陆阳

陆阳      的照片 姓  名: 陆阳 性  别: 出生年月: 1977年11月
职  称: 副教授 毕业学校:    中国人民解放军理工大学
专 业:   网络信息安全 学 位:   博士
联系电话:   13401929210 电子邮件: luyangnsd@163.com
研究方向:

密码学理论及其应用、网络与信息安全 (欢迎报考本人的硕士研究生)

获奖情况:

2008年,河海大学教师讲课比赛一等奖

2009年,河海大学三育人先进个人

2010年,河海大学优秀主讲教师

2013年,河海大学本科毕业设计(论文)优秀指导教师

2017年,河海大学优秀硕士学位论文指导教师

主要成果

近年来,主持了国家自然科学基金项目“抗关键词猜测攻击的可搜索公钥加密的研究”、中央高校基本科研业务费项目“抗关键词猜测攻击的可搜索公钥加密的研究”、中央高校基本科研业务费项目“可证明安全的基于证书加密体制及其扩展研究”和河海大学自然科学基金项目“基于证书加密方案的研究”等项目的研究,作为主要成员参加了国家自然科学基金项目“云计算环境下属性基密码及其应用研究”、国家自然科学基金项目“可证明安全的基于证书密码体制及其拓展研究”、国家自然科学基金项目“基于证书密码体制研究”、国家自然科学基金项目“云计算环境下属性基密码及其应用研究”、国家自然科学基金项目“分布式网络环境下终端可信技术研究”、江苏省自然科学基金项目“抗泄漏的公钥密码算法研究”、中美计算机科学研究中心开放课题“公钥密码及其在云计算中的应用研究”以及中央高校基本科研业务费重点培育专项“云计算环境下公钥密码关键技术研究”等项目的研究。此外还参加了国家863项目“分布式可信计算系统研究”和国家863应急项目基金“信息安全系统工程方法研究”。至今,已在Information Sciences、Theoretical Computer Science、The Computer Journal、Future Generation Computer Systems、IET Information Security、Security and Communication Networks、International Journal of Computer Mathematics、Annals of Telecommunications、Frontiers of Information Technology & Electronic Engineering、KSII Transactions on Internet and Information Systems、Advances in Mathematics of Communications、Journal of Information Science and Engineering、Information Technology and Control、通信学报、计算机研究与发展等国内外学术期刊以及相关国际会议上发表学术论文50余篇,其中SCI检索论文20余篇(JCR一区4篇,中国计算机学会推荐国际学术刊物B类期刊5篇/C类期刊3篇,中国密码学会推荐学术刊物B类期刊2篇/C类期刊2篇),EI检索论文40多篇。此外,申报专利8项(含授权2项),参与编写出版信息安全系列教材1部。

目前,为IEEE会员、中国计算机学会以及中国密码学会会员,受邀担任了IEEE Transactions on Information Forensics & Security、Information Sciences、Designs, Codes and Cryptography、Journal of Systems and Software、The Computer Journal、Pervasive and Mobile Computing、Security and Communication Networks、International Journal of Communication Systems、IET Information Security、International Journal of Information Security、Computers & Electrical Engineering、International Journal of Computer Mathematics、Annals of Telecommunications、IETE Technical Review、KSII Transactions on Internet and Information Systems、Information Technology and Control、Advances in Mathematics of Communications、Informatica、Mathematical Problems in Engineering、The Scientific World Journal、International Journal of Security and Networks、International Journal of Network Security、Transactions on Emerging Telecommunications Technologies、Iranian Journal of Science and Technology, Transactions of Electrical Engineering等国际学术期刊审稿人。

 

发表期刊论文:

[1] Lu Yang, Li Jiguo. Constructing pairing-free certificateless public key encryption with keyword search. Frontiers of Information Technology & Electronic Engineering, accepted. (SCI)

[2] Lu Yang, Wang Gang, Li Jiguo. On security of a secure channel free public key encryption with conjunctive field keyword search scheme. Information Technology and Control, accepted. (SCI)

[3] Lu Yang, Zhang Quanling, Li Jiguo. A certificate-based AKA protocol secure against public key replacement attacks. International Arab Journal of Information Technology, accepted. (SCI)

[4] Lu Yang, Li Jiguo, Shen Jian. Weakness and improvement of a certificate-based key-insulated signature in the standard model. The Computer Journal, published online, 2017. https://doi.org/10.1093/comjnl/bxx031 (SCI, 中国计算机学会推荐国际学术刊物B类期刊)

[5] Lu Yang, Wang Gang, Li Jiguo, Shen Jian. New construction of short certificate-based signature against existential forgery attacks. KSII Transactions on Internet and Information Systems, 2017, 11(7): 3629-3647. (SCI)

[6] Lu Yang, Wang Gang, Li Jiguo, Shen Jian. Efficient designated server identity-based encryption with conjunctive keywords search. Annals of Telecommunications, 2017, 72(5-6): 359-370. (SCI, IF 1.412)

[7] Lu Yang, Zhang Quanling, Li Jiguo, Shen Jian. An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Information Technology and Control, 2017, 46(3): 345-359. (SCI, IF 0.633)

[8] Lu Yang and Li Jiguo. Forward-Secure Identity-Based Encryption with Direct Chosen-Ciphertext Security in the Standard Model. Advances in Mathematics of Communications, 2017, 11(1): 161-177. (SCI, IF 0.8)

[9] Lu Yang and Li Jiguo. A Certificate-Based Encryption Scheme Secure against Malicious CA Attacks in the Standard Model. Information Sciences, 2016, 372: 745-757. (SCI, JCR 1区, 2016 IF 4.832, 中国计算机学会推荐国际学术刊物(数据库/数据挖掘/内容检索)B类期刊)

[10] Lu Yang, Zhang Quanling, Li Jiguo. Comment on a Certificateless One-Pass and Two-Party Authenticated Key Agreement Protocol. Information Sciences, 2016, 369: 184-187. (SCI, JCR 1区, 2016 IF 4.832, 中国计算机学会推荐国际学术刊物(数据库/数据挖掘/内容检索)B类期刊)

[11] Lu Yang and Li Jiguo. Provably Secure Certificateless Proxy Signature Scheme in the Standard Model. Theoretical Computer Science, 639: 42-59, 2016. (SCI, 2016 IF 0.698, JCR 3区, 中国计算机学会推荐国际学术刊物(计算机科学理论)B类期刊)

[12] Lu Yang and Li Jiguo. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Generation Computer Systems, 2016, 62:140-147. (SCI, JCR 1区, 2016 IF 3.997, 中国计算机学会推荐国际学术刊物(计算机体系结构/并行与分布计算/存储系统)C类期刊, 中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊).

[13] Li Jiguo, Guo Yuyan, Yu Qihong, Lu Yang, Zhang Yichen and Zhang Futai. Continuous Leakage-Resilient Certificate-Based Encryption. Information Sciences, 2016, 355-356: 1-14. (SCI, JCR 1区, 2016 IF 4.832, 中国计算机学会推荐国际学术刊物(数据库/数据挖掘/内容检索)B类期刊)

[14] Li Jiguo, Guo Yuyan, Yu Qihong, Lu Yang, Zhang Yichen. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Security and Communication Networks, 2016, 9(10): 1016-1024. (SCI, 2016 IF 1.067, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊, 2016中国密码学会推荐学术刊物和国际会议目录(2016)C类期刊)

[15] Lu Yang and Li Jiguo. An improved certificate-based signature scheme without random oracles. IET Information Security, 10 (2) (2016) 80-86. (SCI, JCR 3区, 2016 IF 1.037, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊, 中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊)

[16] Lu Yang, Zhang Quanling. Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings. KSII Transactions on Internet and Information Systems, 10(2): 881-896 2016. (SCI)

[17] Lu Yang, Zhang Quanling and Li Jiguo. An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications, 9(3): 353-373, 2015. (SCI)

[18] Lu Yang. Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds. KSII Transactions on Internet and Information Systems, 9(7): 2703-2718, 2015. (SCI&EI)

[19] Lu Yang and Li Jiguo. Efficient Constructions of Certificate-Based Key Encapsulation Mechanism. International Journal of Internet Protocol Technology, 8(2/3): 96 - 106, 2014. (EI). 

[20] Lu Yang and Li Jiguo. Efficient Construction of Certificate-Based Encryption Secure against Public Key Replacement Attacks in the Standard Model. Journal of Information Science and Engineering, 30(5): 1553-1568, 2014. (SCI&EI, 中国密码学会推荐学术刊物和国际会议目录(2016)C类期刊).

[21] Lu Yang and Li Jiguo. Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Transactions on Internet and Information Systems, 8(7): 2554 - 2571, 2014. (SCI&EI)

[22] Lu Yang and Li Jiguo. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks. The Scientific World Journal, Volume 2014, Article ID 295419, 12 pages. DOI: 10.1155/2014/295419. (SCI, JCR 2区, IF: 1.219)

[23] 陆阳, 李继国. 标准模型下高效安全的基于证书密钥封装机制. 计算机研究与发展,  51(7): 1497-1505, 2014. (EI)

[24] 陆阳, 李继国. 标准模型下前向安全公钥加密方案的新构造. 通信学报, 35(2): 33-39, 2014. (EI)

[25] Lu Yang and Li Jiguo. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics, 90 (12) (2013), pp. 2603-2613. (SCI&EI, JCR 3区, IF: 0.825)

[26] Lu Yang and Li Jiguo. Constructing Pairing-Free Certificate-Based Encryption. International Journal of Innovative Computing, Information and Control, 2013, 9(11): 4509-4518. (EI)

[27] Lu Yang and Li Jiguo. Generic Construction of Forward-Secure Identity-Based Encryption. Journal of Computers, 2012, 7(12):3068-3074. (EI) 

[28] Lu Yang. Efficient and Generic Construction of Certification-based Encryption in the Standard Model Based on the NIZK Proof System. Journal of Networks, 2012, 7(2): 329-336. (EI)

[29] Lu Yang and Li Jiguo. Constructing Certificate-Based Encryption Secure against Key Replacement Attacks. ICIC Express Letters, Part B: Applications, 2012, 3(1): 195-200. (EI)

[30] Lu Yang and Li Jiguo. A Practical Forward-Secure Public Key Encryption Scheme. Journal of Networks, 2011, 6(9): 1254-1261. (EI)

[31] Lu Yang and Li Jiguo. Forward-Secure Certificate-Based Encryption and its Generic Construction. Journal of Networks, vol.5(5):527-534,2010 (EI) 

[32] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption. Journal of Software, vol.4(3):210-217, 2009 (EI) 

[33] Lu Yang, Li Jiguo and Xiao Junmo. Constructing Efficient Certificate-based Encryption with Paring. Journal of Computers, 2009, vol.4(1):19-26 (EI) 


发表会议论文

[1] Lu Yang, Zhang Quanling and Li Jiguo. Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols. In DCABES 2015, pp. 159-162, 2015. (EI)

[2] Lu Yang, Li Jiguo. Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption. In 2012 Fourth International Symposium on Information Science and Engineering, pp. 199-202, 2012. (EI)

[3] Lu Yang. Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model. In 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, pp.62-69, 2011. (EI)

[4] Lu Yang. An Efficient and Provably Secure Certificate-Based Encryption Scheme. In 2nd International Conference on Theoretical and Mathematical Foundations of Computer Science, pp.54-61, 2011. (EI)

[5] Lu Yang. An Efficient and Provably Secure Forward-Secure Public Key Encryption Scheme in the Standard Model. In 3rd International Conference on e-Business and Information System Security, pp.5-8, 2010. (EI)

[6] Lu Yang, Li Jiguo. Constructing Efficient Certificate-Based Encryption Scheme with Pairing in the Standard Model. In 2010 IEEE International Conference on Information Theory and Information Security, pp. 234-237, 2010. (EI)

[7] Lu Yang, Li Jiguo. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles. In 3rd International Symposium on Electronic Commerce and Security Workshops, pp. 22-25, 2010. (EI)

[8] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption. In the 5th International Conference on Information Assurance and Security, Xian, China, pp.57-60, 2009 (EI)

[9] Lu Yang, Li Jiguo. Generic Construction of Certificate-based Encryption in the Standard Model. In 2nd International Symposium on Electronic Commerce and Security, pp.25-29, 2009 (EI)

[10] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption: Definition and Concrete Construction. In 1st International Conference on Networks Security,Wireless Communications and Trusted Computing, pp.276-280, 2009 (EI)

[11] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption: Definition and Generic Construction. In 2009 International Conference on e-Business and Information System Security, pp.30-34, 2009 (EI)

[12] Lu Yang, Li Jiguo and Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. In 1st International Symposium on Electronic Commerce and Security, pp. 296-300, 2008 (EI)

[13] Lu Yang, Xiao Junmo. A New Formal Analysis Method for Security Protocols. In 2nd International Conference on Computer Science and Education, pp. 724-729, 2007 (EI)

[14] Lu Yang, Xiao Junmo. Protecting XML Databases against Ontology-based Inference Attack. In 3rd International Conference on Computational Intelligence and Security, pp. 838-842, 2007. (EI)

[15] Lu Yang, Li Jiguo, Xiao Junmo. Generic Construction of Certificate-based Encryption. In 9th International Conference for Young Computer Scientists, pp. 1518-1594, 2008 (EI)

[16] Lu Yang, Li Jiguo. A General and Secure Certificate-based Encryption Construction. In 3rd ChinaGrid Annual Conference, pp. 182-189, 2008 (EI) 

申请专利

[1] 陆阳, 李继国. 一种基于短期证书的密钥封装方法, 申请号:201310196758.2, 授权号:ZL201310196758.2

[2] 陆阳, 李继国. 一种基于证书代理重加密方法和系统, 申请号:201310572508.4, 授权号:ZL201310572508.4

[3] 陆阳, 张全领, 李继国. 一种分布式的基于(k, n)门限证书加密方法与系统, 申请号:    201410387870.9

[4] 陆阳, 张全领, 李继国. 一种n层CA结构的基于证书加密的方法及系统, 申请号:201410387721.2

[5] 陆阳, 张全领, 李继国. 一种基于证书的两方认证密钥协商方法与系统, 申请号:201510247662.3

[6] 李继国, 石岳蓉, 陆阳, 张亦辰等. 一种基于属性的加密方法和系统, 受理号: 201410612226.7

[7] 李继国, 赵雪霞, 张亦辰, 陆阳等. 一种基于证书条件代理重加密方法和系统, 受理号: 201410614744.2

[8] 李继国, 石岳蓉, 陆阳, 张亦辰. 一种隐私保护且支持用户撤销的基于属性加密方法和系统. 受理号: 201510392617.7 

 

在研项目:

[1] 国家自然科学基金项目“抗关键词猜测攻击的可搜索公钥加密的研究”(项目编号: 61772009,2018.1~2021.12,主持)

[2] 中央高校基本科研业务费项目“抗关键词猜测攻击的可搜索公钥加密的研究” (项目编号: 2017B17014,2018.1~2019.12,主持)

个人主页:  http://www.escience.cn/people/luyangnj/index.html