龙 宇

副教授

主页:

办公室电话:-

办公地点:SEIEE-3-517

实验室:

密码与信息安全实验室、

密码学与计算机安全实验室

研究兴趣

教育背景

工作经验

教授课程

论文发表

项目资助

获奖信息

学术服务

Public key encryption, Block Chain, Post-quantum Cryptography

请用邮箱 longyu@sjtu.edu.cn联系我,或忽略cs邮箱报错。

Please contact me via longyu@sjtu.edu.cn, or ignore the error response from my cs mailbox.

Sep 2004 - Feb 2008, Doctor’s

Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China

Supervisors: Prof. Kefei Chen

Doctoral Dissertation: The Formal Study of Secure Threshold Cryptographic schemes

Sep 2002 - March 2005, Master’s

Department of Information Security Engineering , Shanghai Jiao Tong University, Shanghai, China

Supervisor: Prof. Zhenfu Cao

Master Thesis: Research of Threshold Key Escrow

Sep 1998-Jul 2002, B.S.

Department of Computer and Communication Engineering, SouthWest Jiao Tong University, Chengdu, China

Jan 2016-, Associate Professor, Shanghai Jiao Tong Uniersity

Feb 2008- Dec 2015, Research Assitant, Shanghai Jiao Tong University

June 2012-June 2013,  Visiting Researcher, ENS, France

Sep 2008- Mar 2009, Visiting Researcher, IBM Chinese Research Center

2009, Hilary term, Master of Computer Technique Engineering, Cryptography and Computer Security

2009, Autumn term, Master of Computer Technique Engineering, Cryptography and Computer Security

2009, spring term, master of Computer Technique Engineering, Cryptography

and Computer Security

2009, autumn term, master of Computer Technique Engineering,Cryptography and

Computer Security

2009, autumn term, master of Computer Technique Engineering,Cryptography and

Computer Security

2011, spring term, master of Computer Science, Cryptography Algorithm and

Protocol

2012, autumn term, master of Computer Scince, Cryptography Algorithm and

Protocol

2013, summer term, master of Computer Scince, Cryptography algorithm and

protocol

2013, autumn term, for undergraduates, Discrete

Mathematic

2014, spring term, for undergraduates, 计算机安全与密码学

2014, spring term, for master of CS, Cryptography Algorithm and Protocol

2014, spring term, for master of Computer Technique Engineering, Cryptography and Computer Security

2014 autumn term, for undergraduates, Discrete Mathematic

2015, spring term, for master of CS, Cryptography Algorithm and Protocol

2015, spring term, for undergraduates, 计算机安全与密码学

2015-2017, spring term, for master of Computer Technique Engineering, 计算机安全学

2015-2017, autumn term, for undergraduates, Discrete Mathematic (IEEE Class, 2017)

2016-2018, spring term/autumn term, for undergraduates, 计算机安全与密码学

2016-2018, spring term, for master of CS, Cryptography Algorithm and Protocol

1.高政风,郑继来,汤舒扬,龙宇,刘志强,刘振,谷大武,基于 DAG 的分布式账本共识机制研究, 软件学报

2.蔡晓晴, 邓尧 张亮, 史久琛, 陈全, 郑文立, 刘志强, 龙宇,  王堃,李超, 过敏意,区块链原理及其核心技术,计算机学报

3.Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu and Ning Liu,A Practical Dynamic Enhanced BFT protocol,NSS 2019,13th International Conference on Network and System Security,Sapporo (NSS 2019), Japan | 15-18 December

4.Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu and Dawu Gu,Gnocchi: Multiplexed Payment Channels for Cryptocurrencies,NSS 2019, 13th International Conference on Network and System Security,Sapporo (NSS 2019), Japan | 15-18 December 2019

5.Shuyang Tang, Yao Deng,  Jilai Zheng, Zhiqiang Liu, Zhen Liu, Yu Long and Dawu Gu,Towards a Multi-Chain Future of Proof-of-Space,securecom 2019,15th EAI International Conference on Security and Privacy in Communication Networks (securecomm 2019),2019年10月23日-25日

6.Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu,  A Secure and Practical Blockchain Scheme for IoT, IEEE Trustcom 2019,18th ieee international conference on trust, security and privacy in computing and communications (trustcom 2019), 2019, Aug 05-08, rotorua, New zealand

7.Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Making Monero Hard-to-Trace and More Efficient, IEEE Trustcom 2019. 18th ieee international conference on trust, security and privacy in computing and communications (trustcom 2019), 2019, Aug 05-08, rotorua, New zealand

8.Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu,“Z-Channel: Scalable and Efficient Scheme in Zerocash” ,Computers & Security ,special issue on Blockchain and Cryptocurrency ,(2019,accepted)

9.Zhiqiang Liu, Shuyang Tang, Sherman Chow, Zhen Liu, Yu Long,Fork-Free Hybrid Consensus with Flexible Proof-of-Activity,Future Generation Computer Systems ,Volume 96, July 2019, Pages 515-524,

10.  Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu and Yu Yu. Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol, 14th International Conference on Information Security and Cryptology (INSCRYPT 2018), Fuzhou, China, 14-17 Dec, 2018.

11.Long Yu(#)(*); Wang Xin; Xu Xian; Hong Xuan,Highly-descriptive chain of trust in trusted computing,清华大学学报(自然科学版), 2018.04.04, 58(04): 387~394

12.Huige Wang, Kefei Chen, Joseph Liu, Ziyuan Hu, Yu Long, Access Control Encryption with Efficient Verifiable Sanitized Decryption, Information Sciences, V. 465, pp. 72-85, 2018

13.潘晨,刘志强,刘振,龙宇. 区块链可扩展性研究:问题与方法,计算机研究与发展,2018.

14.  Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu, Z-Channel: scalable and efficient scheme in zerocash, 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), Wollongong, Australia, 11-13 July, 2018, LNCS 10946, pp. 1–19, 2018. (Best paper candidate).

15.Fenjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Secure Scheme Against Compromised Hash in Proof-of-work Blockchain, Network and System Security (NSS 2018), Hong Kong, China, 27-29 August, 2018.

16.Xu Hao, Long Yu, Liu Zhiqian, Liu Zhen, Dynamic practical byzantine fault tolerance. IEEE Conference on Communications and Network Security (IEEE CNS 2018), Beijing, China, 30 May-1 June, 2018..

17.Liangliang Wang, Kefei Chen, Yu Long, HuigeWang, An efficient pairing-free certificateless signature scheme for resource-limited systems, Science China information Sciences (2017, Accepted). (SCI, EI)(CCF B)

18.Liangliang Wang, Kefei Chen, Yu Long and Huige Wang. Cryptanalysis of a certificateless aggregate signature scheme. Security and Communication Networks, 2016, 9(11):1353-1358.(SCI, EI)(CCF C)

19.Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long: Fuzzy certificateless signature. Security and Communication Networks 9(16): 3658-3669 (2016). (SCI, EI)(CCF C)

20.Huige Wang,Kefei Chen,Yu Long,J Ye,Liangliang Wang,A new randomized message-locked encryption in the standard model,Peer-to-Peer Networking and Applications, 2016:1-11. (SCI, EI)(CCF C)

21.Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, A new RSA-based proxy re-encryption scheme, Journal of Computational Information Systems,2015,11(2):567-575.(EI)

22.Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings, International Conference on Intelligent Networking & Collaborative Systems 2015. (EI)

23.Jianhong Chen, Yu Long, Kefei Chen, Attribute-based parallel key insulated signature, Cybernetics and Information Technologies, 2015, 15(3). (EI)

24.X Mao,K Chen,L Wang,Y Long, On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme,2014 International Conference on Intelligent Networking and Collaborative Systems (INCOS 2014) (EI)

25.Xianping Mao,Kefei Chen, Yu Long, Liangliang Wang, Attribute base signature on Lattice, Journal of Shanghai Jiaotong University ,2014,19(4):406-411 (EI)

26.Yu Long, Kefei Chen, XianpingMao, New Constructions of Dynamic Threshold Cryptosystem, Journal of Shanghai Jiaotong University ,2014,19(4):431-435 (EI)

27.Jianhong Chen, Yu Long, Kefei Chen, Attribute-based Key Insulated Signature and Its Applications, Information Sciences, Available online 18 February 2014.

28.Yongtao Wang, Kefei Chen, Yu Long, Accountable Authority Key Policy Attribute-based Encryption, SCIENCE CHINA, Vol. 55, No. 7: 1631-1638, 2012.

29.Xuan Hong, Yu Long, A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETS, Journal of Computers, Vol. 7, No. 7: 1796-1800, 2012.

30.陈剑洪, 陈克非, 龙 宇, 万中美, 于 坤, 孙成富, 陈礼青,密文策略的属性基并行密钥隔离加密,软件学报,第23卷, 第10期, 页码:2795-2804页,2012.

31.Yu Long, Xian Xu, Kefei Chen, Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG, 计算机研究与发展, Vol. 49, No. 5: 932-938, 2012.

32.Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan, Identity Based Key Insulated Signcryption, INFORMATICA, Vol. 23, No. 1: 27-45, 2012.

33.徐贤,龙宇,基于TPM的强身份认证研究,计算机工程,第38卷,第4期,23-27页,2012.

34.Shengli Liu, Yu Long, Kefei Chen, Key Updating Technique in Identity-based Encryption,Information Sciences, Vol. 181: 2436–2440, 2011.

35.Jianhong Chen, Yu Long, Kefei Chen, Yongtao Wang, Identity Based Key Insulated Proxy Signature without Random Oracles, Journal of Shanghai Jiao Tong University, Vol. 16, No. 5: 557-566, 2011.

36.Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen, Restrictive partially blind signature for resource-constrained information systems, Knowledge Information Systems, Vol. 26:87–103, 2011.

37.Chen Jianhong, Long Yu, Chen Kefei, Wang Yongtao, Li Xiangxue, An Efficient Threshold Key-Insulated Signature Scheme, Journal of Shanghai Jiao Tong University, Vol. 16, No. 6: 658-662, 2011.

38.Yu Long, Kefei Chen, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Information Sciences, Vol. 80, No. 7: 1167-1181, 2010.

39.Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Practical Certificateless Aggregate Signatures from Bilinear Maps, Journal of Information Science and Engineering, Vol. 26: 2093-2106, 2010.

40.Mi Wen, Zhi Yin, Yu Long, Yong Wang, An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks, Wireless Sensor Network, Vol. 2: 689-697, 2010.

41.Long Yu, Li Xiangxue, Chen Kefei, Hong Xuan, Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary, Journal of Shanghai Jiao Tong University, Vol. 14, No. 1: 102-107, 2009.

42.Yu Long, Zheng Gong, Kefei Chen, Shengli Liu, Provably Secure Identity-based Threshold Key Escrow from Pairing, International Journal of Network Security, Vol. 8, No. 3: 227-234, 2009.

43.Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG, Certificateless key-insulated signature without random oracles, Journal of Zhejiang University  (Science A), Vol. 10, No. 12: 1790-1800, 2009.

44.Hong Xuan, Chen Kefei, Long Yu, Universally Composable Proactive Threshold RSA Signature Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 659-663, 2008.

45.Wan Zhong mei, Lai Xue-jia, Weng Jian, Hong Xuan, Long Yu, Jia Wei Wei,On Constructing Certificateless Proxy Signature From Certificateless Signature,Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 692-694, 2008.

46.Yu Long, Kefei Chen, Certificateless Threshold Cryptosystem Secure Against Chosen-Ciphertext Attack, Information Sciences, Vol. 177: 5620-5637, 2007.

47.Long Yu, Chen Kefei, Gong Zheng, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Proceeding of the China Cryptography Conference 2007.

48.Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Adaptive Chosen-Ciphertext Attack, Computers and Electrical Engineering, Vol. 33: 166-176, 2007.

49.Z. Gong, Yu Long, K.F. Chen, Efficient Partially Blind Signature from LFSR, SNPD 2007, Vol. 2: 717-722, Qindao, China.

50.Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD 2007, Vol. 3: 188-193, Qindao, China.

51.Yu Long, Kefei Chen, Shengli Liu, Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing, INFORMATICA, Vol. 17, No. 4: 519-534, 2006.

52.Yu Long, Li Shiqun, Liu Shengli, Chen Kefei, How to Construct Provably Secure ID-based Mediated Threshold Cryptosystems without Key Escrow, Proceeding of the China Cryptography Conference 2006.

53.Yu Long, Chen Kefei, Hong Xuan, A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing, Chinese Journal of Computers, Vol.29. No.9: 1679-1687, 2006.

54.Yu Long, Kefei Chen, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, Vol. 2, No.2: 111–113, 2006.

55.Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack, Journal of Shanghai Jiao Tong University (Science), Vol. E-11, No. 2: 127-133, 2006.

56.Yu Long, Zhenfu Cao, Kefei Chen, A Dynamic Threshold Commercial Key Escrow Scheme Based on Conic, Applied Mathematics and Computation, Vol. 171, No. 2: 972-982, 2005.

57.Ruishan Zhang, Yu Long, Kefei Chen, An Efficient Proactive Secret Sharing Scheme for Disjoint Large Scale Ad Hoc Networks, 5th Workshop on Applications and Services in Wireless Networks (ASWN2005), IEEE Press, 2005 pp.1-7.

58.龙宇,曹珍富,对密钥托管系统中LEAF结构的研究 ,计算机工程,第31卷,第 12期,156-160页, 2005。

59.龙宇,曹珍富,一种动态(k,n)门限方案,计算机工程,第31卷,第 12期,154-155页, 2005

AS PI

◆       Natural

Science Foundation of China, On the Key Issues in the new functional encryption

sheme, 2016-2019

Natural

Science Foundation of China, On the provably secure distributed public key

encryption scheme in network environment, 2010-2012

Ph.D.

Programs Foundation of Ministry of Education of China, On the basic issues

about distributed public key encryption scheme in real network environment, 2010-2012

National

Key laboratory of Information Security, On the dynamic distributed encryption

scheme, 2011-2012

Institute

of Jiang Nan, On the paring-based discrete logarithmic issue in cryptography,  2013-2015

Cryptographic

Technique and Information Security, Key laboratory of Ministry of Education of

China, On new secure and efficient functional encryption scheme, 2015-2017

Project

of Authentication, IBM corporation, 2009

ChenXing

Project of Shanghai Jiao Tong University, 2009

◆        Teaching Reform Project of Shanghai Jiao Tong University (graduate course) ,  2017

Teaching

Reform Project of Shanghai Jiao Tong University (undergraduate course),  2015

AS member

National Natural Science Foundation of China

(Key Program), No. 61133014

National High Technology Research and

Development Program of China (863 Program), No. 2006AA01Z422

Major State Basic Research Development

Program of China (973 Program), No. 2007CB311201

National Natural Science Foundation of

China, No. 60903020 90704004,61472114

Joint project with HuaWei on trusted

computing, security attack and defense, and evolution of cryptographic

algorithms

Joint project with Kuo Yue, Joint innovation

center of blockchain

2010 SMC Program of Shanghai Jiao Tong University

2008 IBM Phd. Fellowship

2004-2005 Dong’s East Scholarship of Shanghai Jiao Tong University

2004 Excellent Graduate of Shanghai Jiao Tong University

2002 State Outstanding Graduate of South West Jiao Tong University

上海交大计算机科学与工程,上海交通大学计算机科学与工程系(CSE)相关推荐

  1. 上海交通大学计算机科学好吗,上海交通大学计算机科学与技术考研难不难和研究生专业好不好...

    Add上海交通大学微信 研究生为你答疑,送资源 QQ咨询: 很多考生在准备上海交通大学计算机科学与技术考研难不难和研究生专业好不好?是考研报考的时候都会产生这样的疑问:这个专业的研究生好吗?适合我吗? ...

  2. 上交大计算机科学与技术,上海交通大学计算机科学与工程系(CSE)

    近三年代表性论著: (1) Dongliang Xue; Linpeng Huang*; Chao Li; Chentao Wu; Dapper: An Adaptive Manager for La ...

  3. 大学计算机系学unity,上海交通大学计算机科学与工程系(CSE)

    由上海交通大学电子信息与电气学院.VRCORE联合举办,徐氏科技创新奖学基金支持,由上海交通大学电子信息与电气工程学院.上海交通大学计算机科学与工程系VR教育中心.上海交大科技园共同承办的首届中国大学 ...

  4. 中国计算机科学实验室,上海交通大学计算机科学与工程系(CSE)

    上海交通大学计算机科学与技术学科的建立可追溯到1958年,1984年成立计算机科学与工程系.本系于1998年获博士后流动站,2000年获得该一级学科博士学位授予权,2002年"计算机软件与理 ...

  5. 计算机专业特殊人才上大学,上海交通大学计算机科学与工程系(CSE)

    首批"国家高层次人才特殊支持计划"教学名师,"上海市教学名师奖"获得者 国家级精品课程负责人2008 数据结构 入选首批"国家高层次人才特殊支持计划& ...

  6. 上海交通大学计算机学院导师介绍,上海交通大学计算机科学与工程系导师教师师资介绍简介-张同珍副教授...

    上海交通大学计算机科学与工程系导师教师师资介绍简介-张同珍副教授本站小编 Free考研考试/2021-01-02 张 同珍 副教授 主页: 办公室电话:+86-21-3420-4226 办公地点:SE ...

  7. 上海交通大学计算机学院导师介绍,上海交通大学计算机科学与工程系导师教师师资介绍简介-申丽萍副教授...

    上海交通大学计算机科学与工程系导师教师师资介绍简介-申丽萍副教授本站小编 Free考研考试/2021-01-02 申 丽萍 副教授 主页:[点击这里] 办公室电话:+86-21-3420-4226 办 ...

  8. 上海交通大学计算机科学步丰林,上海交通大学软件学院

    研究方向 软件工程,信息系统建模,CAD 教育背景 1978/09-1982/07,上海交通大学材料科学及工程系,本科生 1992/09-1995/02,上海交通大学塑性成型系,硕士研究生 工作经验 ...

  9. 上海交通大学计算机科学导论,数模之旅——上海交通大学“高教社杯”获奖团队的追寻之路...

    2018年"高教社杯"全国大学生数学建模竞赛(CUMCM,简称国赛)于11月10日揭晓奖项,上海交通大学电子信息与电气工程学院计算机系高晓沨老师指导的学生刘一鸣(电院计算机系).王 ...

最新文章

  1. python中文编辑器推荐-八款Python编辑器对比介绍推荐
  2. Centos7 配置静态ip地址
  3. 开关电源雷击浪涌整改_大佬多年经验总结,开关电源EMI整改策略
  4. get/post 接口调用
  5. python 钉钉机器人发送图片_Python结合钉钉实时自动监控股票行情,上班炒股再也不怕老板发现...
  6. c语言判断整数_用c++编写闰年的判断基础程序
  7. KVM虚拟机PCI设备直通
  8. Required String parameter 'images' is not present
  9. 也来学学插件式开发续-利用MEF
  10. python装饰器详解-Python 函数装饰器
  11. LeetCode - Merge Two Sorted Lists
  12. Python高级特性之---切片操作
  13. C语言控制台美化教程
  14. 回归分析中自变量取舍、检验及多重共线性处理(VIF)
  15. iptables failed: iptables --wait -t nat -A DOCKER -p tcp -d 0/0 --dport 80 -j DNAT ...
  16. 倾斜摄影测量数据的一些简析
  17. Python数学建模 熵权法/熵值法
  18. 微信小程序-刷新当前页
  19. Android 小米应用角标
  20. Bessie‘s Dream

热门文章

  1. 是男人就下100层【第一层】——高仿微信界面(1)
  2. 比较牛的竞赛总结和竞赛博客
  3. Web网站测试流程和方法
  4. 量化投资之王:他连续27年回报率打败巴菲特
  5. 【原】Java学习笔记022 - 字符串
  6. OpenStack-T中使用密钥对登录虚拟机实例
  7. Opencv之图像滤波:2.均值滤波(cv2.blur)
  8. selenium与各个浏览器版本兼容
  9. 网络编程(六) ———— IP协议(IPV4IPV6)
  10. vue+element-ui 实现分页(demo)