張樂友

張樂友

張樂友,1977年生,博導,西安電子科技大學數學與統計學院教授,2009年獲西安電子科技大學博士學位,方向密碼學。2013.12-2014.12在University of Wollongong(澳大利亞)作訪問學者。從2005年起,在IEEE IOTJ , IEEE Sys. J, IEEE trans. Service computing等期刊會議已發表論文90多篇。為IEEE Trans. on Privacy and security/computer, Science report, IEEE systems Journal, IEEE Internet of Things Journal, Information Science, Journal of system and software, IET Communications/information security, Journal of Networks and Computer Applications,《計算機學報》,《電子學報(中、英文版)》,《電子與信息學報》,《西安電子科技大學學報》等國內外期刊審稿人。研究方向為雲計算安全、公鑰密碼的設計及分析、網路安全。主持參與國家自然基金6項,國家自然基金重點項目一項,陝西省自然基金6項、陝西省重點研發項目2項。為CS 2015/2016, Globecom 2016 /17/18 PC Member。

基本介紹

  • 中文名:張樂友
  • 國籍中國
  • 民族:漢
  • 出生地:山東
  • 畢業院校:西安電子科技大學
  • 學位/學歷:博士
  • 職業:教師
  • 專業方向:密碼學
  • 職務:博士生導師
  • 就職院校:西安電子科技大學數學與統計學院
  • 導師:博導
人物經歷,工作經歷,學習經歷,研究方向,學術成果,科研項目,學術論文,課程教學,

人物經歷

工作經歷

1 1999年至今在西安電子科技大學數學系工作;
2 2009年6月晉升副教授;
3 2009年12月受聘為碩士生導師;
4 2015年晉升為教授。
5 2021聘為博士生導師

學習經歷

1 2013.12-2014.12,University of Wollongong, Research Fellow
2 2005-2009, 西安電子科技大學, 博士,密碼學;
3 1999-2002, 西安電子科技大學, 碩士, 套用數學;
4 1995-1999, 山東曲阜師範大學數學系, 學士,基礎數學;

研究方向

1 可證明安全理論
2 基於身份的加密、數字簽名及協定
3 公鑰廣播加密
4雲計算安全關鍵技術研究

學術成果

科研項目

1多源異構數據適應性隱私保護的數據安全共享與交換,國家自然基金重點基金子課題,2020.01-2023.12
2 雲存儲下數據隱私保護技術研究,陝西省重點研發項目, 2019.01-2021.01. 主持。
3 抗泄漏攻擊屬性基加密研究,十三五國家密碼發展基金,2018.9-2021.9. 主持
4 雲環境下抗連續型泄露攻擊公鑰密碼體制研究, 陝西省項目, 2016-2018. 主持
5 雲端中支持細粒糠白埋舉度訪問控制策略的屬性基加密, 國家自然科學基金, 2015-2018.12.主持
6 標準模型下可證明安全的新型分級身份基加密研究, 國家自然科學基金, 2012.1-2014.12.主持
7 公鑰廣播加密的設計與分析, 國家自然科學基金, (子項目)主持
8 基於新型數員促煮學困難問題的廣播加密的設計, 中央高校基礎研究基金,主持
9 新型可證明安全公鑰廣播加密的設計與分析, 陝西省項目, 2012-2014. 主持
10 後量子背包密碼的設計與分析, 國家自然科學基金, 已完成,參與
11 快速公鑰的設整匪放計與分析, 國家道故朽自然科學基金, 已完成,參與
10 分組密碼新型分析技術研究, 國家自然科學基金, 已完成,參與
11 國家重腿戰嚷格點基礎研究發展計畫項目-973項目, 國家科章碑技支撐計畫, 參與

學術論文

已發表論文100多篇,60篇左右被SCI檢索,40篇左右被EI檢索,部閥凶求分文章列舉如下。
Leyou Zhang,Yadi Ye, Yi Mu,
Multi-authority Access Control with Anonymous Authentication for Personal Health Record, IEEE Internet of Things Journal, 8(1), 2021, pp. 156-167.
Leyou Zhang, Jun Wang, Yi Mu, Privacy-preserving Flexible Access Control to Encrypted Data in Internet of Things,IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3071553.
Leyou Zhang, Wenting You, Yi Mu,
Secure Outsourced Attribute-based Sharing Framework for Lightweight Devices in Smart Health Systems, IEEE transactions on Services Computing, 2021, DOI: 10.1109/TSC.2021.3073740.
Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang,Xinyi Huang,
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors, IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3082150.
Gongcheng Hu, Leyou Zhang, Yi Mu,
An Expressive “test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud. IEEE systems Journal, 15(1), 2020, pp. 365-376
Leyou Zhang, Yi Lei Cui, Yi Mu,
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE systems Journal, 14(1), 2020, pp. 387-397, doi: 10.1109/JSYST.2019.2911391.
Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu,
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE Systems Journal, doi: 10.1109/JSYST.2021.3072793. 2021.
Leyou Zhang, Gongcheng Hu, Yi Mu, Fatemeh Rezaeibagha:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019)
Leyou Zhang, Yujie Shang:
Leakage-resilient Attribute-based Encryption with CCA2 Security. Int. J. Netw. Secur. 21(5): 819-827 (2019)
Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren:
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage. J. Inf. Secur. Appl. 47: 258-266 (2019)
Hongjian Yin, Leyou Zhang, Yilei Cui:
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 13(5): 2768-2780(2019)
Leyou Zhang, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018)
Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. IJHPCN 11(1): 45-54 (2018)
Leyou Zhang, Hongjian Yin:
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. I. J. Network Security 20(1): 168-176 (2018)
Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017)
Qing Wu, Leyou Zhang, Jingxia Zhang:
Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Transactions 100-A(5): 1257-1261 (2017)
Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. IJES 9(4): 379-398 (2017)
Jing Wei, Leyou Zhang:
Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. IJHPCN 10(6): 524-533 (2017)
Jingxia Zhang, Leyou Zhang:
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. J. Inf. Sci. Eng. 33(3): 789-805 (2017)
Leyou Zhang, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58
Hongjian Yin, Leyou Zhang:
Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. SpaCCS 2017: 344-352
Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461 (2016)
Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang:
Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Systems 40(12): 267:1-267:13 (2016)
1 Leyou Zhang, Yupu Hu. New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Transactions on internet and information systems,7,(5),1343-1356, 2013. (SCI)
2 Leyou Zhang, Yupu Hu and Qing Wu. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups。 Mathematical and computer Modelling, 2012, 55,pp. 12–18,2012. (SCI,EI)
3 Leyou Zhang, Qing Wu and Yupu Hu. Hierarchical Identity-based Encryption with Constant size private keys。ETRI Journal,2012, 34(1),142-145。(SCI,EI)
4 Leyou Zhang, Yupu Hu and Qing Wu. Fully Secure Identity-based Broadcast Encryption in the Subgroups, China Communications, Vol. 8, No. 2, 152-158, 2011(SCI).
5 Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Transactions on internet and information systems, Vol.5 No.2, pp. 247-476, 2011 (SCI).
6 Leyou Zhang, Yupu Hu and Qing Wu. Unbounded Hierarchical Identity-based Encryption in the Standard Model。Information Journal, Vol. 15, NO. 1, pp.105-112, 2012. (SCI)
7 Leyou Zhang, Yupu Hu and Qing Wu. Identity-based threshold broadcast encryption in the standard model. KSII Transactions on internet and information systems, Vol. 4, No. 3, pp.400-410, 2010 .(SCI)
8 Leyou Zhang, Yupu Hu and Qing Wu. New Construction of Short Hierarchical ID-Based Signature in the Standard Model, Fundamenta Informaticae, 90(1-2),191-201, 2009. (SCI,EI).
9 Leyou Zhang, Yupu Hu and Qing Wu. Efficient Dynamic Data Encryption Algorithm for Mobile Ad Hoc Network, Przeglad Elektrotechniczny, 12(9b):42-47,2012. (SCI)
10 Qing Wu, Sanyang Liu and Leyou Zhang. Support vector regression based on adjustable entropy function approach. Journal of Information Science and Engineering, 2010, 26: 2331-2339. (SCI ,EI)
11 Qing Wu, Sanyang Liu and Leyou Zhang. Particle swarm optimization for semi-supervised support vector machine. Journal of Information Science and Engineering, 2010, 26: 1695-1706. (SCI , EI)
12 Qing Wu, Sanyang Liu and Leyou Zhang. Adjustable entropy function method for support vector machines. Journal of Systems Engineering and Electronics, 2008, 19(5): 1029-1034. (SCI ,EI )
13 Qing Wu, Sanyang Liu and Leyou Zhang. Hypersphere support vector machines based on multiplicative updates. ICNC 2006, Part I, LNCS 4221, pp. 1-4, 2006. Springer-Verlag Berlin Heidelberg 2006. (SCI,EI)
14 Leyou Zhang, Yupu Hu and Qing Wu. Secure Identity-based Ad Hoc Protocols for Mobile Networks.ICIC Express Letters, Vol. 5, No. 2, 2011, pp. 293-298.(EI).
15 Leyou Zhang, Qing Wu and Yupu Hu, Direct Chosen-Ciphertext Technique for Identity-based Broadcast Encryption, Journal of comptution information system, Accepted, In press, 2011.(EI)
16 Leyou Zhang, Yupu Hu and Qing Wu, Adaptively secure hierarchical identity-based signature in the standard model. The Journal of China Universities of Posts and Telecommunications, Vol. 17, No. 6, 2010,pp.95-100.(EI).
17 Leyou Zhang, Qing Wu and Yupu Hu. Adaptively Secure Identity-based Encryption in the Anonymous Communications. ICIC Express Letters, Vol. 5. No. 9(A), 3209-3216. (EI)
18 Leyou Zhang,Yupu Hu and Qing Wu. Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles. AMR Journal, Vols. 143-144 (2011) pp 347-352.(EI)
19 Leyou Zhang, Yupu Hu and Qing Wu. Short signature in the Standard Model. ICIC Express Letters,Vol. 5, No. 4(B), 1313-1320,2011.(EI)
20 Leyou Zhang, Yupu Hu and Qing Wu. Fuzzy Biometric Identity-based Signature in the Standard Model, AMM Journal, Vols. 44-47, 2011, pp. 3350-3354.(EI)
21 Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Short Signatures in the Standard Model。Journal of Software. Accepted,2011.(EI)
22 Leyou Zhang, Hu yupu, Tian xu’an, Yang yang. New construction of identity-based threshold decryption. Wuhan University journal of natural science. Vol. 15, No.3, June 2010, pp. 222-226
23 Leyou Zhang, Yupu Hu, Qing Wu, Xu’an Tian. Secure short Hierarchical identity-based signature in the standard model. IEEE international conference on network security, wireless communications and trusted computing, Vol. 1, pp. 366-369, IEEE computer society, 2010. (EI, ISTP)
24 Leyou Zhang, Yupu Hu, Xu’an Tian, Yang Yang. Novel identity-based blind signature for electronic voting system. IEEE international workshop on education technology and computer science. Vol. 2, 122-125, IEEE computer society, 2010. (EI, ISTP).
25 Leyou Zhang, Yupu Hu, Xu’an Tian, New Identity-based Threshold Broadcast Encryption for Ad Hoc Networks. IEEE international conference on wireless communications, networking, mobile computing.2010 , Page(s): 1-4. (EI, ISTP)
26 Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing.ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
27 Leyou Zhang, Yupu Hu and Ningbo Mu. Identity-Based Broadcast Encryption with Shorter Transmissions.Journal of Shanghai Jiaotong University(Science), 2008, 13(6): 641-645.(EI)
28 Leyou Zhang and Yupu Hu. A New Construction of Short Hierarchical Identity-based Signature in the Standard Model. International Journal of Computer Science and Network Security, Vol. 9, No.4, 2009, 180-186.
29 Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing. ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
30 張樂友,胡予濮,吳青,標準模型下一種新的基於身份的分級加密方案,電子與信息學報, 2009,31(4),937-941.(EI)
31 張樂友,胡予濮,標準模型下基於身份的可證安全簽名方案,武大學學報信息安全版,2008,33(10),1076-1079 .(EI)
32 張樂友,胡予濮,劉振華,標準模型下基於身份的可證安全門限簽名方案,西安電子科技大學學報,2008,35 (1):81-86 .(EI)

課程教學

高等數學,線性代數,機率論與數理統計,資訊理論基礎等課程
6 標準模型下可證明安全的新型分級身份基加密研究, 國家自然科學基金, 2012.1-2014.12.主持
7 公鑰廣播加密的設計與分析, 國家自然科學基金, (子項目)主持
8 基於新型數學困難問題的廣播加密的設計, 中央高校基礎研究基金,主持
9 新型可證明安全公鑰廣播加密的設計與分析, 陝西省項目, 2012-2014. 主持
10 後量子背包密碼的設計與分析, 國家自然科學基金, 已完成,參與
11 快速公鑰的設計與分析, 國家自然科學基金, 已完成,參與
10 分組密碼新型分析技術研究, 國家自然科學基金, 已完成,參與
11 國家重點基礎研究發展計畫項目-973項目, 國家科技支撐計畫, 參與

學術論文

已發表論文100多篇,60篇左右被SCI檢索,40篇左右被EI檢索,部分文章列舉如下。
Leyou Zhang,Yadi Ye, Yi Mu,
Multi-authority Access Control with Anonymous Authentication for Personal Health Record, IEEE Internet of Things Journal, 8(1), 2021, pp. 156-167.
Leyou Zhang, Jun Wang, Yi Mu, Privacy-preserving Flexible Access Control to Encrypted Data in Internet of Things,IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3071553.
Leyou Zhang, Wenting You, Yi Mu,
Secure Outsourced Attribute-based Sharing Framework for Lightweight Devices in Smart Health Systems, IEEE transactions on Services Computing, 2021, DOI: 10.1109/TSC.2021.3073740.
Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang,Xinyi Huang,
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors, IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3082150.
Gongcheng Hu, Leyou Zhang, Yi Mu,
An Expressive “test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud. IEEE systems Journal, 15(1), 2020, pp. 365-376
Leyou Zhang, Yi Lei Cui, Yi Mu,
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE systems Journal, 14(1), 2020, pp. 387-397, doi: 10.1109/JSYST.2019.2911391.
Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu,
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE Systems Journal, doi: 10.1109/JSYST.2021.3072793. 2021.
Leyou Zhang, Gongcheng Hu, Yi Mu, Fatemeh Rezaeibagha:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019)
Leyou Zhang, Yujie Shang:
Leakage-resilient Attribute-based Encryption with CCA2 Security. Int. J. Netw. Secur. 21(5): 819-827 (2019)
Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren:
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage. J. Inf. Secur. Appl. 47: 258-266 (2019)
Hongjian Yin, Leyou Zhang, Yilei Cui:
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 13(5): 2768-2780(2019)
Leyou Zhang, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018)
Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. IJHPCN 11(1): 45-54 (2018)
Leyou Zhang, Hongjian Yin:
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. I. J. Network Security 20(1): 168-176 (2018)
Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017)
Qing Wu, Leyou Zhang, Jingxia Zhang:
Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Transactions 100-A(5): 1257-1261 (2017)
Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. IJES 9(4): 379-398 (2017)
Jing Wei, Leyou Zhang:
Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. IJHPCN 10(6): 524-533 (2017)
Jingxia Zhang, Leyou Zhang:
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. J. Inf. Sci. Eng. 33(3): 789-805 (2017)
Leyou Zhang, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58
Hongjian Yin, Leyou Zhang:
Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. SpaCCS 2017: 344-352
Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461 (2016)
Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang:
Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Systems 40(12): 267:1-267:13 (2016)
1 Leyou Zhang, Yupu Hu. New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Transactions on internet and information systems,7,(5),1343-1356, 2013. (SCI)
2 Leyou Zhang, Yupu Hu and Qing Wu. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups。 Mathematical and computer Modelling, 2012, 55,pp. 12–18,2012. (SCI,EI)
3 Leyou Zhang, Qing Wu and Yupu Hu. Hierarchical Identity-based Encryption with Constant size private keys。ETRI Journal,2012, 34(1),142-145。(SCI,EI)
4 Leyou Zhang, Yupu Hu and Qing Wu. Fully Secure Identity-based Broadcast Encryption in the Subgroups, China Communications, Vol. 8, No. 2, 152-158, 2011(SCI).
5 Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Transactions on internet and information systems, Vol.5 No.2, pp. 247-476, 2011 (SCI).
6 Leyou Zhang, Yupu Hu and Qing Wu. Unbounded Hierarchical Identity-based Encryption in the Standard Model。Information Journal, Vol. 15, NO. 1, pp.105-112, 2012. (SCI)
7 Leyou Zhang, Yupu Hu and Qing Wu. Identity-based threshold broadcast encryption in the standard model. KSII Transactions on internet and information systems, Vol. 4, No. 3, pp.400-410, 2010 .(SCI)
8 Leyou Zhang, Yupu Hu and Qing Wu. New Construction of Short Hierarchical ID-Based Signature in the Standard Model, Fundamenta Informaticae, 90(1-2),191-201, 2009. (SCI,EI).
9 Leyou Zhang, Yupu Hu and Qing Wu. Efficient Dynamic Data Encryption Algorithm for Mobile Ad Hoc Network, Przeglad Elektrotechniczny, 12(9b):42-47,2012. (SCI)
10 Qing Wu, Sanyang Liu and Leyou Zhang. Support vector regression based on adjustable entropy function approach. Journal of Information Science and Engineering, 2010, 26: 2331-2339. (SCI ,EI)
11 Qing Wu, Sanyang Liu and Leyou Zhang. Particle swarm optimization for semi-supervised support vector machine. Journal of Information Science and Engineering, 2010, 26: 1695-1706. (SCI , EI)
12 Qing Wu, Sanyang Liu and Leyou Zhang. Adjustable entropy function method for support vector machines. Journal of Systems Engineering and Electronics, 2008, 19(5): 1029-1034. (SCI ,EI )
13 Qing Wu, Sanyang Liu and Leyou Zhang. Hypersphere support vector machines based on multiplicative updates. ICNC 2006, Part I, LNCS 4221, pp. 1-4, 2006. Springer-Verlag Berlin Heidelberg 2006. (SCI,EI)
14 Leyou Zhang, Yupu Hu and Qing Wu. Secure Identity-based Ad Hoc Protocols for Mobile Networks.ICIC Express Letters, Vol. 5, No. 2, 2011, pp. 293-298.(EI).
15 Leyou Zhang, Qing Wu and Yupu Hu, Direct Chosen-Ciphertext Technique for Identity-based Broadcast Encryption, Journal of comptution information system, Accepted, In press, 2011.(EI)
16 Leyou Zhang, Yupu Hu and Qing Wu, Adaptively secure hierarchical identity-based signature in the standard model. The Journal of China Universities of Posts and Telecommunications, Vol. 17, No. 6, 2010,pp.95-100.(EI).
17 Leyou Zhang, Qing Wu and Yupu Hu. Adaptively Secure Identity-based Encryption in the Anonymous Communications. ICIC Express Letters, Vol. 5. No. 9(A), 3209-3216. (EI)
18 Leyou Zhang,Yupu Hu and Qing Wu. Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles. AMR Journal, Vols. 143-144 (2011) pp 347-352.(EI)
19 Leyou Zhang, Yupu Hu and Qing Wu. Short signature in the Standard Model. ICIC Express Letters,Vol. 5, No. 4(B), 1313-1320,2011.(EI)
20 Leyou Zhang, Yupu Hu and Qing Wu. Fuzzy Biometric Identity-based Signature in the Standard Model, AMM Journal, Vols. 44-47, 2011, pp. 3350-3354.(EI)
21 Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Short Signatures in the Standard Model。Journal of Software. Accepted,2011.(EI)
22 Leyou Zhang, Hu yupu, Tian xu’an, Yang yang. New construction of identity-based threshold decryption. Wuhan University journal of natural science. Vol. 15, No.3, June 2010, pp. 222-226
23 Leyou Zhang, Yupu Hu, Qing Wu, Xu’an Tian. Secure short Hierarchical identity-based signature in the standard model. IEEE international conference on network security, wireless communications and trusted computing, Vol. 1, pp. 366-369, IEEE computer society, 2010. (EI, ISTP)
24 Leyou Zhang, Yupu Hu, Xu’an Tian, Yang Yang. Novel identity-based blind signature for electronic voting system. IEEE international workshop on education technology and computer science. Vol. 2, 122-125, IEEE computer society, 2010. (EI, ISTP).
25 Leyou Zhang, Yupu Hu, Xu’an Tian, New Identity-based Threshold Broadcast Encryption for Ad Hoc Networks. IEEE international conference on wireless communications, networking, mobile computing.2010 , Page(s): 1-4. (EI, ISTP)
26 Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing.ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
27 Leyou Zhang, Yupu Hu and Ningbo Mu. Identity-Based Broadcast Encryption with Shorter Transmissions.Journal of Shanghai Jiaotong University(Science), 2008, 13(6): 641-645.(EI)
28 Leyou Zhang and Yupu Hu. A New Construction of Short Hierarchical Identity-based Signature in the Standard Model. International Journal of Computer Science and Network Security, Vol. 9, No.4, 2009, 180-186.
29 Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing. ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
30 張樂友,胡予濮,吳青,標準模型下一種新的基於身份的分級加密方案,電子與信息學報, 2009,31(4),937-941.(EI)
31 張樂友,胡予濮,標準模型下基於身份的可證安全簽名方案,武大學學報信息安全版,2008,33(10),1076-1079 .(EI)
32 張樂友,胡予濮,劉振華,標準模型下基於身份的可證安全門限簽名方案,西安電子科技大學學報,2008,35 (1):81-86 .(EI)

課程教學

高等數學,線性代數,機率論與數理統計,資訊理論基礎等課程

相關詞條

熱門詞條

聯絡我們