教师名录

刘振 特别研究员

主页:

办公室电话:

办公地点:电信群楼3号楼509

电子邮件:liuzhen@cs.sjtu.edu.cn

实验室: 密码学与计算机安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务

Applied Cryptography and Information Security:

Attribute-Based Encryption, Searchable Encryption, Homomorphic Encryption, Lattice-Based Cryptography,

Could Computing Security, Big Data Security,

Blockchain, Cryptocurrency




1995.09-1999.07    Shanghai Jiao Tong University        Bachelor of Science, in Applied Mathematics

1999.09-2002.03    Shanghai Jiao Tong University        Master of Science, in Mathematics

2008.09-2013.06    Shanghai Jiao Tong University        PhD

2010.09-2013.06    City University of Hong Kong          PhD

Combinatorics (Fall 2017)  

Blockchain Technologies (Fall 2017, Fall 2018, Fall 2019, Fall 2020)

Network Security Technologies (Spring 2018, Spring 2019, Spring 2020)

Journal Articles

10. Zhen Liu, Qiong Huang, Duncan S. Wong, “On Enabling Attribute-Based Encryption to Be Traceable against Traitors,” Comput. J.  Accepted. (2020)

9. Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao, “All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application,” Comput. J. 62(8): 1148-1157 (2019)

8. Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, and Zhenfu Cao, “Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing,” Inf. Sci. 504: 354-371 (2019)

7. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and efficient scheme in Zerocash,” Computers & Security 86: 112-131 (2019).
6. Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, and Yu Long, “Fork-free hybrid consensus with flexible Proof-of-Activity,” Future Generation Comp. Syst. 96: 515-524 (2019).

5. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong, “Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps,” Frontiers of Computer Science 10(4): 741-754 (2016).
4. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen, “Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia 18(5): 940-950 (2016).
3. Zhen Liu and Duncan S. Wong, “Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” Comput. J. 59(7): 983-1004 (2016).
2. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild,” IEEE Transactions on Information Forensics and Security 10(1): 55-68 (2015).
1. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “White-box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures,” IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013).


Refereed Conference Papers
19. Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, and Yu Yu, “A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key” The 25th European Symposium on Research in Computer Security (ESORICS 2020), Accepted.

18. Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, and Duncan S. Wong, “A Lattice-based Linkable Ring Signature Supporting Stealth Addresses,” The 24th European Symposium on Research in Computer Security (ESORICS 2019), Part I, pp. 726-746.

17. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, and Huaxiong Wang, “Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 4th IEEE European Symposium on Security and Privacy (Euro S&P 2019), pp. 215-230.

16. Geng Wang, Zhen Liu and Dawu Gu, “Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption,” The 21th International Conference on Information and Communications Security (ICICS 2019), pp. 378-396, Springer, 2019. 

15. Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu, “Making Monero Hard-to-Trace and More Efficient," TrustCom/BigDataSE 2019: 514-521

14. Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu, “A Secure and Practical Blockchain Scheme for IoT,” TrustCom/BigDataSE 2019: 538-545.

13. Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia, “TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility,” The 13th International Conference on Provable Security (ProvSec 2019), pp. 339-346, Springer, 2019.
12. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and Efficient Scheme in Zerocash,” The 23th Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 687-705, Springer, 2018.
11. Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, “Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol,” In Proc. of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 49-69, Springer, 2018.
10. Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, and Dawu Gu, “Dynamic Practical Byzantine Fault Tolerance,” 2018 IEEE Conference on Communications and Network Security (CNS 2018), pp. 1-8, IEEE, 2018.
9. Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, and Ning Ding, “Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain,” 12th International Conference on Network and System Security (NSS 2018), pp. 1-15, Springer, 2018.

8. Zhen Liu, Duncan S. Wong, and Jack Poon, “Dealerless Corporate Key Generation for Identity-Based Encryption Schemes,” The 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pp. 211-222, ACM, 2016.
7. Zhen Liu and Duncan S. Wong, “Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable,” The 17th International Conference on Information and Communications Security (ICICS 2015), pp. 109-124, Springer, 2015.
6. Zhen Liu and Duncan S. Wong, “Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” In Proc. of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 127 – 146, Springer, 2015.
5. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts,” In Proc. of the 10th International Conference on Information Security and Cryptology (INSCRYPT 2014), pp. 403 – 423, Springer, 2014.
4. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, and Xiao Tan, “Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage,” In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 326 – 343, Springer, 2014.
3. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay,” In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 475-486, ACM, 2013.
2. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, and Chunming Tang, “A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles,” In Proc. of the 15th International Conference on Information Security and Cryptology (ICISC 2012), pp. 231-246, Springer, 2012.
1. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” In Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278 – 297, Springer, 2011.

1.     国家自然科学基金 面上项目,面向区块链隐私保护的格密码方案研究2021.1-2024.12.

PI, National Natural Science Foundation of China (NSFC) Grant No. 62072305, “Research on Lattice-based Cryptography for Privacy-Preserving in Blockchain”, 2021.1-2024.12.

 

2.     国家自然科学基金 面上项目,属性基加密中背叛者追踪问题的研究2017.1-2020.12.

PI, National Natural Science Foundation of China (NSFC) Grant No. 61672339, “Research on Traitor Tracing in Attribute-Based Encryption”, 2017.1-2020.12.

联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013