Yi Mu (穆怡)
Professor
College of Mathematics and Informatics
Fujian Normal University
Fuzhou, China
Email: ymu.ieee at gmail.com
Short Biography
Professor Yi Mu received his Bachelor in Physics from Fuzhou University in 1982 and his PhD from the Australian National University in 1994. He is currently a professor in the College of Mathematics and Informatics at Fujian Normal University, China. Before joining Fujian Normal University in 2018, he was a professor in the School of Computing and Information Technology and the codirector of Centre for Computer and Information Security Research, University of Wollongong, Australia. He was the Head of School of Computer Science and Software Engineering, University of Wollongong, during 2011 and 2015, before the school had its new name: School of Computing and Information Technology, in 2015. Prior to joining University of Wollongong in 2003, he was a senior lecturer in the Department of Computing, Macquarie University. He also worked in Department of Computing and IT, University of Western Sydney as a lecturer. His current research interest includes cryptography, network security and computer security. He also previously worked in the areas of quantum cryptography, quantum computers, atomic computations and quantum optics.
Professor Mu has published over 500 peerreviewed papers including many seminal works in quantum cryptography and cryptography. He has published in topquality journals, including IEEE Transactions and many papers at toptier cryptography and security conferences such as CRYPTO, EURCRYPT, ASIACRYPT, ACACS, PKC, FSE, CTRSA, and ESORICS. Professor Mu was EditorinChief of International Journal of Applied Cryptography and serves as associate editor or guest editor for several reputable international Journals. He has served in program committees for a number of international security conferences, including ACM CCS, ACM AisaCCS, ESORICS, etc. Professor Mu has also served in steering committees of AsiaCCS, CANS and ProvSec. He is a senior member of the IEEE.
Selected Publications:
[1] Fuchun Guo, Willy Susilo and Yi Mu, Introduction to Security Reduction, Springer, pp. 1253, 2018.
[2] Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu, Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample, CRYPTO 2017, Lecture Notes in Computer Science 10402, Springer, pp. 517547, 2017.
[3] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang, ``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions, ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.844876, 2016.
[4] Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang, ``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction, ASIACRYPT 2016, Lecture Notes in Computer Science 10031, Springer, pp.745776, 2016.
[5] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly LeakageResilient Authenticated Key Exchange, Lecture Notes in Computer Science 9610, CTRSA 2016, pp.1936, 2016.
[6] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, and ManHo Au. ``PPDCPABE: privacypreserving decentralized cipherpolicy attributebased encryption, European Symposium on Research in Computer Security (ESORICS 2014), pp.7390.
[7] Fuchun Guo, Yi Mu and Willy Susilo, ``IdentityBased Traitor Tracing with Short Private Key and Short Ciphertext, 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science 7459, Springer Verlag, 2012, pp. 609626.
[8] Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships, Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147, Springer Verlag, 2010, pp. 192211.
[9] Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao, ``Further Observations on Optimistic Fair Exchange Protocols in the Multiuser Setting, The 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Lecture Notes in Computer Science 6056, 2010, pp.124141.
[10] Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim. ``Threeround Abusefree Optimistic Contract Signing With Everlasting Secrecy, Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052, Springer Verlag, 2010, pp. 304311.
[11] Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo, ``Asymmetric Group Key Agreement, Advances in Cryptology  EUROCRYPT 2009, Lecture Notes in Computer Science 5479, Springer Verlag, pp153170.
[12] Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Target Collision Resistant Hash Functions Revisited, Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665, Springer Verlag, pp. 327344.
[13] Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu, ``Dynamic Multiversal Accumulators and Their Application to AttributeBased Anonymous Credential Systems, CTRSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295308.
[14] Ching Yu Ng, Willy Susilo, Yi Mu, and Rei SafaviNaini, ``New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing, 14th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science, Springer Verlag, 2009, pp. 321336.
[15] Ching Yu Ng, Willy Susilo, Yi Mu, and Rei SafaviNaini, `` RFID Privacy Models Revisited, 13th European Symposium on Research in Computer Security (ESORICS 2008), Lecture Notes in Computer Science 5283, Springer Verlag, 2008, pp.251266.
[16] Fuchun Guo, Yi Mu, and Zhide Chen, ``IdentityBased Online/Offline Encryption, Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.247261.
[17] Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Anonymous Divisible ECash From Bounded Accumulators, Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.287301.
[18] Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu, ``Compact ECash from Bounded Accumulator, RSA Conference 2007, Cryptographers' Track (CTRSA 2007), Lecture Notes in Computer Science, SpringerVerlag, 2007, pp. 178195.
[19] Huafei Zhu, Willy Susilo and Yi Mu. ``Multiparty standalone and setupfree verifiably committed signatures, International Conference on Theory and Practice of PublicKey Cryptography 2007 (PKC 2007), Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134149.
[20] Fangguo Zhang, Willy Susilo, Yi Mu. ``IdentityBased Partial Message Recovery Signatures (or How to Shorten IDBased Signatures), Financial Cryptography (FC 2005), Lecture Notes in Computer Science (LNCS 3570), pp.4556.
[21] Yi Mu, Vijay Varadharajan, Anonymous secure evoting over a network, The 14th Annual Computer Security Applications Conference, ACSAC 1998, IEEE, pp. 293299 .
[22] Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan, Microdigital money for electronic commerce, The 13th Annual Computer Security Applications Conference, ACSAC 1997, pp.28.
[23] Yi Mu, Jennifer Seberry, and Yuliang Zheng, Shared cryptographic bits via quantized quadrature phase amplitudes of light, Journal of Optics Communications, Vol 123, pp. 344352, 1996.
[24] Yi Mu and Craig M. Savage, ``Oneatom lasers, Physical Review A, 46, 5944 (1992).
Some other papers:
[1] Yanwei Zhou, Bo Yang, Yi Mu, ``Continuous leakageresilient identitybased encryption with leakage amplification, Designs, Codes and Cryptography, 2019.
[2] Shengmin Xu, Guomin Yang, Yi Mu, Robert H. Deng: Secure FineGrained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Trans. Information Forensics and Security 13(8): 21012113 (2018).
[3] Xueqiao Liu, Guomin Yang, Yi Mu, Robert Deng: Multiuser Verifiable Searchable Symmetric En cryption for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2018.2876831.
[4] Ming Tang, Zhenlong Qiu, Zhipeng Guo, Yi Mu, Xinyi Huang, JeanLuc Danger: A Generic Table RecomputationBased HigherOrder Masking. IEEE Trans. on CAD of Integrated Circuits and Systems 36(11): 17791789 (2017).
[5] Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan: Optimized IdentityBased Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211220 (2017).
[6] Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang: Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Information Forensics and Security 12(3): 676688 (2017).
[7] Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu: EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Information Forensics and Security 12(12): 31103122 (2017).
[8] Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang: Privacypreserving pointinclusion protocol for an arbitrary area based on phaseencoded quantum private query. Quantum Information Processing 16(1): 8 (2017).
[9] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 145173 (2017).
[10] Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Zheng Yang: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptography 85(1): 175178 (2017).
[11] Fuchun Guo, Willy Susilo, Yi Mu: DistanceBased Encryption: How to Embed Fuzziness in Biometric Based Encryption. IEEE Trans. Information Forensics and Security 11(2): 247257 (2016).
[12] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang: DualServer PublicKey Encryp tion With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789798 (2016).
[13] Xiaofen Wang, Yi Mu, Rongmao Chen: OneRound PrivacyPreserving Meeting Location Determina tion for Smartphone Applications. IEEE Trans. Information Forensics and Security 11(8): 17121721 (2016).
[14] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang: ServerAided Public Key Encryption With Keyword Search. IEEE Trans. Information Forensics and Security 11(12): 28332842 (2016).
[15] Fuchun Guo, Willy Susilo, Yi Mu: Generalized closest substring encryption. Des. Codes Cryptography 80(1): 103124 (2016).
[16] Xixiang Lv, Yi Mu, Hui Li: LossTolerant Bundle Fragment Authentication for SpaceBased DTNs. IEEE Trans. Dependable Sec. Comput. 12(6): 615625 (2015)
[17] Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au: Improving Privacy and Security in Decentralized CiphertextPolicy AttributeBased Encryption. IEEE Trans. Information Forensics and Security 10(3): 665678 (2015).
[18] Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao: AACOT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Information Forensics and Security 10(12): 25022514 (2015).
[19] Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo: BLMLE: BlockLevel MessageLocked Encryp tion for Secure Large File Deduplication. IEEE Trans. Information Forensics and Security 10(12): 26432652 (2015).
[20] Fuchun Guo, Yi Mu, Willy Susilo, Duncan Wong and Vijay Varadharajan, “CPABE with Constant Size Keys for Lightweight Devices,” IEEE Transactions on Information Forensics & Security, 9(5), pp. 763771, 2014.
[21] Xixiang Lv, Yi Mu and Hui Li, “Noninteractive Key Establishment for Bundle Security Protocol of Space DTNs,” IEEE Transactions on Information Forensics & Security, Vol. 9, No. 1, Jan. 2014, pp. 513.
[22] Jianbing Ni, Yong Yu and Yi Mu, “On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage,” IEEE Transactions on the Transactions on Parallel and Distributed Systems, 25(10), pp.27602761 (2014).
[23] Jinguang Han, Willy Susilo and Yi Mu, “IdentityBased Secure Distributed Data Storage Schemes,” IEEE Transactions on Computers, 520, pp. 5161, 2014.
[24] Jiangshan Yu, Guilin Wang, Yi Mu and Wei Gao, “An Efficient Generic Framework for ThreeFactor Authentication with Provably Secure Instantiation,” IEEE Transactions on Information Forensics & Security, 9(12), pp.23022313 (2014).
[25] Fuchun Guo, Yi Mu and Willy Susilo, “Subset Membership Encryption and Its Applications to Obliv ious Transfer,” IEEE Transactions on Information Forensics & Security, 9(7), pp. 10981107 (2014).
[26] Jinguang Han, Willy Susilo, Yi Mu, and Jun Yan, “PrivacyPreserving Decentralized KeyPolicy AttributeBased Encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 11, 2012, pp. 21502162.
[27] Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Jianying Zhou, and Robert H. Deng, “Preserving Transparency and Accountability in Optimistic Fair Exchange of Digital Signatures,” IEEE Transactions on Forensics and Security, 6(2): pp. 498512 (2011).
版权所有 © 联系地址：福建省网络安全与密码技术重点实验室（福建师范大学） 
邮编：350007 联系电话：059183456050转406 
访问量:
158962020年11月04日
