journal of Network Security, Vol. 8, No. 3: 227-234, 2009.

    22. Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG, Certificateless key-insulated signature without random oracles, Journal of Zhejiang University  (Science A), Vol. 10, No. 12: 1790-1800, 2009.

    23. Hong Xuan, Chen Kefei, Long Yu, Universally Composable Proactive Threshold RSA Signature Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 659-663, 2008.

    24. Wan Zhong mei, Lai Xue-jia, Weng Jian, Hong Xuan, Long Yu, Jia Wei WeiOn Constructing Certificateless Proxy Signature From Certificateless SignatureJournal of Shanghai Jiao Tong University, Vol. 13, No. 6: 692-694, 2008.

    25. Yu Long, Kefei Chen, Certificateless Threshold Cryptosystem Secure Against Chosen-Ciphertext Attack, Information Sciences, Vol. 177: 5620-5637, 2007.

    26. Long Yu, Chen Kefei, Gong Zheng, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Proceeding of the China Cryptography Conference 2007.

    27. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Adaptive Chosen-Ciphertext Attack, Computers and Electrical Engineering, Vol. 33: 166-176, 2007.

    28. Z. Gong, Yu Long, K.F. Chen, Efficient Partially Blind Signature from LFSR, SNPD 2007, Vol. 2: 717-722, Qindao, China.

    29. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD 2007, Vol. 3: 188-193, Qindao, China.

    30. Yu Long, Kefei Chen, Shengli Liu, Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing, INFORMATICA, Vol. 17, No. 4: 519-534, 2006.

    31. Yu Long, Li Shiqun, Liu Shengli, Chen Kefei, How to Construct Provably Secure ID-based Mediated Threshold Cryptosystems without Key Escrow, Proceeding of the China Cryptography Conference 2006.

    32. Yu Long, Chen Kefei, Hong Xuan, A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing, Chinese Journal of Computers, Vol.29. No.9: 1679-1687, 2006.

    33. Yu Long, Kefei Chen, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, Vol. 2, No.2: 111–113, 2006.

    34. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack, Journal of Shanghai Jiao Tong University (Science), Vol. E-11, No. 2: 127-133, 2006.

    35. Yu Long, Zhenfu Cao, Kefei Chen, A Dynamic Threshold Commercial Key Escrow Scheme Based on Conic, Applied Mathematics and Computation, Vol. 171, No. 2: 972-982, 2005.

    36. Ruishan Zhang, Yu Long, Kefei Chen, An Efficient Proactive Secret Sharing Scheme for Disjoint Large Scale Ad Hoc Networks, 5th Workshop on Applications and Services in Wireless Networks (ASWN2005), IEEE Press, 2005 pp.1-7.

    37. 龙宇,曹珍富,对密钥托管系统中LEAF结构的研究 计算机工程,第31卷,第 12期,156-160, 2005

    38. 龙宇,曹珍富,一种动态(kn)门限方案,计算机工程,第31卷,第 12期,154-155, 2005


    2010-2012 National Natural Science Foundation of China (Young Scholars) 
    2010-2012 Doctoral Fund of Ministry of Education of China (New Teachers) 
    2009.10-2009.12 IBM Visiting Schorlar


    • 2010 SMC Program of Shanghai Jiao Tong University
    • 2008 IBM Phd. Fellowship
    • 2004-2005 Dong’s East Scholarship of Shanghai Jiao Tong University
    • 2004 Excellent Graduate of Shanghai Jiao Tong University
    • 2002 State Outstanding Graduate of South West Jiao Tong University

    联系我们 webmaster@cs.sjtu.edu.cn

    上海交通大学计算机科学与工程系版权所有 @ 2013