刘振华

个人信息:Personal Information

教授 硕士生导师

性别:男

毕业院校:西安电子科技大学

学历:博士研究生毕业

学位:博士学位

在职信息:在职

所在单位:数学与统计学院

入职时间:2000-07-01

所属院系: 数学与统计学院

学科:应用数学

办公地点:南校区信远2区211西

联系方式:QQ:30304237

电子邮箱:

其他联系方式Other Contact Information

邮编 :

通讯/办公地址 :

办公室电话 :

邮箱 :

扫描关注

个人简介:Personal Profile

 


刘振华,男,博士,教授,博士生导师,国家一流本科专业建设(双万计划)——数学与应用数学专业负责人。

 


教育经历 

2000年6月获得河南师范大学计算数学专业理学学士学位,

2003年3月获得西安电子科技大学应用数学专业理学硕士学位,

2009年12月获得西安电子科技大学密码学专业军事学博士学位,

2013年8月至2014年8月在日本九州大学工业数学研究所进行博士后研究。

 


研究方向——高级密码算法的数学设计、分析与应用

1. 密码算法的数学设计与安全性证明—— 任何密码算法的设计与分析都需要坚实的数学基础。本研究方向主要是基于数学困难问题假设(大整数分解、离散对数和格困难问题等)设计高级密码算法,包括身份密码算法、属性密码算法、同态密码算法、函数加密算法和认证加密算法等,并证明和评估算法的安全性。

2. 密码算法的应用研究——密码学是保障网络与信息安全的核心理论和技术。本方向主要研究密码算法在云计算、边缘计算、雾计算、物联网、加密货币和大数据等领域等领域的实际应用,包括密态数据访问控制、密态数据认证、密态数据搜索、密态数据审计、密态数据更新、密态数据去重、密态数据学习和区块链等。

3. 机器学习/深度学习中的隐私保护——数据发布和挖掘分析中的隐私保护是一个重大挑战,差分隐私作为一种严格可证的隐私保护框架,是目前实现隐私保护的重要手段,也是信息安全领域的研究热点。

 


科研与获奖

1.  主持国家自然科学基金面上项目1项(61472470)、国家自然青年基金项目1项(61100229),陕西省自然科学基金面上项目1项,信息安全国家重点实验室开放课题1项(GW0704127001) ,广西信息科学实验中心开放课题1项,网络与数据安全四川省重点实验室开放基金项目1项,中央高校基本科研业务费1项;

2.  参与国家重点研发计划项目1项(2017YFB0802000);

3.  获得陕西省科学技术奖三等奖1项(2016年);

4.  获得陕西省高等学校科学技术奖一等奖1项(2015年);

5.  获得中国大学生数学建模竞赛国家二等奖2项,陕西省一等奖多项(教练);

6.  获得国际大学生数学建模竞赛特等奖1项(2018年,特等奖Outstanding Winner,并被冠名欧拉奖Leonhard Euler Award),一等奖多项(教练);

7.  指导国家级大学生创新创业训练计划项目多项。



科研论文与专利

  • Zhenhua Liu, Shuhong Duan, Peilin Zhou, Baocang Wang, Traceable-then-revocable ciphertext-policy attribute-based encryption scheme, Future Generation Computer Systems, 2019,93:903-913.

  • Zhenhua Liu,Yaohui Liu,Yaqing Fan, Searchable attribute-based signcryption scheme for electronic personal health record, IEEE Access, 2018, 6(1): 76381-76394.

  • Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Certificateless signcryption scheme in the standard model, Information Sciences, 2010, 180(3): 452-464.

  • Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Provably secure multi-proxy signature scheme with revocation in the standard model, Computer Communications, 2011, 34(3): 494-501.

  • Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi, Revocable and strongly unforgeable identity-based signature scheme in the standard model, Security and Communication Networks, 2016, 9(14): 2422-2433.

  • Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li, Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Security and Communication Networks, 2013, 6(1): 69-77.

  • Zhenhua Liu, Yaqing Fan, Provably secure searchable attribute-based authenticated encryption scheme, International Journal of Network Security, 2019, 21(2): 177-190.

  • Chen Li, Zhenhua Liu, A secure privacy-preserving cloud auditing scheme with data deduplication, International Journal of Network Security, 2019, 21(2): 199-210.

  • Zhenhua Liu, Bin Li, Qi Han, Secure and verifiable outsourcing protocol for non-negative matrix factorisation, International Journal of High Performance Computing and Networking, 2018,11(1): 14-23.

  • Zhenhua Liu, Yaqian Kang, Chen Li, Yaqing Fan, Hybrid cloud approach for block-level deduplication and searchable encryption in large universe, Journal of China Universities of Posts and Telecommunications, 2017, 24(5): 23-34.

  • Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Secure proxy signature scheme with fast revocation in the standard model, The Journal of China Universities of Posts and Telecommunications, 2009, 16(4): 116-124.

  • Xiangsong Zhang, Zhenhua Liu, Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update, KSII Transactions on Internet and Information Systems, 2017,11(5): 2792-2810.

  • Hua Ma, Ting Peng, Zhenhua Liu, Directly revocable and verifiable key- policy attribute-based encryption for large universe, International Journal of Network Security, 2017, 19(2): 272-284.

  • Fenghe Wang, Zhenhua Liu, Chunxiao Wang, Full secure identity-based encryption scheme with short public key size over lattices in the standard model, International Journal of Computer Mathematics, 2016, 93(6): 854-863.

  • Fenghe Wang, Zhenhua Liu, Short and provable secure lattice-based signature scheme in the standard model,Security and Communication Networks, 2016,l9(16): 3627-3632.

  • Fenghe Wang, Chunxiao Wang, Zhenhua Liu, Efficient hierarchical identity based encryption scheme in the standard model over lattices,Frontiers of Information Technology & Electronic Engineering, 2016,17(8):781-791.

  • Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, Revocable Identity-based signcryption scheme without random oracles, International Journal of Network Security, 2015,17(2):110-122.

  • Xinyin Xiang, Hui Li,  Mingyu Wang, Zhenhua Liu, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 2014, 7(11): 1780-1787.

  • Xiangsong Zhang, Zhenhua Liu, Sanyang Liu, A trust region SQP-filter method for nonlinear second-order cone programming, Computers & Mathematics with Applications, 2012, 63(12):1569-1576.

  • Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A regularization smoothing method for second-order cone complementarity problem, Nonlinear Analysis: Real World Applications,2011, 12(1): 731-740.

  • Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A predictor-corrector smoothing method for second-order cone programming, Journal of Applied Mathematics and Computing, 2010, 32(2):369-381.

  • Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A non-interior-point smoothing method for variational inequality problem, Journal of Computational and Applied Mathematics, 2010, 234(3):713-721.

  • Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A smoothing method for second order cone complementarity problem, Journal of Computational and Applied Mathematics, 2009, 228(1):83-91.

  • Yuanyuan Li, Zhenhua Liu, Sharing economy protocol with privacy preservation and fairness based on blockchain,The 4th International Conference on Cloud Computing and Security, ICCCS 2018, Haikou, China, 2018.6.8-6.10, LNCS 11068, pp.59-69, 2018.

  • Zhenhua Liu, Yaohui Liu, Verifiable and authenticated searchable encryption scheme with aggregate key in cloud storage, 14th Inernational Conference on Computational Intelligence and Security, CIS2018, Hang Zhou, China, 2018.11.16-11.19, IEEE, pp.421-425, 2018.

  • Fan Yaqing, Liu Zhenhua, et al., Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting, 2nd IEEE International Conference on Data Science in Cyberspace, DSC2017, Shenzhen, China, 2017.6.26-6.29, IEEE, pp.441-449, 2018.

  • Kang Yaqian, Liu Zhenhua, A fully secure verifiable and outsourced decryption ranked searchable encryption scheme supporting synonym query, 2nd IEEE International Conference on Data Science in Cyberspace, DSC2017, Shenzhen, P.R. China, 2017.6.26-6.29, IEEE, pp:223-231, 2017.

  • Zhou Peilin, Liu Zhenhua, Duan Shuhong, Flexible attribute-based keyword search via two access policies, 11th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2016, Asan, Korea, 2016,11.5-11.7.

  • Duan Shuhong, Liu Zhenhua, Zhou Peilin, A privacy-preserving personal health record with searchability and revocability using attribute-based encryption, 11th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2016, Asan, Korea, 2016,11.5-11.7.

  • Yan Xuewei, Ma Hua, Liu Zhenhua, Peng Ting, Large universe revocable fine-grained encryption with public auditing, 11th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2016, Asan, Korea, 2016, 11.5-11.7.

  • Zhang Linchao, Ma Hua, Liu Zhenhua, Dong Enting, Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme, 11th International Conference on Broadband Wireless Computing, Communication and Applications, BWCCA 2016, Asan, Korea, 2016, 11.5-11.7.

  • Liu Zhenhua, Li Bin, Secure and verifiable outsourcing protocol for non-negative matrix factorization, the First International Workshop on Cyber Security, CS-2015, Xi'an, P.R. China, 2015, 10.16-10.18.

  • Zu Longhui, Liu Zhenhua, Li Juanjuan, New ciphertext-policy attribute-based encryption with efficient revocation, 2014 IEEE International Conference on Computer and Information Technology, CIT 2014, Xi’an, P.R. China, 2014, 9.11-9.13.

  • Li Juanjuan, Liu Zhenhua, Zu Longhui, Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryptions, 9th Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, P.R. China, 2014, 9.3-9.5.

  • Zhenhua Liu, Zhang Xiangsong, Takagi T., Post-quantum strongly unforgeable identity- based signature scheme from lattices without random oracles, 5th International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013, Xi’an, P.R. China, 2013, 9.9-9.11.


发明专利:
      刘振华,俎龙辉,李娟娟,李宾,一种实现及时用户属性撤销的基于密文策略属性加密方法,授权时间:2017.12.08,  中国,  专利号:ZL201410330696.4

 


科研团队——数学密码团队

马华 教授        张乐友 教授      李雪莲 副教授

硕士研究生

2020级 牛亚鑫  马渊桔  弓婧皖 

2019级  元   明  丁颖颖

2018级  尹芳芳  纪佳琪   郭昌波

2017级  徐  靖(杭州衡泰)  刘  燕(中国联通)   谢  莹(西安华为)

2016级  李园园(中国移动)  袁  冬(格步科技)   刘要辉(中国联通)

2015级  樊雅清(西安华为)  李晨(中国电科36所)  康雅倩 (四川航天第七研究院)

             张林超(深圳国民) 韩晓雨(北京泰康)

2014级  段淑红(西安抱朴通信) 周佩琳(深圳宏电)

             颜雪薇(北京精雕)  彭婷(西安精雕) 董恩廷(中电长城网际)

2013级  李宾(山东泰安一中) 白翠翠(深圳天源迪科信息技术)

2012级  李娟娟(西安华为)  俎龙辉(山东友谊出版社)

 


招生信息

1. 每年招收博士生1名,硕士生(保送生/优研生/统考生)3-4名;

2. 招生专业1:应用数学专业——数学密码方向(数学与统计学院),

   招生专业2:网络空间安全专业——信息安全方向(网络与信息安全学院);

3. 如果你数学、英语基础好,热爱数学密码与信息安全方向,思维活跃、兴趣广泛,非常欢迎保送和报考,并请报考前E-mail联系。



 学术交流

积极鼓励和资助研究生参加各类学术交流活动,如中国密码学会主办的密码学会年会、密码算法专业委员会年会、密码数学理论专业委员会年会、安全协议专业委员会年会、密码学高端系列培训会和密码应用高峰论坛等,以及Springer和IEEE出版的国际会议。通过参加学术会议,了解学术前沿、交流学术思想、开阔学术视野,启迪学术思维。

 ICCCS2018会议

李园园同学于2018年6月8日至10日赴海南省海口市参加“第4届云计算与安全国际学术会议”(The 4th IEEE International Conference on Cloud Computing and Security-ICCCS2018),论文“Sharing Economy Protocol with Privacy Preservation and Fairness based on Blockchain”被大会接受。

 

区块链培训会

李园园、袁冬两位同学于2017年11月18日至19日赴北京参加中国密码学会主办的“面向数字货币与区块链的密码新技术研讨会”。

 

中密会2017年会

刘要辉、田国华、党乾龙3位同学2017年10月27日至29日赴山东省济南市参加“中国密码学会2017年年会。

 

 DSC 2017

樊雅清同学于2017年6月26日至29日赴广东省深圳市参加第二届网络空间数据科学国际会议(The 2th IEEE International Conference on Data Science in Cyberspace-DSC2017),其论文“Verifiable attribute-based multi-keyword search over encrypted cloud data in multi-owner setting”被大会接受。



常用链接

1.  国际密码学会预印本  http://eprint.iacr.org

2.  投稿期刊指南 http://spischolar.com/journal

3.  个人主页旧版入口 http://web.xidian.edu.cn/zhhliu/teach.html

  • 教育经历Education Background
  • 工作经历Work Experience
  • 研究方向Research Focus
  • 社会兼职Social Affiliations