|
- Name:LIU Zhen
- Title:Research Professor
- Office:3-509
- Office Phone:34208651
- Email:liuzhen@sjtu.edu.cn
- Website:
|
Research Field
Applied Cryptography and Information Security:
Attribute-Based Encryption, Searchable Encryption, Homomorphic Encryption, Lattice-Based Cryptography,
Could Computing Security, Big Data Security,
Blockchain, Cryptocurrency
Education
1995.09-1999.07, Shanghai Jiao Tong University, Bachelor of Science, in Applied Mathematics
1999.09-2002.03, Shanghai Jiao Tong University, Master of Science, in Mathematics
2008.09-2013.06, Shanghai Jiao Tong University, Ph.D.
2010.09-2013.06, City University of Hong Kong, Ph.D.
Work experience
2013.08-2015.03, City University of Hong Kong
2015.06-2016.07, Hong Kong Applied Science and Technology Research Institute Company Limited (ASTRI)
2016.08-Now, Shanghai Jiao Tong University
Research
National Natural Science Foundation of China (NSFC) Grant No. 61672339, “Research on Traitor Tracing in Attribute-Based Encryption”, 2017.1.1-2020.12.31.
Awards and Honors
Teaching
Publications
Journal Articles
1. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong, “Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps,” Frontiers of Computer Science 10(4): 741-754 (2016).
2. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen, “Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia 18(5): 940-950 (2016).
3. Zhen Liu and Duncan S. Wong, “Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” Comput. J. 59(7): 983-1004 (2016).
4. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild,” IEEE Transactions on Information Forensics and Security 10(1): 55-68 (2015).
5. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “White-box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures,” IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013).
Refereed Conference Papers
1. Zhen Liu, Duncan S. Wong, and Jack Poon, “Dealerless Corporate Key Generation for Identity-Based Encryption Schemes,” The 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pp. 211-222, ACM, 2016.
2. Zhen Liu and Duncan S. Wong, “Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable,” The 17th International Conference on Information and Communications Security (ICICS 2015), pp. 109-124, Springer, 2015.
3. Zhen Liu and Duncan S. Wong, “Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” In Proc. of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 127 – 146, Springer, 2015.
4. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts,” In Proc. of the 10th International Conference on Information Security and Cryptology (INSCRYPT 2014), pp. 403 – 423, Springer, 2014.
5. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, and Xiao Tan, “Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage,” In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 326 – 343, Springer, 2014.
6. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay,” In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 475-486, ACM, 2013.
7. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, and Chunming Tang, “A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles,” In Proc. of the 15th International Conference on Information Security and Cryptology (ICISC 2012), pp. 231-246, Springer, 2012.
8. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” In Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278 – 297, Springer, 2011.
Others