教师名录

刘振 特别研究员

主页:

办公室电话:

办公地点:电信群楼3号楼509

电子邮件:liuzhen@cs.sjtu.edu.cn

实验室: 密码学与计算机安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务

Applied Cryptography and Information Security:

Attribute-Based Encryption, Searchable Encryption, Homomorphic Encryption, Lattice-Based Cryptography,

Could Computing Security, Big Data Security,

Blockchain, Cryptocurrency




1995.09-1999.07    Shanghai Jiao Tong University        Bachelor of Science, in Applied Mathematics

1999.09-2002.03    Shanghai Jiao Tong University        Master of Science, in Mathematics

2008.09-2013.06    Shanghai Jiao Tong University        PhD

2010.09-2013.06    City University of Hong Kong          PhD

Journal Articles
7. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and efficient scheme in Zerocash,” Computers & Security 86: 112-131 (2019).
6. Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, and Yu Long, “Fork-free hybrid consensus with flexible Proof-of-Activity,” Future Generation Comp. Syst. 96: 515-524 (2019).

5. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong, “Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps,” Frontiers of Computer Science 10(4): 741-754 (2016).
4. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen, “Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia 18(5): 940-950 (2016).
3. Zhen Liu and Duncan S. Wong, “Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” Comput. J. 59(7): 983-1004 (2016).
2. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild,” IEEE Transactions on Information Forensics and Security 10(1): 55-68 (2015).
1. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “White-box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures,” IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013).


Refereed Conference Papers
15. Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, and Duncan S. Wong, “A Lattice-based Linkable Ring Signature Supporting Stealth Addresses,” The 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, pp. 726-746.

14. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, and Huaxiong Wang, “Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 4th IEEE European Symposium on Security and Privacy (Euro S&P 2019), pp. 215-230.

13. Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia, “TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility,” The 13th International Conference on Provable Security (ProvSec 2019), pp. 339-346, Springer, 2019.
12. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and Efficient Scheme in Zerocash,” The 23th Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 687-705, Springer, 2018.
11. Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, “Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol,” In Proc. of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 49-69, Springer, 2018.
10. Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, and Dawu Gu, “Dynamic Practical Byzantine Fault Tolerance,” 2018 IEEE Conference on Communications and Network Security (CNS 2018), pp. 1-8, IEEE, 2018.
9. Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, and Ning Ding, “Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain,” 12th International Conference on Network and System Security (NSS 2018), pp. 1-15, Springer, 2018.

8. Zhen Liu, Duncan S. Wong, and Jack Poon, “Dealerless Corporate Key Generation for Identity-Based Encryption Schemes,” The 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pp. 211-222, ACM, 2016.
7. Zhen Liu and Duncan S. Wong, “Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable,” The 17th International Conference on Information and Communications Security (ICICS 2015), pp. 109-124, Springer, 2015.
6. Zhen Liu and Duncan S. Wong, “Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” In Proc. of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 127 – 146, Springer, 2015.
5. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts,” In Proc. of the 10th International Conference on Information Security and Cryptology (INSCRYPT 2014), pp. 403 – 423, Springer, 2014.
4. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, and Xiao Tan, “Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage,” In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 326 – 343, Springer, 2014.
3. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay,” In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 475-486, ACM, 2013.
2. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, and Chunming Tang, “A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles,” In Proc. of the 15th International Conference on Information Security and Cryptology (ICISC 2012), pp. 231-246, Springer, 2012.
1. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” In Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278 – 297, Springer, 2011.

PI, National Natural Science Foundation of China (NSFC) Grant No. 61672339, “Research on Traitor Tracing in Attribute-Based Encryption”, RMB 630K, 2017.1.1-2020.12.31.



联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013