发布时间:2019-03-15   浏览次数:659


Yi Mu (穆怡)


Professor

College of Mathematics and Informatics

Fujian Normal University

Fuzhou, China

Email: ymu.ieee at gmail.com

 

 

Short Biography

Professor Yi Mu received his Bachelor in Physics from Fuzhou University in 1982 and his PhD from the Australian National University in 1994. He is currently a professor in the College of Mathematics and Informatics at Fujian Normal University, China. Before joining Fujian Normal University in 2018, he was a professor in the School of Computing and Information Technology and the co-director of Centre for Computer and Information Security Research, University of Wollongong, Australia. He was the Head of School of Computer Science and Software Engineering, University of Wollongong, during 2011 and 2015, before the school had its new name: School of Computing and Information Technology, in 2015. Prior to joining University of Wollongong in 2003, he was a senior lecturer in the Department of Computing, Macquarie University. He also worked in Department of Computing and IT, University of Western Sydney as a lecturer. His current research interest includes cryptography, network security and computer security. He also previously worked in the areas of quantum cryptography, quantum computers, atomic computations and quantum optics.

Professor Mu has published over 500 peer-reviewed papers including many seminal works in quantum cryptography and cryptography. He has published in top-quality journals, including IEEE Transactions and many papers at top-tier cryptography and security conferences such as CRYPTO, EURCRYPT, ASIACRYPT, ACACS, PKC, FSE, CT-RSA, and ESORICS. Professor Mu was Editor-in-Chief of International Journal of Applied Cryptography and serves as associate editor or guest editor for several reputable international Journals. He has served in program committees for a number of international security conferences, including ACM CCS, ACM AisaCCS, ESORICS, etc. Professor Mu has also served in steering committees of AsiaCCS, CANS and ProvSec. He is a senior member of the IEEE.

 

 

Selected Publications:

[1] Fuchun Guo, Willy Susilo and Yi Mu, Introduction to Security Reduction, Springer, pp. 1-253, 2018.

[2] Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu, Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample, CRYPTO 2017, Lecture Notes in Computer Science 10402, Springer, pp. 517-547, 2017.

[3] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang, ``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions, ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.844-876, 2016.

[4] Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang, ``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction, ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.745-776, 2016.

[5] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly Leakage-Resilient Authenticated Key Exchange, Lecture Notes in Computer Science 9610, CT-RSA 2016, pp.19-36, 2016.

[6] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and Man-Ho Au. ``PPDCP-ABE: privacy-preserving decentralized cipher-policy attribute-based encryption, European Symposium on Research in Computer Security (ESORICS 2014), pp.73-90.

[7] Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext, 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science 7459, Springer Verlag, 2012, pp. 609-626.

[8] Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships, Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147, Springer Verlag, 2010, pp. 192-211.

[9] Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao, ``Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting, The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Lecture Notes in Computer Science 6056, 2010, pp.124-141.

[10] Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim. ``Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy, Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052, Springer Verlag, 2010, pp. 304-311.

[11] Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo, ``Asymmetric Group Key Agreement, Advances in Cryptology - EUROCRYPT 2009, Lecture Notes in Computer Science 5479, Springer Verlag, pp153-170.

[12] Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Target Collision Resistant Hash Functions Revisited, Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665, Springer Verlag, pp. 327-344.

[13] Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu, ``Dynamic Multiversal Accumulators and Their Application to Attribute-Based Anonymous Credential Systems, CT-RSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295-308.

[14] Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, ``New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing, 14th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science, Springer Verlag, 2009, pp. 321-336.

[15] Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, `` RFID Privacy Models Revisited, 13th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science 5283, Springer Verlag, 2008, pp.251-266.

[16] Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption, Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.247-261.

[17] Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Anonymous Divisible E-Cash From Bounded Accumulators, Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.287-301.

[18] Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu, ``Compact E-Cash from Bounded Accumulator, RSA Conference 2007, Cryptographers' Track (CT-RSA 2007), Lecture Notes in Computer Science, Springer-Verlag, 2007, pp. 178-195.

[19] Huafei Zhu, Willy Susilo and Yi Mu. ``Multi-party stand-alone and setup-free verifiably committed signatures, International Conference on Theory and Practice of Public-Key Cryptography 2007 (PKC 2007), Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134-149.

[20] Fangguo Zhang, Willy Susilo, Yi Mu. ``Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures), Financial Cryptography (FC 2005), Lecture Notes in Computer Science (LNCS 3570), pp.45-56.

[21] Yi Mu, Vijay Varadharajan, Anonymous secure e-voting over a network, The 14th Annual Computer Security Applications Conference, ACSAC 1998, IEEE, pp. 293-299 .

[22] Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan, Micro-digital money for electronic commerce, The 13th Annual Computer Security Applications Conference, ACSAC 1997, pp.2-8.

[23] Yi Mu, Jennifer Seberry, and Yuliang Zheng, Shared cryptographic bits via quantized quadrature phase amplitudes of light, Journal of Optics Communications, Vol 123, pp. 344-352, 1996.

[24] Yi Mu and Craig M. Savage, ``One-atom lasers, Physical Review A, 46, 5944 (1992).

 

Some other papers:

[1] Yanwei Zhou, Bo Yang, Yi Mu, ``Continuous leakage-resilient identity-based encryption with leakage amplification, Designs, Codes and Cryptography, 2019.

[2] Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng: Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Information Forensics and Security 13(8): 2101-2113 (2018).

[3] Xueqiao Liu, Guomin Yang, Yi Mu, Robert Deng: Multi-user Verifiable Searchable Symmetric En- cryption for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2018.2876831.

[4] Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger: A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. on CAD of Integrated Circuits and Systems 36(11): 1779-1789 (2017).

[5] Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan: Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220 (2017).

[6] Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang: Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Information Forensics and Security 12(3): 676-688 (2017).

[7] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu: EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Information Forensics and Security 12(12): 3110-3122 (2017).

[8] Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang: Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Information Processing 16(1): 8 (2017).

[9] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 145-173 (2017).

[10] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 175-178 (2017).

[11] Fuchun Guo, Willy Susilo, Yi Mu: Distance-Based Encryption: How to Embed Fuzziness in Biometric- Based Encryption. IEEE Trans. Information Forensics and Security 11(2): 247-257 (2016).

[12] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang: Dual-Server Public-Key Encryp- tion With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789-798 (2016).

[13] Xiaofen Wang, Yi Mu, Rongmao Chen: One-Round Privacy-Preserving Meeting Location Determina- tion for Smartphone Applications. IEEE Trans. Information Forensics and Security 11(8): 1712-1721 (2016).

[14] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang: Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 2833-2842 (2016).

[15] Fuchun Guo, Willy Susilo, Yi Mu: Generalized closest substring encryption. Des. Codes Cryptography 80(1): 103-124 (2016).

[16] Xixiang Lv, Yi Mu, Hui Li: Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Trans. Dependable Sec. Comput. 12(6): 615-625 (2015)

[17] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au: Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Information Forensics and Security 10(3): 665-678 (2015).

[18] Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao: AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Information Forensics and Security 10(12): 2502-2514 (2015).

[19] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo: BL-MLE: Block-Level Message-Locked Encryp- tion for Secure Large File Deduplication. IEEE Trans. Information Forensics and Security 10(12): 2643-2652 (2015).

[20] Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, “CP-ABE with Constant- Size Keys for Lightweight Devices,” IEEE Transactions on Information Forensics & Security, 9(5), pp. 763-771, 2014.

[21] Xixiang Lv, Yi Mu and Hui Li, “Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs,” IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014, pp. 5-13.

[22] Jianbing Ni, Yong Yu and Yi Mu, “On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage,” IEEE Transactions on the Transactions on Parallel and Distributed Systems, 25(10), pp.2760-2761 (2014).

[23] Jinguang Han, Willy Susilo and Yi Mu, “Identity-Based Secure Distributed Data Storage Schemes,” IEEE Transactions on Computers, 520, pp. 51-61, 2014.

[24] Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao, “An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation,” IEEE Transactions on Information Forensics & Security, 9(12), pp.2302-2313 (2014).

[25] Fuchun Guo, Yi Mu and Willy Susilo, “Subset Membership Encryption and Its Applications to Obliv- ious Transfer,” IEEE Transactions on Information Forensics & Security, 9(7), pp. 1098-1107 (2014).

[26] Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan, “Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, 2012, pp. 2150-2162.

[27] Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert H. Deng, “Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures,” IEEE Transactions on Forensics and Security, 6(2): pp. 498-512 (2011).

 


 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日