密码是关系国家根本利益的战略资源,是网络空间安全的核心技术。国家领导人指出,密码工作是
“我们党和国家的命门、命脉”,并将密码技术与核技术、航空航天技术并列为国家安全的三大战略科技。《中华人民共和国密码法》已于 2020 年 1 月 1
日正式实施。伴随密码法的出台和施行,密码技术作为网络空间安全的核心技术和基础支撑必将发挥更大作用,密码事业在百年未有之大变局中必将迎来重大历史发展机遇。
密码学实验室目前有全职科研人员 5 人,实验室研究方向为:后量子密码、区块链、密码协议、面向新应用新业态(5G、智能群组、物联网、云计算)的新型密码技术及应用、密码工程及芯片、量子计算。实验室长期和国内外密码领域学者有密切的合作,比如国内的清华大学图灵奖姚期智院士团队、美国哥伦比亚大学的 Moti Yung 教授等。实验室多位同学去约翰-霍普金斯大学、康奈尔大学、普渡大学、新加坡国立大学等深造或交流。
代表性成果及奖励
代表性论著
(1) Andrew C. Yao; Moti Yung; Yunlei Zhao ; Concurrent
Knowledge Extraction
in Public-Key Models,
Journal of Cryptology , 2016, 29(1): 156-219 ( 期刊论文)
(2) Yunlei Zhao ; Identity-Concealed Authenticated Encryption
and Key
Exchange, ACMCCS 2016 ,奥地利,
2016-8-1至2016-8-3 ( 会议论文)
(3) 沈诗羽; 何峰; 赵运磊 ; Aigis密钥封装算法多平台高效实现与优化, 计算机研究与发展 , 2021,
58(10): 2238-2252
( 期刊论文)
(4) Yunlei Zhao ; Identity-based authenticated encryption with
identity
confidentiality, 25th
European
Symposium on Research in Computer Security, ESORICS 2020 , Guildford, United kingdom,
2020-9-14至2020-9-18 ( 会议论文)
(5) Zhengzhong Jin; Yunlei Zhao ; Generic and practical key
establishment
from lattice, 17th
International Conference on Applied Cryptography and Network Security, ACNS 2019 , Bogota,
Colombia,
2019-6-5至2019-6-7 (会议论文)
(6) Privacy-Preserving_Aggregation-Authentication_Scheme_for_Safety_Warning_System_in_Fog-Cloud_Based_VANET
(7) AP-PRE_Autonomous_Path_Proxy_Re-Encryption_and_Its_Applications
(8) Compact_and_Flexible_KEM_from_Ideal_Lattice
(9) A Traitor-resistant and Dynamic Anonymous Communication Service for Cloud-based VANETs
(10) Half-Aggregation of Schnorr Signatures
(11) Order-Revealing Encryption_File-Injection Attack and Forward
(12) AKCN-MLWE 算法 AVX2 高效实现
(14) Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings
(15) Fine-Grained_and_Controllably_Editable_Data_Sharing_With_Accountability_in_Cloud_Storage
(16) Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal
(17) 面向自动驾驶的高效可追踪的车联网匿名通信方案
(18) OSKR/OKAI: Systematic Optimization of Key Encapsulation Mechanisms from Module Lattice
(19) 基于模格的密钥封装方案的比较分析与优化
(20) Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions
(21) Practical CCA-Secure Functional Encryptions for Deterministic Functions
(22) Functional broadcast encryption with applications to data sharing for cloud storage
(23) Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing
(24) Identity-Based Higncryption