团队力量

副高(副教授等)

当前位置: 首页 -> 团队力量 -> 全体教工 -> 正文

张宗洋

发布日期:2019-06-16

张宗洋  Zongyang Zhang

     

副教授

     

博士

     


 

新主楼F921

     

澳网官方网站

     

经理助理

电子信箱

zongyangzhang@buaa.edu.cn

     


个人主页

谷歌个人主页   澳网官方网站教师主页

  学习经历

  2001.9-2005.6:河海大学,学士,计算机科学与技术

  2005.9-2008.3:上海交通大学,硕士,计算机软件与理论

  2007.9-2012.1:上海交通大学,博士,计算机软件与理论

  工作经历

  2012.3-2014.9:上海交通大学,博士后

  2012.9-2014.3:日本产业技术综合研究所,博士后

  2014.4-2016.3:日本学术振兴会,博士后

  2016.4-2018.5:澳网官方网站电子信息工程学院,讲师

  2018.5-至今:澳网官方网站(中国)股份有限公司,讲师  

  研究领域

区块链与密码货币、公钥密码学、网络安全

欢迎有志于区块链、密码学技术研究的员工报考2020级硕士研究生!

  荣誉及奖励

  2018年获澳网官方网站学院2017级优秀班主任

  2018年获澳网官方网站学院优秀导师

  2018年获第十一届全国老员工信息安全竞赛优秀指导教师奖

  2018年获得北京市高等集团产品成果二等奖(排名7

  2017年获得澳网官方网站青年教师培训基础班优秀学员称号

  2016年获得澳网官方网站“蓝天新秀”称号

  2014年获上海市优秀博士学位论文

  开授课程

本科生主讲课程      

1、网络空间安全导论

2、区块链原理与技术

3、可证明安全技术

研究生主讲课程

1、密码协议设计与分析

2、信息安全数学基础

3、计算理论

  指导员工

1、基于区块链的恶意二维码标记系统. 王身行,管晔玮,吴青璐,徐煜凯.  第十一届(2018年)全国老员工信息安全竞赛一等奖,创业价值奖.

2、基于SGX平台的密码货币钱包管理系统. 周博文,王涵晨,崔杰,陈婧乐.  第十一届(2018年)全国老员工信息安全竞赛一等奖.

3、可编辑区块链技术研究. 李彤. 7000.  澳网官方网站2019年度“研究生创新实践基金".

4、面向移动设备的可证安全数据云外包方案研究. 张妍婷. 8000.  澳网官方网站2018年度“研究生创新实践基金".

  教学及科研成果

发表学术论文30余篇。

(*)通讯作者

会议论文:

15Ziyu Wang, Jianwei Liu, Zongyang  Zhang*, Yanting Zhang, Jiayuan Yin and Hui Yu. A Combined  Micro-block Chain Truncation Attack on Bitcoin-NG. the 24th Australasian  Conference on Information Security and Privacy (ACISP 2019), EI, CCF Rank C.

14Geng Li, Jianwei Liu, Zongyang  Zhang*. Steganography against Subversion in Multi-Surveillant  Settings. the 24th Australasian Conference on Information Security and  Privacy (ACISP 2019),  EI, CCF Rank C.        

13Yanting Zhang, Jianwei Liu, Zongyang  Zhang*, and Yang Hu. Multi-authority Fast Data  Cloud-Outsourcing for Mobile Devices.the 21st Information Security Conference  (ISC 2018, EI, CCF Rank C.

12Jiayuan Yin, Changren Wang, Zongyang  Zhang*, and Jianwei Liu. Revisiting the Incentive Mechanism  of Bitcoin-NG. the 23rd Australasian Conference on Information Security and  Privacy (ACISP 2018).  EI, CCF Rank C.

11Xingguang Zhou, Jie Chen, Zongyang  Zhang*, Jianwei Liu, Qianhong Wu. Secure Role-based Access  Control over Outsourced EMRs against Unwanted Leakage, the 9th International  Symposium on Cyberspace Safety and Security(CSS 2017), Lecture Notes in Computer Science, Vol.  10581, pp. 411-426, Springer-Verlag, October 2325,  2017.EI,最佳员工论文奖. Accession number: 20174704429805

10Yuyu Wang, Zongyang Zhang*,  Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka. How to Obtain Fully  Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.ASIACRYPT 2016, Lecture Notes in  Computer Science, Vol.10032, pp. 465-495, Springer-Verlag, December, 2016.(CCF Rank B).Accession number: 20170103223195

9Hongbing Wang, Yingjiu Li, Zongyang  Zhang, Yunlei Zhao. Efficient Tag Path Authentication  Protocol with Less Tag Memory.ISPEC 2016:  Lecture Notes in Computer Science, Vol.10060, pp. 255-270, Springer-Verlag,  November, 2016. Accession number: 20164803058576

8Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and  Yunlei Zhao. Black-Box Separations of Hash-and-Sign Signatures in the  Non-Programmable Random Oracle Model,PROVSEC  2015, Lecture Notes in Computer ScienceVol.9451, pp. 435-454, Springer-Verlag, November, 2015.Accession number: 20154901649023

7Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo,Zongyang Zhang. Black-Box Separations  for One-More (Static) CDH and Its Generalization, the 20th Annual  International Conference on the Theory and Application of Cryptology and  Information Security (ASIACRYPT 2014),  Lecture Notes in Computer Science, Vol.8874, pp. 366-385, Springer-Verlag,  December, 2014.(CCF Rank B).Accession number: 20145000322604

6Yu Chen, Zongyang Zhang*.  Publicly Evaluable Pseudorandom Functions and their Applications, the 9th  Conference on Security and Cryptography for Networks (SCN 2014), Lecture Notes in Computer  Science Volume 8642, pp 115-134, Springer-Verlag, September, 2014.Accession number: 20151600762144

5Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and  Yunlei Zhao. All-but-One Dual Projective Hashing and Its Applications, the  12nd International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer  Science Volume 8479, pp 181-198, Springer-Verlag, June, 2014. (CCF Rank C)Accession number: 20142817915544

4Yu Chen, Qiong Huang and Zongyang  Zhang*. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive  Key Exchange Scheme, Revisited, the 19th Australasian Conference on  Information Security and Privacy (ACISP  2014), Lecture Notes in Computer Science Volume 8544, pp  274-289, Springer-Verlag, July, 2014. (CCF  Rank C)Accession number:  20142917957128

3Yu Chen, Zongyang Zhang*,  Dongdai Lin and Zhenfu Cao. Anonymous Identity-Based Hash Proof System and  Its Applications, Provable Security (ProvSec  2012), Lecture Notes in Computer Science, Vol.7496, pp.  143-160, Springer-Verlag, September, 2012.Accession number: 20123715434391

2Yu Chen, Zongyang Zhang,  Dongdai Lin and Zhenfu Cao. Identity Based Extractable Hash Proofs and their  Applications, Applied Cryptography and Network Security (ACNS 2012), Lecture Notes in Computer  Science, Vol. 7341, pp.153-170, Springer-Verlag, June, 2012. (CCF Rank C).Accession number: 20122815224979

1Hongbing Wang, Yingjiu Li, Zongyang  Zhangand Zhenfu Cao. Two-level Path Authentication in  EPCglobal Network, 2012 IEEE International Conference on RFID (IEEE RFID 2012), pp. 24-31, April,  2012.Accession number:20122115052440

期刊论文:

17、 Ziyu Wang, Hui Yu, Zongyang Zhang*, Jiaming Piao, Jianwei Liu. ECDSA weak randomness in Bitcoin. Future Generation Computer Systems, Volume. 102, pp. 507-513, Jan, 2020. SCI. 


 

16、黑一鸣, 刘建伟, 张宗洋*, 喻辉. 基于区块链的可公开验证公布式云存储系统[J]. 信息网络安全.2019,(3):52-60.  

15、李耕, 刘建伟, 张宗洋*. 抗大规模监视密码学研究综述[J]. 密码学报, 2019, 6(3): 269-282.

   14刘懿中, 刘建伟, 张宗洋*, 徐同阁, 喻辉. 区块链共识机制研究综述[J]. 密码学报, 2019, 6(4): 395-432.

13Dawei Li, Jianwei  Liu,Zongyang Zhang*,Qianhong Wu, Wiran Liu. Revocable  Hierarchical Identity-Based Broadcast Encryption,Tsinghua Science and Technology. Vol. 23, Issue 5, pp. 539-549.2018  SCI. Accession Number:  WOS:000447277500003

12、吴进喜, 高莹, 张宗洋, 殷大鹏. 基于区块链的多方隐私保护公平合同签署协议. 信息安全学报. 2018 3(3): 8-16.

11、王子钰,刘建伟,张宗洋*, 喻辉. 基于聚合签名与加密交易的全匿名区块链[J]. 计算机研究与发展, 2018, 55(10): 2185-2198.

10Xinguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang*. Privacy Preservation  for Outsourced Medical Data with Flexible Access Control,IEEE Access,Vol. 6, pp. 14827-14841,2018.JCR Q1,SCI.  Accession number:WOS:000428959000001

9、喻辉,张宗洋*,刘建伟. 比特币区块链扩容技术研究.  计算机研究与发展, 2017, 54(10): 2390-2403.EI. Accession  number: 20175004531143  

8Yu Chen and Zongyang Zhang*.  Publicly Evaluable Pseudorandom Functions and Their Applications,Journal of Computer Security, Volume.  24, No. 2, pp. 289-320, 2016,CCF Rank B,  Accession number: 20161902365114

7Yu Chen, Qiong Huang and Zongyang  Zhang*. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive  Key Exchange Revisited and More,International  Journal of Information Security, Volume 15, pp. 1533, Feb, 2016. (JCR Q2),Accession Number:WOS:000369997700002

6Yu Chen, Zongyang Zhang*, Dongdai  Lin, Zhenfu Cao. Generalized (Identity-Based) Hash Proof System and Its Applications,Security and Communication Networks,  Volume 9, pp. 16981716, Aug, 2016.(CCF Rank C, JCR Q4)Accession Number: WOS:000380004400006

5Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao. Post-Challenge Leakage in  Public-Key Encryption,Theoretical  Computer Science, Volume 572, pp. 2549,  March, 2015. (CCF Rank B, JCR Q4),Accession Number:WOS:000350939800002

4Zongyang Zhang, Zhenfu Cao, Haojin Zhu. Constant-Round Adaptive Zero-Knowledge  Proofs for NP,Information Science,  Volume 261, pp. 219-236, March, 2014. (CCF  Rank B, JCR Q1),Accession  Number:WOS:000331689700012

3Yu Chen, Zongyang Zhang*, Dongdai  Lin, Zhenfu Cao. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof  System,The Computer Journal,  Volume 57, Issue 10, pp. 1537-1556, 2014. (CCF Rank B, JCR Q4),Accession Number:WOS:000343417100006

2Zongyang Zhang, Zhenfu Cao and Haifeng Qian. Chosen-Ciphertext Attack Secure  Public Key Encryption with Auxiliary Inputs,Security and Communication Networks, 2012, Vol. 5,No. 12,  pp. 14041411, December, 2012 .(CCF Rank C, JCR Q4), Accession Number:WOS:000311403800011

1Zongyang Zhang and Zhenfu Cao. Concurrent Non-Malleable Statistically Hiding  Commitment,Information Processing  Letters, Vol.12, No. 11, pp. 443448,  June, 2012. (CCF Rank C, JCR Q4),Accession Number:WOS:000303303000007

  学术与社会服务

2017信息技术领域前沿跟踪研究,区块链技术编写组委员  

Globecom CISS  2016-2019TPC  

ICITCS 2017ProvSec  2016ICITCS 2015ProvSec  2014PC  

  科研项目

1.“高可靠低时延信息加解密技术研究”子课题,民用飞机专项科研,主持,2018.1-2020.12

2.“智能服务交易模型及关键技术”子课题,重点研发计划,主持,2017.12-2020.11

3.抗大规模监视的公钥密码体制研究,北京市自然科学基金面上项目,主持,2018.01-2020.06

4.高效可扩展隐私保护密码货币设计与分析,国家密码发展基金,主持,2018.9-2020.9

5.安全可扩展区块链共识协议研究,CCF-绿盟鲲鹏基金,主持,2018.9-2019.9

6.抗大规模监视的公钥密码系统设计与分析,信息安全国家重点实验室开放课题,主持,2017.01-2018.12  

7.基于北斗导航的共享单车安全信息系统,北斗应用研究院开放课题重大项目,主持,2017.08-2018.07

8.抗中间人攻击的密码协议研究,国家自然科学基金青年基金,主持,2014.01-2016.12      

 

上一条:张小明

下一条:姚燕青