发布时间:2019-03-15   浏览次数:1327





姓名:穆怡


研究方向:密码学与信息安全


EMAIL:yimu@fjnu.edu.cn


通信地址:福建省福州市福建师范大学旗山校区数学与信息学院

个人简介:穆怡现为福建师范大学数学与信息学院教授。在2018年加入福建师范大学之前,他是澳大利亚伍伦贡大学计算机与信息技术系的教授和计算机信息安全研究所主任。2011-2015年,他担任澳大利亚伍伦贡大学计算机科学与软件工程学院院长。他的研究包括密码学,信息安全和量子密码学。他发表了500多篇研究论文,其中包括许多关于量子加密和密码学的开创性着作。他发明了第一种基于量子化正交相位振幅的量子密钥交换算法,被认为是量子密钥交换的三种主要方案之一。他的研究论文发表于CRYPTO,EUROCRYPT,ASIACRYPT,ACSAC,FSE,PKC,ESORICS,IEEE Transactions,等学术会议和期刊。主持国家自然科学基金、七个澳大利亚国家基金,以及来自工业界的研究资助项目等;担任Applied Cryptography、Information Sciences, The Computer Journal等学术期刊主编和副主编编,AsiaCCS,CANS,Provsec等学术会议指导委员会委员,ACM CCS,ESORICS等学术会议程序委员会委员。他是闽江学者和IEEE高级会员。

教育经历:

1978/2-1982/2,福州大学,物理学,学士;

1990/7-1994/6,澳大利亚国立大学,理论物理,博士;

科研与学术工作经历:按时间倒排序,包括博士后研究经历和学术访问等。

2018/7-至今   ,福建师范大学,数学与信息学院,教授;

1994/7-2018/6:澳大利亚伍伦贡大学计算机科学与软件工程学院, 麦考瑞大学计算学院,西悉尼大学计算机科学学院,任院长,教授,副教授,高级讲师,讲师等职位。

研究方向:主要从事密码学、信息安全,量子密码学及其应用方面的研究

科研项目:按时间倒排序,含主持或参与,在研或结题等。格式:项目类别,批准号,名称,研究起止年月,获资助金额,项目状态(已结题或在研等),主持或参加。

1.国家自然科学基金面上项目,61872087,抗颠覆攻击和安全后门, 2019/01-2022/12,62万元,在研,主持

科研成果:按时间倒排序,近5年发表的代表性学术论文、出版的学术专著、授权的发明专利和公开的政府咨询报告等。

5年代表性学术论文:

Major Journal Papers:

[1] Xueqiao Liu, Guomin Yang, Yi Mu, Robert Deng: Multi-user Verifiable Searchable Symmetric Encryption for Cloud Storage IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2018.2876831.

[2] Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng: Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Information Forensics and Security 13(8): 2101-2113 (2018).

[3] Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, Jean-Luc Danger: A Generic Table Recomputation-Based Higher-Order Masking. IEEE Trans. on CAD of Integrated Circuits and Systems 36(11): 1779-1789 (2017).

[4] Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan: Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220 (2017).

[5] Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang: Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Information Forensics and Security 12(3): 676-688 (2017).

[6] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu: EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Information Forensics and Security 12(12): 3110-3122 (2017).

[7] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 145-173 (2017).

[8] Fuchun Guo, Willy Susilo, Yi Mu: Distance-Based Encryption: How to Embed Fuzziness in Biometric-Based Encryption. IEEE Trans. Information Forensics and Security 11(2): 247-257 (2016).

[9] Yong Yu, Yannan Li, Jianbing Ni, Guomin Yang, Yi Mu, Willy Susilo: Comments on Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modi_cation, IEEE Trans. Information Forensics and Security 11(3): 658-659 (2016).

[10] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang: Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789-798 (2016).

[11] Xiaofen Wang, Yi Mu, Rongmao Chen: One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications. IEEE Trans. Information Forensics and Security 11(8): 1712-1721(2016).

[12] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang: Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 2833-2842 (2016).

[13] Jiannan Wei, Guomin Yang, Yi Mu: Comments on Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks. IEEE Trans. Wireless Communications 15(4): 3097-3099 (2016).

[14] Fuchun Guo, Willy Susilo, Yi Mu: Generalized closest substring encryption. Des. Codes Cryptography 80(1): 103-124 (2016).

[15] Xixiang Lv, Yi Mu, Hui Li: Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Trans. Dependable Sec. Comput. 12(6): 615-625 (2015).

[16] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au: Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Information Forensics and Security 10(3): 665-678 (2015).

[17] Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao: AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Information Forensics and Security 10(12): 2502-2514 (2015).

[18] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo: BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Trans. Information Forensics and Security 10(12): 2643-2652 (2015).

[19] Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang, Hui Li: Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Services Computing 8(6): 998-999 (2015).

[20] Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, CP-ABE with Constant-Size Keys for Lightweight Devices,IEEE Transactions on Information Forensics & Security, 9(5), pp. 763-771, 2014.

[21] Xixiang Lv, Yi Mu and Hui Li, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014, pp.5-13.

[22] Jianbing Ni, Yong Yu and Yi Mu, On the Security of an E_cient Dynamic Auditing Protocol in Cloud Storage, IEEE Transactions on the Transactions on Parallel and Distributed Systems, 25(10), pp.2760-2761(2014) .

[23] Jinguang Han, Willy Susilo and Yi Mu, Identity-Based Secure Distributed Data Storage Schemes, IEEE Transactions on Computers, 520, pp. 51-61, 2014.

[24] Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao, An Efficient Generic Framework for Three-Factor Authentication with Provably Secure Instantiation, IEEE Transactions on Information Forensics & Security, 9(12), pp.2302-2313 (2014).

[25] Fuchun Guo, Yi Mu and Willy Susilo, Subset Membership Encryption and Its Applications to Oblivious Transfer, IEEE Transactions on Information Forensics & Security, 9(7), pp. 1098-1107 (2014).

Major Conference Papers:

[1] Yongcheng Song, Xinyi Huang, Yi Mu, Wei Wu: A New Code-based Signature Scheme with Shorter Public Key, International Conference on Practice and Theory of Public Key Cryptography, PKC 2019.

[2] Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu: Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547.

[3] Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, Guomin Yang: Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT (2) 2016: 745-776.

[4] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang: Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876.

[5] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au: PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. ESORICS (2) 2014: 73-90.

学术专著:

[1] Fuchun Guo, Willy Susilo, Yi Mu: Introduction to Security Reduction. Springer 2018,pp. 1-253.

专利:

[1] 王晓喃,穆怡. 下一代无线网络安全通信实现方法,2017,国家发明专利,201410557974.X (江苏省百件优质专利)

[2] 王晓喃,穆怡.一种基于数据的网络通信实现方法, 2018,国家发明专利,201510564270.X



 
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学)  
邮编:350007  联系电话:0591-83456050转406   
访问量:
158962020年11月04日