数计-黄欣沂
发布时间:2017-04-18 浏览次数: 5368


名:黄欣沂

别:男

出生年月:1981/3

称:教授

研究方向:密码学与信息安全

学科专长:网络空间安全

EMAIL:xyhuang@fjnu.edu.cn

通信地址:福建省福州市金沙澳门登录网站旗山校区数学与计算机科学学院

邮编:350117

个人概况:男,汉族,1981年3月生,江苏仪征人。现为金沙澳门登录网站数学与计算机科学学院教授,博士生导师。长期从事数字签名、身份认证等方面的研究,研究工作发表于ACM CCS,ESORICS, PKC,IEEE Transactions,ACM Transactions等学术会议和期刊。主持国家自然科学基金、霍英东青年教师基金等科研项目;担任中国密码学会理事、IEEE TDSC等学术期刊编委,AsiaCCS等学术会议主席,ESORICS等学术会议程序委员会委员。入选福建省高层次人才计划,“福建青年五四奖章”获得者。

教育经历:

1998/9-2002/7,南京师范大学,数学与应用数学,学士;

2002/9-2005/7,南京师范大学,运筹学与控制论,硕士;

2006/3-2009/7,澳大利亚University of Wollongong,信息安全,博士。

科研与学术工作经历:按时间倒排序,包括博士后研究经历和学术访问等

2012/2-至今,金沙澳门登录网站,数学与计算机科学学院,教授;

2011/2-2011/11,Institute for InfoComm Research,Infocomm Security,研究型科学家;

2010/2-2011/2,Singapore Management University,School of IS,博士后。

学术兼职:

中国密码学会第三届理事会理事;青年工作委员会副主任;CCF YOCSEF 厦门 AC 委员;IEEE Transactions on Dependable and Secure Computing(CCF网络与信息安全最高级别A类期刊)、International Journal of Information Security(SCI期刊,中国密码学会推荐的B类期刊)等7个国际学术期刊的(专刊)编委;中国科协第265次青年科学家论坛(面向云计算的密码新技术)实行主席;ACM AsiaCCS2016(ACM主办的亚太地区信息安全旗舰会议)程序委员会共同主席(Program Co-Chair); ESORICS 2014-2017(连续四年, CCF 推荐的网络与信息安全 B 类会议)等 30 多个 CCF 推荐的国际学术会议程序委员会委员(Program Committee Member)。

研究方向:主要从事密码学、信息安全及其应用方面的研究

成果奖励省部级以上科技成果奖励

1.黄欣沂,第三届福州青年五四奖章,共青团福建省委,福建省青年联合会,2014年5月;

2.黄欣沂,第十二届福建青年五四奖章,共青团福建省委,福建省青年联合会,2015年5月;

科研项目:按时间倒排序,含主持或参与,在研或结题等。格式:项目类别,批准号,名称,研究起止年月,获资助金额,项目状态(已结题或在研等),主持或参加。

1.福建省杰出青年科学基金项目,2016J06013,云数据安全分享技术,2016/03-2019/03,25万元,在研,主持;

2.国家自然科学基金面上项目,61472083,公共平台中个人健康记录的安全保障技术研究,2015/01-2018/12,81万元,在研,主持;

3.促进海峡两岸科技合作联合基金项目,U1405255,面向异构物联网的安全融合理论及关键技术研究,2015/01-2018/12, 245万元,在研,参加;

4.霍英东高等院校青年教师基金基础性研究课题,141065,隐私保护安全协议的理论与实践研究,2014/03-2017/02,2万美金,在研,主持;

5.国家自然科学基金青年基金项目,61202450,大规模网络安全身份认证协议若干问题研究,2013/01-2015/12, 24万元,已结题,主持。

教学情况:5年讲授的研究生课程和引导学生参加创新创业比赛等

博士研究生:密码学理论与应用

硕士研究生:安全协议与应用、密码学理论与技术课程

论文著作:按时间倒排序,近5年发表的代表性学术论文、出版的学术专著、授权的发明专利和公开的政府咨询报告等;

5年代表性学术论文:

1.Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, and Xinyi Huang (黄欣沂)*."Universally Composable RFID Mutual Authentication". IEEE Transactions on Dependable and Secure Computing, 2017,14(1): 83-94.(CCF A)

2.Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang(黄欣沂), Willy Susilo, Yuanshun Dai, Geyong Min. "Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage". IEEE Transactions on Information Forensics and Security,2017, 12(4): 767-778.(CCF A)

3.Jianghua Liu, Jinhua Ma, Wei Wu, Xiaofeng Chen, Xinyi Huang (黄欣沂)* and Li Xu. “Protecting Mobile Health Records in Cloud Computing: A Secure, Efficient, and Anonymous Design".  ACM Transactions on Embedded Computing Systems,2017,16(2):1-57.

4.Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang(黄欣沂) and J. L. Danger. "A Generic Table Recomputation-based Higher-Order Masking". IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2017. (DOI: 10.1109/TCAD.2017.2661823)

5.Chao Lin, Wei Wu, Xinyi Huang(黄欣沂), Li Xu. "A New Universal Designated Verifier Transitive Signature Scheme for Big Graph Data". Journal of Computer and System Sciences, 2017,83(1):73-83.

6.Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang(黄欣沂), Yang Xiang, and Zoe L. Jiang. “A General Framework for Secure Sharing of Personal Health Records in Cloud System”, Journal of Computer and System Sciences, 2017. (Accepted, 10.1016/j.jcss.2017.03.002)

7.Zhe Liu, Xinyi Huang(黄欣沂), Zhi Hu, Muhammad Khurram Khan, Hwajeong Seo, and Lu Zhou. "On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age". IEEE Transactions on Dependable and Secure Computing, 2016. (Accepted on 2016-04-06) (CCF A)

8.Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang(黄欣沂). "Targeted Online Password Guessing: An Underestimated Threat". ACM Conference on Computer and Communications Security (ACM CCS 2016),2016,1242-1254. (CCF A)

9.Rongmao Chen, Yi Mu,  Guomin Yang, Fuchun Guo, Xinyi Huang(黄欣沂) and Xiaofen Wang. "Server-Aided Public Key Encryption with Keyword Search". IEEE Transactions on Information Forensics and Security, 2016, 11(12): 2833-2842. (CCF A)

10.Shaohua Tang, Xiaoyu Li, Xinyi Huang(黄欣沂), Yang Xiang, and Lingling Xu. "Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing".IEEE Transactions on Computers,2016,65(7):2325-2331.(CCF A)

11.Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, and Xinyi Huang (黄欣沂)*. "Cryptographic Hierarchical Access Control for Dynamic Structures". IEEE Transactions on Information Forensics and Security,2016,11(10): 2349-2364.(CCF A)

12.Kaitai Liang, Xinyi Huang (黄欣沂)*, Fuchun Guo, and Joseph K. Liu. "Privacy-Preserving and Regular Language Search over Encrypted Cloud Data".  IEEE Transactions on Information Forensics and Security,2016,11(10): 2365-2376. (CCF A)

13.Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione, Jin Li and Xinyi Huang (黄欣沂)*. "Hierarchical and Shared Access Control". IEEE Transactions on Information Forensics and Security, 2016, 11(4): 850-865. (CCF A)

14.Joseph K. Liu, Man Ho Au, Xinyi Huang(黄欣沂), Rongxing Lu, and Jin Li. "Fine-grained Two-factor Access Control for Web-based Cloud Computing Services". IEEE Transactions on Information Forensics and Security,2016,11(3): 484–497.(CCF A)

15.Jin Li, Xiaofeng Chen, Xinyi Huang(黄欣沂), Shaohua Tang and Yang Xiang. "Secure Distributed Deduplication Systems with Improved Reliability". IEEE Transactions on Computers,2016,64(12): 3569-3579. (CCF A)

16.Jianfeng Wang, Xiaofeng Chen, Xinyi Huang (黄欣沂), Ilsun You, and Yang Xiang. "Verifiable Auditing for Outsourced Database in Cloud Computing". IEEE Transactions on Computers, 2016, 64(11): 3293-3303. (CCF A)

17.Yuexin Zhang, Yang Xiang, and Xinyi Huang (黄欣沂)*. "Password Authenticated Group Key Exchange: A Cross-Layer Design". ACM Transactions on Internet Technology Volume, 2016, 16(4) 24:1-24:20.

18.Xiaofeng Chen, Jin Li, Xinyi Huang(黄欣沂), Jianfeng Ma, and Wenjing Lou. "New Publicly Verifiable Databases with Efficient Updates". IEEE Transactions on Dependable and Secure Computing, 2015, 12(5): 546-556. (CCF A)

19.Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang(黄欣沂), Willy Susilo, and Jianying Zhou. "K-times Attribute-Based Anonymous Access Control for Cloud Computing". IEEE Transactions on Computers, 2015, 64(9): 2595-2608. (CCF A)

20.Xiaofeng Chen, Xinyi Huang(黄欣沂), Jin Li, Jianfeng Ma, Wenjing Lou, and Duncan S. Wong. "New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations". IEEE Transactions on Information Forensics and Security, 2015, 10(1): 69-78. (CCF A)

21.Joonsang Baek, Quang Hieu Vu, Joseph K. Liu, Xinyi Huang(黄欣沂), and Yang Xiang. "A Secure Cloud Computing based Framework for Big Data Information Management of Smart Grid". IEEE Transactions on Cloud Computing, 2015, 3(2): 233-244.

22.Joseph K. Liu, Cheng-Kang Chu, Sherman S.M. Chow, Xinyi Huang(黄欣沂)*, Man Ho Au, and Jianying Zhou. "Time-Bound Anonymous Authentication for Roaming Networks". IEEE Transactions on Information Forensics and Security, 2015, 10 (1): 178-189. (CCF A)

23.Debiao He, Sherali Zeadally, Baowen Xu and Xinyi Huang (黄欣沂)*. "An Efficient Identity-based Conditional Privacy-preserving Authentication Scheme For Vehicular Ad-hoc Networks". IEEE Transactions on Information Forensics and Security, 2015, 10(12): 2681-2691.  (CCF A)

24.Xinyi Huang(黄欣沂), Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, and Jianying Zhou. "Cost-Effective Authentic and Anonymous Data Sharing with Forward Security". IEEE Transactions on Computers, 2015, 64(4): 971-983, IEEE Computer Society. (CCF A)

25.Jin Li, Hongyang Yan, Zheli Liu, Xiaofeng Chen, Xinyi Huang(黄欣沂), and Duncan S. Wong. "Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks". IEEE Systems Journal, 2015, 1-10.

26.Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang(黄欣沂), Jintai Ding, and Zhiming Yang. "Provably Secure Group Key Management Approach Based upon Hyper-Sphere". IEEE Transactions on Parallel and Distributed Systems, 2014, 25(12): 3253-3263. (CCF A)

27.Xiaofeng Chen, Jin Li, Xinyi Huang(黄欣沂), Jingwei Li, Yang Xiang, and Duncan S. Wong. "Secure Outsourced Attribute-based Signatures". IEEE Transactions on Parallel and Distributed Systems, 2014, 25(12): 3285-3294. (CCF A)

28.Jin Li, Xinyi Huang(黄欣沂), Jingwei Li, Xiaofeng Chen, and Yang Xiang. "Securely Outsourcing Attribute-based Encryption with Checkability". IEEE Transactions on Parallel and Distributed Systems, IEEE Computer Society, 2014, 25(8): 2201-2210. (CCF A)

29.Xinyi Huang(黄欣沂), Yang Xiang, Elisa Bertino, Jianying Zhou, and Li Xu. "Robust Multi-Factor Authentication for Fragile Communications". IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2014, 11(6): 568-581. (CCF A)

30.Xinyi Huang(黄欣沂), Xiaofeng Chen, Jin Li, Yang Xiang, and Li Xu. "Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems". IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7): 1767-1775. (CCF A)

31.Joseph K. Liu, Man Ho Au, Xinyi Huang(黄欣沂), Willy Susilo, Jianying Zhou, and Yong Yu. "New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era". The 19th European Symposium on Research in Computer Security (ESORICS),Lecture Notes in Computer Science, 2014, 8712: 182-199.

32.Yuexin Zhang, Yang Xiang, Xinyi Huang(黄欣沂)*, and Li Xu. "A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks". The 19th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, 2014, 8712: 526-541.  

33.Yuexin Zhang, Li Xu, Yang Xiang, and Xinyi Huang(黄欣沂). "A Matrix-based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre Deployment Knowledge". IEEE Transactions on Emerging Topics in Computing (IEEE TETC), 2014, 1(2): 331-340.

34.禹勇,李继国,伍玮,黄欣沂*. "基于身份签名方案的安全性分析". 计算机学报, 2014, 37(5): 1025-1029.

35.李继国,钱娜,黄欣沂,张亦辰. "基于证书强指定验证者签名方案". 计算机学报, 2012,35(8): 1579-1587.

学术专著:

1.陈志德,黄欣沂,许力.身份认证安全协议理论与应用,电子工业出版社,385000,2015年1月,385千字.

引导研究生:

博士研究生:2016级  马金花

硕士研究生:2017级  陈红、陈鑫、王丹、赵勇

            2016级  宋永成、王健、郑明梅、唐紫鑫

            2015级  林成骏、王敏、朱飞

            2014级  林超、李洋

            2013级  刘江华、杨旭

            2012级  李梦婷、侯书权


XML 地图 | Sitemap 地图