林昌露 - Changlu Lin's homepage
发布时间: 2014-06-03 访问次数: 2318

 

林昌露(Changlu Lin博士、副教授,硕士生导师,福建·大田


福建师范大学数学与计算机科学学院、福建省网络安全与密码技术重点实验室,中国密码学会会员、IEICE会员,校第二批优秀青年骨干教师培养对象。


联系方式 (Contact Information)


电子邮箱:cllin (at) fjnu (dot) edu (dot) cn


通信地址:福建师范大学(旗山校区)数学与计算机科学学院邮编 350117; College of Mathematics and Computer Science, Fujian Normal University (Qishan Campus), Fuzhou, 350117, China.





教育经历(Education Background)

2005年9月-2009年7月,中国科学院研究生院信息安全国家重点实验室,信息安全专业,获博士学位

2002年9月-2005年7月,福建师范大学数学与计算机科学学院,应用数学专业,获硕士学位

1998年9月-2002年7月,福建师范大学数学系,数学教育专业,获学士学位


工作及科研经历 (Professional and Research Experience)

2005年8月-至今,福建师范大学数学与计算机科学学院

2015年2月-2016年2月,新加坡南洋理工大学数学系,访问学者

2013年12月- 2014年1月,新加坡南洋理工大学编码与密码研究中心,访问学者

2012年12月- 2013年1月,台湾逢甲大学多媒体与网络安全实验室访学,访问学者

2011年7月- 2012年1月,英国伦敦大学皇家霍洛威学院信息安全中心访学,访问学者



学位论文 (Degree Thesis)

1.博士学位论文(Ph.D),门限密钥共享体制若干问题的研究Research on Threshold Secret Sharing Schemes),指导老师:叶顶锋教授,2010

2.硕士学位论文(MS),Z4Duadic码的存在性The Existence of Duadic Code over Z4),指导老师:张胜元教授,2005


研究兴趣 (Research Interests)

密钥共享(Secret Sharing

安全多方计算(Secure Multi-Party Computation

公钥密码学(Public Key Cryptography

可证明安全理论(Provable Security

安全网络编码(Secure Network Coding

云计算安全(Secure Cloud Computing


学术会议或期刊审稿人 (Reviewer for Conferences or Journals)

n会议(Conferences):Crypto(2011, External Reviewer), Asiacrypt(2014, 2015, 2016, External Reviewer) IEEE-ISIT(2015, External Reviewer), ProvSec(2016, External Reviewer), ACISP(2014, External Reviewer), IUCC(2015,2016), MIWAI(2015,2016), CloudCom-Asia 2015I-SPAN 2014, LSNS 2013, IEEE MSN 2012, NSS2012, SOWN 2011, CHINACOM 2011, etc.

n期刊(Journals):IEEE Transaction on ComputersInformation SciencesIET Information SecurityThe Computer Journal, Applied Mathematics and ComputationJournal of Systems and SoftwareSecurity and Communication NetworksTransactions on Computational ScienceInternational Journal of Computers and ApplicationsInternational Journal of Computer MathematicsJournal of Internet TechnologyJournal of Computational and Applied MathematicsJournal of Cloud Computing Advances, Systems and Applications、《高校应用数学学报》、《电子学报》&CJE》、《应用数学学报·英文版》、《计算机科学》,等等


在研项目 (Successful Grant Applications, Doing)

国家自然科学基金(面上项目,批准号:61572132),20161– 201912月,负责人

福建省自然科学基金(面上项目,批准号:2015J01239),20154– 20184月,负责人

中央办公厅信息安全重点实验室开放基金(批准号:2014KF-CHY),20147– 20166月,与陈辉焱副教授(北京电子科技学院)和李勇副教授(北京交通大学)三方共同负责

国家自然科学基金(青年科学基金项目,批准号:61402110),20151– 201712月,参与(负责人:伍玮副教授,排名第三)

福州市科技项目(批准号:2014-G-80),20144– 20173月,参与(负责人:陈兰香副教授)

福建师范大学创新团队20138– 20168月,参与(负责人:许力教授,主要参与人)


结题项目(Successful Grant Applications, Done)

福建省教育厅创新团队20124– 20154月,参与(负责人:许力教授,主要参与人)

国家自然科学基金(青年科学基金项目,批准号:61103247),20121– 201412月,负责人

福建省自然科学基金(青年科学基金项目,编号:2011J05147),20114– 20143月,负责人

福建省教育厅B类项目(编号:JB1101720119 – 20148月,负责人

国家自然科学基金(青年科学基金,批准号:61102093),20121– 201412月,参与(负责人:柯品惠副教授,排名第三)

福建省自然科学基金(面上项目,批准号:2010J01319),20107– 20137月,参与(负责人:柯品惠副教授,排名第三)

国家自然科学基金(天元基金专项基金项目,批准号:11026008),20106– 201012月,参与(负责人:张胜元教授,排名第三)

通信与信息系统北京市重点实验室开放课题基金20091– 200912月,负责人


课程教学 (Teaching Courses)

函授课程:近世代数(06)、高等数学(09)、中学数学建模(0809

本科课程:高等代数(09数本2&3班助教)、现代密码学(07信本、07计本)、概率论与数理统计A(物光09网工)、离散数学(10信本、应科10软工1&2班、应科12软工、应科13软工1&2班、数计15计算机科学12班、信息15软工23班)、线性代数(软件12数字多媒体、软件-13数字媒体1&2班、软件-14软工(云计算方向))、计算机数学基础(应科12专升本、软件13软工)

硕士课程:Modern Cryptography09研、10研、11研、15研)、Digital Signature(讨论班,09研)、安全协议(13研)、Secret sharing and multi-party computation(15)


论文著作 (Publications)

2016

56.Changlu Lin(林昌露),Fucai Luo, Huaxiong Wang, and Yan Zhu. A provable data possession scheme with data hierarchy in cloud, Inscrypt 2015, LNCS 9589, pp. 301–321, 2016.

55.Fucai Luo, Changlu Lin(林昌露), and Yan Zhu. Role-based signature and its security proof. Journal of Information Science and Engineering, 32: 1525-1539, 2016.

54.Yining Liu, Chi Cheng, Chingfang Hsu, Junyan Qian, Changlu Lin(林昌露). A robust voting scheme against side channel attacks. Journal of Information Science and Engineering, 32: 1471-1486, 2016.

53.Ge Yao, Yong Li, Linan Lei, Huaqun Wang, Changlu Lin(林昌露). An eficient dynamic provable data possession scheme in cloud storage, GPC 2016, LNCS 9663, pp. 63–81, 2016.

52.Feng Wang, Chin-Chen Chang, Changlu Lin(林昌露), Shih-Chang Chang.Secure and eEfficient identity-based proxy multi-signature using Cubic residues.International Journal of Network Security, 18(1): 90-98, 2016.

51.Feng Wang, Chin-Chen Chang, Changlu Lin(林昌露). Security analysis on secure untraceable off-line electronic cash system. International Journal of Network Security, 18(3): 454-458, 2016.


2015

50.朱岩,于汝云,林昌露. 数据盲验证技术, 中国密码学会通讯, 41(6):22-26, 2015.

49.Lein Harn and Changlu Lin(林昌露), Yong Li.. Fair Secret Reconstruction in (t, n) Secret Sharing, Journal of Information Security and Applications, 23: 1–7, 2015.

48.杨婷婷林昌露,刘忆宁,张胜元. 基于FOO投票协议的无收据电子投票方案, 计算机系统应用, 24(8): 25-32, 2015.

47.杨婷婷林昌露,张胜元. 安全的多候选人电子投票方案的改进, 福建师范大学学报(自然科学版), 31(3): 32-38, 2015.

46.罗芬芬,林昌露,张胜元,刘忆宁. 基于FOO投票协议的无收据电子投票方案, 计算机科学, 42(8): 180-184, 2015.

45.Changlu Lin(林昌露), Yong Li, Kewei Lv, Chin-Chen Chang. Ciphertext-auditable identity based encryption. International Journal of Network Security, 17(1): 23-28, 2015.


2014

44.Lein Harn and Changlu Lin(林昌露).Efficient Group Diffie-Hellman Key Agreement Protocols. Computers & Electrical Engineering,40(6): 1972-1980, 2014.

43.Xi Chen, Yun Liu, Chin-Chen Chang, Changlu Lin(林昌露). The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism. International Journal of Ad Hoc and Ubiquitous Computing, 17(2/3): 162-173, 2014

42.柯品惠, 林昌露, 张胜元. 具有低自相关性质的奇周期四元序列的线性复杂度. The Journal of China University of Posts and Telecommunications, 21(5): 89-93, 2014.

41.Changlu Lin(林昌露), Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang. Secure universal designated verifier identity-based signcryption. Security and Communication Networks, 7: 434--444, 2014.

2013

40.Shengyan Wu, Changlu Lin(林昌露), Li Xu. Fully distributed multi-authority cloud storage model. in: Proceedings of 2013 International Conference on Cloud Computing and Big Data - CloudCom-Asia'13, 2013.

39.Xiuqun Wang, Changlu Lin(林昌露), Yong Li. Proactive Secret Sharing without a Trusted Party, in: Proceedings of the 5th International Conference onIntelligent Networking and Collaborative Systems - INCoS 2013, pp.511 - 515, 2013.

38.Fei Tang, Changlu Lin(林昌露), Hongda Li. ID-Based Signcryption with Restrictive Unsigncryption, in: Proceedings of the 5th International Conference onIntelligent Networking and Collaborative Systems - INCoS 2013, pp.485 - 489, 2013.

37.Lein Harn and Changlu Lin(林昌露). An efficient group authentication for group communications. International Journal of Network Security & Its Applications, 5(3):9-16, 2013.

36.Chenglian Liu, Changlu Lin(林昌露), Shuliang Sun. Security analysis of practical anonymous user authentication scheme with security proof. Information Technology Journal, 12(3): 522-525, 2013.

35.王峰, 林昌露,利用三次剩余构造的基于身份的环签名方案,电子科技大学学报,42(5)778-783, 2013.

34.石贤芝, 林昌露, 张胜元, 唐飞, 标准模型下高效的门限签名方案, 计算机应用. 33(1):15-18, 2013.

33.王峰, 林昌露, 连广鑫, 不含双线性对的高效基于身份门限环签名方案, 武汉大学学报(理工版). 59(1): 75-81, 2013.

32.石贤芝, 林昌露, 张胜元, 唐飞, 无可信中心下基于身份的门限签名方案, 武汉大学学报(理工版). 59(2):137-142. 2013.

31.吴胜艳, 许力, 林昌露,基于门限属性加密的安全分布式云存储模型,计算机应用. 33(7):1880-1884,1902, 2013.


2012

30.Changlu Lin(林昌露) and Chenglian Liu. Ciphertext-auditable public key encryptions without random oracles. Information, 15(6): 2599-2602, 2012.

29.Changlu Lin(林昌露). Identity-based cryptography on hidden-order groups. Procedia Engineering, 29: 2067-2071, 2012.

28.Changlu Lin(林昌露) and Lein Harn. Unconditionally secure multi-secret sharing scheme, in: Proceedings .of 2012 IEEE International Comference on Computer Science and Automation Engineering – CSAE 2012, vol.1, 169-172, 2012.

27.Changlu Lin(林昌露) and Lein Harn. Unconditionally secure verifiable secret sharing scheme. Advances in Information Sciences and Service Sciences. 4(17): 514-518, 2012.

26.Changlu Lin(林昌露), Yong Li, Sriramkrishnan Srinivasan, Li Lu. Analysis on token-controlled public key encryption, in: Proceedings of the 8th International Conference on Mobile Ad-hoc and Sensor Networks -MSN 2012, pp. 113-117, 2012.

25.Lein Harn and Changlu Lin(林昌露). An extension of Harn-Lin’s cheater detection and identifications, in: Proceedings of the International Computer Symposium - ICS 2012. Pp.25-32, 2012.

24.Chenglian Liu, Changlu Lin(林昌露), Lein Harn, and Sisheng Chen, Weakness a remote password authentication schemes for multiserver architecture using neural networks, Information, 15(11B): 4965-4970, 2012.

23.Chenglian Liu, Changlu Lin(林昌露), Lein Harn, and Sisheng Chen, Security analysis of remote password authentication schemes for multiserver architecture using neural network, Advanced Science Letters. 5: 1-4, 2012.

22.Chenglian Liu, Jianhong Zhang, Changlu Lin(林昌露) and Shuliang Sun, Comment on a practical anonymous user authentication scheme with security proof, Advanced Science Letters. 5: 5-8, 2012.

21.Tang fei, Changlu Lin(林昌露), and Pinhui Ke, Universal designated verifier signcryption, in: Proceedings of the 6th International Conference on Network and System Security – NSS 12. LNCS 7645, pp 126-134, 2012.

20.Shengyuan Zhang, Fei Tang, Changlu Lin(林昌露), Pinhui Ke, Provably secure self-certified signature schemes with message recovery, China Communications. 9(10): 112-119, 2012.

19.唐飞, 林昌露, 郭玲玲, 张胜元, ElGamal签名方案及其变体之间的安全性关系, 福建师范大学学报(自然科学版). 28(2): 46-50, 2012.

18.郭玲玲, 林昌露, 唐飞, 张胜元, 两个基于双线性对数字签名方案的伪造攻击, 福建师范大学学报(自然科学版). 28( 1): 28-32, 2012.

17.郭玲玲, 林昌露, 张胜元, 对一类无证书签名方案的攻击及改进,计算机工程. 38(16): 134-137, 2012.


2011

16.Tang fei, Changlu Lin林昌露, Yong Li, and Shengyuan Zhang. Identity-based strong designated verifier signature scheme with full non-delegatability, in: The 2011 IEEE International Workshop on Security and Privacy –SPIoT ’11, pp. 800-805, 2011.

15.Lein Harn, Chia-Yin Lee, Changlu Lin林昌露, and Chin-Chen Chang. Fully Deniable Message Authentication Protocols Preserving Confidentiality. Comput. J., 54(10): 1688-1699, November 2011.


2010

14.Lein Harn, Wen-Jung Hsin, Changlu Lin林昌露. Efficient on-line/off-line signature schemes based on multiple-collision trapdoor hash families.Comput. J., 53(9): 1478-1484, November 2010.

13.Lein Harn, Changlu Lin林昌露. Strong (n, t, n) verifiable secret sharing scheme. Information Sciences. 180(16):3059-3064. August 2010.

12.Lein Harn, Changlu Lin林昌露. Authenticated group key transfer protocol based on secret sharing. IEEE Transactions on Computers. 59(6): 842-846, June 2010.


2009

11.Changlu Lin林昌露, Lein Harn. Perfect (t, n) threshold secret sharing scheme, in:Proceeding of 2009 Annual Conference of the Chinese Association for Cryptologic Research -CHINACRYPT 2009, pp.143-151, 2009.

10.Changlu Lin林昌露, Lein Harn, Dingfeng Ye. Information-theoretically secure strong verifiable secret sharing, in:Proceedings of the International Conference on Security and Cryptography –SECRYPT 2009, pp.233-238, 2009.

9.Changlu Lin林昌露, Lein Harn, Dingfeng Ye. Ideal perfect hierarchical threshold secret sharing schemes, in: Proceedings of the Fifth International Conference on Information Assurance and Security – IAS 2009, vol.2, pp.118-121, 2009.

8.Wei Zhao, Changlu Lin(林昌露), Dingfeng Ye. Provable secure convertible nominative signature scheme, in: Proceeding of the 4th International Conference on Information Security and Cryptology - INSCRYPT 2008, LNCS 5487, pp.23--40. 2009.

7.Peng Wang, Dengguo Feng, Changlu Lin(林昌露), Wenling Wu. Security of truncated MACs, in: Proceeding of the 4th International Conference on Information Security and Cryptology - INSCRYPT 2008, LNCS 5487, pp.96--114. 2009.

6.Lein Harn, Changlu Lin林昌露. Detection and identification of cheaters in ( t , n ) secret sharing scheme. Designs, Codes and Cryptography. 52(1):15–24. July, 2009.

5.Lein Harn, Jian Ren, Changlu Lin林昌露. Efficient identity-based GQ multisignatures.International Journal of Information Security. 8(3): 205-210. June, 2009. 

4.Lein Harn, Jian Ren, Changlu Lin(林昌露). Design of DL-based certificateless digital signatures. Journal of Systems and Software, 82(5): 789-793. May, 2009.


2008

3.Changlu Lin(林昌露), Yong Li, Qiupi Zhang, Dingfeng Ye. Anonymous identity based encryption with plaintext awareness in the two identities setting. IEICE Trans. Fundamentals, E91-A(12): 3828-3832. December, 2008.

2.王全龙, 王鹏, 林昌露.密码学与编码理论(第2版)(译著). 人民邮电出版社, 2008.


2005

1.林昌露, 张胜元. Z4上的自偶阿贝尔码, 福建师范大学学报(自然科学版), 21(4): 6-8, 2005.


指导研究生 (Graduate Students)

Ø2009级:唐飞(重庆邮电大学),郭玲玲(厦门三中)(与张胜元教授合作指导)

Ø2010级:石贤芝(滴滴快的)(与张胜元教授合作指导)

Ø2011级:吴胜艳(江西景德镇中国移动)(与许力教授合作指导)

Ø2012级:罗芬芬杨婷婷(与张胜元教授合作指导)

Ø2013级:罗富财,(中国科学院信息工程研究所,攻读博士学位)

Ø2015级:闫幸福,在读

Ø2016级:胡慧丹牛奇文,在读


指导本科毕业论文及各类竞赛 (Others)

Ø指导本科毕业论文06级(数本)2人,07级(数本+信本)6人(其中1人获优秀),083人(其中1人获优秀),095人(其中1人优秀),105人,114

Ø指导2010年全国大学生数学建模竞赛5队,获省二等奖1

Ø担任2009级数本3班班主任(2009-2010学年和2010-2011学年)

Ø指导福建师范大学本科生课外科技计划1项(项目名称:43路公交车调度方案)


密码相关链接 (Cryptographic Useful Links)

IACR (International Association for Cryptologic Research)

http://www.iacr.org/

CACR (Chinese Association for Cryptologic Research, 中国密码学会主页)

http://xn--fiq7vi3qbveynay21l.com/index.aspx

LNCS Cryptography Volumes

http://www.ccsl.carleton.ca/~jamuir/crypto_springer.php

Cryptology ePrint Archive

http://eprint.iacr.org/

arXiv.org e-Print archive

http://arxiv.org/

Cryptology Pointers (Helger Lipmaa's links)

http://research.cyber.ee/~lipmaa/crypto/

DBLP Bibliography - Home Page

http://www.informatik.uni-trier.de/~ley/db/index.html

lIIE (Institute of information engineer, CAS, 中国科学院信息工程研究所)

http://www.iie.cas.cn/

lSKLOIS (State Key Laboratory Of Information Security, 信息安全国家重点实验室)

http://www.is.ac.cn

lFujian Key Laboratory of Network Security and Cryptology (福建省网络安全与密码技术重点实验室)

http://math.fjnu.edu.cn/nscl/index.htm

lCrypto Museum

http://www.cryptomuseum.com

lCryptography FAQ

http://www.faqs.org/faqs/cryptography-faq/

lThe Enigma and the Bombe

http://www.ellsbury.com/enigmabombe.htm

l52 Things People Should Know To Do Cryptography

http://www.cs.bris.ac.uk/Research/CryptographySecurity/knowledge.html



更新日期

  

2016102