Zhu Yan
Worked at Peking University from 2005 to 2013
2008-2009 Arizona State University
2012-2012 University of Michigan
2013-present University of Science and Technology Beijing
1. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Transactions on Cloud Computing, 2018, 6(4): 1110-1124.
2. Dual-mode broadcast encryption. Science China Information Sciences, 2018, 61(11): 0-118101.
3. Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Transactions on Reliability, 2019, 68(4): 1330-1346.
4. Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2270-2283.
5. From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Transactions on Services Computing, 2015, 8(4): 601-616.
6. Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud. International Journal of Cooperative Information Systems, 2017, 26(4): 0-1750003.
7. Efficient Attribute-Based Comparable Data Access Control. IEEE Transactions on Computers, 2015, 64(12): 3430-3443.
8. Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mobile Networks and Applications, 2015, 20(3): 297-307.
9. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. Frontiers of Computer Science, 2019, 13(6): 1182-1197.
10. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers of Computer Science, 2020, 14(4): 0-144806.
11. Digital asset management with distributed permission over blockchain and attribute-based access control. In Proceedings of the 2018 IEEE International Conference on Services Computing, SCC 2018.
12. TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.
13. Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 10th ACM Symposium on Information, Computer and Communications Security, 2015-4-14
14. SPESC: A Specification Language for Smart Contracts. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.
15. Provably secure cryptographic ABAC system to enhance reliability and privacy using real-time token and dynamic policy. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability, and Security, QRS 2018, 2018-7-16.
16. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Transactions on Parallel and Distributed Systems (TPDS). 2012, vol. 23, no.12, pp.2231-2244.
17. Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.
18. Efficient Audit Service Outsourcing for Data Integrity in Clouds. Journal of Systems and Software, 2012, 85(5): 1083-1095.
19. Zero-knowledge Proofs of Retrievability. Science China Information Sciences, 2011, 54(8): 1608-1617.
20. Efficient Provable Data Possession for Hybrid Clouds. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, 2010-10-4.
21. Peer-to-peer VPN system and multicast key distribution protocol based on group ciphers. Journal of Software, 2018.
22. Blockchain technology and its research progress. Journal of Engineering Science, 2019, 41(11): 1361-1373.
23. Blockchain smart contract execution system based on secure multi-party computing. Journal of Cryptography, 2018, 6(02): 246-257.
24. A high-level smart contract conversion method and bidding contract design and implementation, Chinese Journal of Computers, 2020.
1. The key special item of the National Key R&D Program "Smart Contract Service Based on Blockchain Technology", 2019-2022;
2. National Natural Science Foundation of China, "Research on the Cryptographic Construction Method and Application of Collective Membership", 2020-2023;
3. National Natural Science Foundation of China "Research on the Basic Theory of Anti-two-character Computational Cryptography Based on NP Complete Problems", 2017-2019;
4. National Natural Science Foundation of China "Research on Secure Access Control Technology Supporting Temporal and Spatial Attributes", 2015-2018;
5. National Natural Science Foundation of China "Research on Data Integrity Verification Technology in Foreign Aid Storage", 2012-2015;
1. A cryptography-based division protocol construction method in distributed computing, CN200910222922.6
2. A cryptographic construction method and system for determining set membership, CN201510013367.1
3. A hierarchical key control and public key broadcast encryption method, CN200910222921.1
4. A group encryption and decryption method and system with selection and elimination functions, CN201510012649.X
5. A logical comparison method for distributed computing, CN200910222920.7
6. An encryption system and access control method based on attribute sets and relational predicates, CN201511000960.9
7. A cryptographic attribute-based access control method and system based on dynamic rules, CN201711100571.2
8. An email authentication method and system based on group cryptosystem, CN201711289023.9
9. A decentralized public key management method and management system based on trust network, CN201611218516.9
10. Method and System for Cryptographic Decision-making of Set Membership, US2017/0359177A1