Position: Home>Faculty
Teacher Details
  • Personal Information
    Zhu Yan

    Zhu Yan

    Department:
    |Department of Computer Science and Technology|
    Professional Title:
    Professor  
    Position:
    Director of Undergraduate Teaching, Department of Computer Science and Technology, Party Branch Secretary
    Office:
    202 of MEE Building
    Tel:
    62334905
    E-Mail:
    zhuyan@ustb.edu.cn
    Undergraduate Courses:
    Cyber Security and Management Information Theory and Coding Digital Signature and Identity Authentication Counting Cyberspace Security Frontier Technology Seminar Cryptography Application
    Graduate Courses:
    Frontier Discussion of Information Security
    Research Directions:
    Information security, blockchain and smart contracts, cloud computing, code legalization, algebra and cryptography, secure computing
    Academic And Social Part-Time:
    Member of the Security Protocol Committee of the Cryptography Society, Deputy Director of the Special Committee of the Blockchain Branch of the Institute of Electronics
  • Resume

    Worked at Peking University from 2005 to 2013

    2008-2009 Arizona State University

    2012-2012 University of Michigan

    2013-present University of Science and Technology Beijing


  • Representative Papers

    1. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Transactions on Cloud Computing, 2018, 6(4): 1110-1124.

    2. Dual-mode broadcast encryption. Science China Information Sciences, 2018, 61(11): 0-118101.

    3. Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens. IEEE Transactions on Reliability, 2019, 68(4): 1330-1346.

    4. Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2270-2283.

    5. From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Transactions on Services Computing, 2015, 8(4): 601-616.

    6. Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud. International Journal of Cooperative Information Systems, 2017, 26(4): 0-1750003.

    7. Efficient Attribute-Based Comparable Data Access Control. IEEE Transactions on Computers, 2015, 64(12): 3430-3443.

    8. Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mobile Networks and Applications, 2015, 20(3): 297-307.

    9. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. Frontiers of Computer Science, 2019, 13(6): 1182-1197.

    10. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers of Computer Science, 2020, 14(4): 0-144806.

    11. Digital asset management with distributed permission over blockchain and attribute-based access control. In Proceedings of the 2018 IEEE International Conference on Services Computing, SCC 2018.

    12. TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.

    13. Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 10th ACM Symposium on Information, Computer and Communications Security, 2015-4-14

    14. SPESC: A Specification Language for Smart Contracts. In Proceedings of the 42nd IEEE Computer Software and Applications Conference, COMPSAC 2018, 2018-7-23.

    15. Provably secure cryptographic ABAC system to enhance reliability and privacy using real-time token and dynamic policy. In Proceedings of the 18th IEEE International Conference on Software Quality, Reliability, and Security, QRS 2018, 2018-7-16.

    16. Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Transactions on Parallel and Distributed Systems (TPDS). 2012, vol. 23, no.12, pp.2231-2244.

    17. Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227-238.

    18. Efficient Audit Service Outsourcing for Data Integrity in Clouds. Journal of Systems and Software, 2012, 85(5): 1083-1095.

    19. Zero-knowledge Proofs of Retrievability. Science China Information Sciences, 2011, 54(8): 1608-1617.

    20. Efficient Provable Data Possession for Hybrid Clouds. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, 2010-10-4.

    21. Peer-to-peer VPN system and multicast key distribution protocol based on group ciphers. Journal of Software, 2018.

    22. Blockchain technology and its research progress. Journal of Engineering Science, 2019, 41(11): 1361-1373.

    23. Blockchain smart contract execution system based on secure multi-party computing. Journal of Cryptography, 2018, 6(02): 246-257.

    24. A high-level smart contract conversion method and bidding contract design and implementation, Chinese Journal of Computers, 2020.


  • Research Performance

    1. The key special item of the National Key R&D Program "Smart Contract Service Based on Blockchain Technology", 2019-2022;

    2. National Natural Science Foundation of China, "Research on the Cryptographic Construction Method and Application of Collective Membership", 2020-2023;

    3. National Natural Science Foundation of China "Research on the Basic Theory of Anti-two-character Computational Cryptography Based on NP Complete Problems", 2017-2019;

    4. National Natural Science Foundation of China "Research on Secure Access Control Technology Supporting Temporal and Spatial Attributes", 2015-2018;

    5. National Natural Science Foundation of China "Research on Data Integrity Verification Technology in Foreign Aid Storage", 2012-2015;


  • Get Rewards/Patents

    1. A cryptography-based division protocol construction method in distributed computing, CN200910222922.6

    2. A cryptographic construction method and system for determining set membership, CN201510013367.1

    3. A hierarchical key control and public key broadcast encryption method, CN200910222921.1

    4. A group encryption and decryption method and system with selection and elimination functions, CN201510012649.X

    5. A logical comparison method for distributed computing, CN200910222920.7

    6. An encryption system and access control method based on attribute sets and relational predicates, CN201511000960.9

    7. A cryptographic attribute-based access control method and system based on dynamic rules, CN201711100571.2

    8. An email authentication method and system based on group cryptosystem, CN201711289023.9

    9. A decentralized public key management method and management system based on trust network, CN201611218516.9

    10. Method and System for Cryptographic Decision-making of Set Membership, US2017/0359177A1