热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
张宗洋
2023-05-06 10:27
  • 张宗洋
  • 张宗洋 - 副教授-北京航空航天大学-网络空间安全学院-个人资料

近期热点

资料介绍

个人简历


学习经历\r
2001.9-2005.6:河海大学,学士,计算机科学与技术\r
2005.9-2008.3:上海交通大学,硕士,计算机软件与理论\r
2007.9-2012.1:上海交通大学,博士,计算机软件与理论\r
\r
工作经历\r
2012.3-2014.9:上海交通大学,博士后\r
2012.9-2014.3:日本产业技术综合研究所,博士后\r
2014.4-2016.3:日本学术振兴会,博士后\r
2016.4-2018.5:北航电子信息工程学院,讲师\r
2018.5-至今:北航网络空间安全学院,讲师 \r
\r
荣誉及奖励\r
2018年获北航学院2017级优秀班主任\r
2018年获北航学院优秀导师\r
2018年获第十一届全国大学生信息安全竞赛优秀指导教师奖\r
2018年获得北京市高等教育教学成果二等奖(排名7)\r
2017年获得北航青年教师培训基础班优秀学员称号\r
2016年获得北京航空航天大学“蓝天新秀”称号\r
2014年获上海市优秀博士学位论文

研究领域


"区块链与密码货币、公钥密码学、网络安全"

近期论文


Bin Hu,Yizhong Liu,Jiayuan Yin,Rongxing Lu,Xiaodong Lin.A Comprehensive Survey on Smart Contract Construction and Execution: Paradigms, Tools and Systems.[期刊]:Cell子刊Patterns,2021,2(2)\r
\r
Yu Chen, Liqun Chen and Zongyang Zhang (通讯作者), CCA Secure IB-KEM from Computational Bilinear Diffie-Hellman in the Standard Model, the 14th Annual International Conference on Information Security and Cryptology (ICISC 2011), Lecture Notes in Computer Science, Vol. 7259, pp.153-170, Springer-Verlag, December, 2011. EI, CCF C.\r
\r
Hongbing Wang, Yingjiu Li, Zongyang Zhang and Zhenfu Cao, Two-level Path Authentication in EPCglobal Network, 2012 IEEE International Conference on RFID (IEEE RFID 2012), pp. 24-31, April, 2012.\r
\r
Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao, Identity Based Extractable Hash Proofs and their Applications, Applied Cryptography and Network Security (ACNS 2012), Lecture Notes in Computer Science, Vol. 7341, pp.153-170, Springer-Verlag, June 26-29, 2012. EI, CCF Rank C.\r
\r
Zongyang Zhang, Zhenfu Cao, Haifeng Qian, Chosen-Ciphertext Attack Secure Public Key Encryption with Auxiliary Inputs, Security and Communication Networks, 2012, Vol.5, Issue 12, pp. 1404-1411, Elsevier, March, 2012. SCI, CCF Rank C.\r
\r
Zongyang Zhang, Zhenfu Cao, Concurrent Non-Malleable Statistically Hiding Commitment, Information Processing Letters, 12(11), 443-448, Elsevier, March, 2012. SCI. CCF Rank C.\r
\r
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, Anonymous Identity-Based Hash Proof System and Its Applications, the Sixth International Conference on Provable Security (PROVSEC 2012), Lecture Notes in Computer Science, Vol.7496, pp. 143-160, Springer-Verlag, September 26-28, 2012. EI.\r
\r
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System, The Computer Journal, Vol. 57, Issue 10, pp. 1537-1556, October, 2014, SCI, CCF Rank C.\r
\r
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang, Black-Box Separations for One-More (Static) CDH and Its Generalization, the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014), Lecture Notes in Computer Science, Vol.8874, pp. 366-385, Springer-Verlag, December 7-11, 2014. CCF Rank B, 密码学领域三大旗舰会议之一.\r
\r
Yu Chen, Zongyang Zhang (通讯作者), Publicly Evaluable Pseudorandom Functions and Their Applications, the Ninth Conference on Security and Cryptography for Networks (SCN 2014), Lecture Notes in Computer Science, Vol.8642, pp.115-134, Springer-Verlag, September 3-5, 2014. EI.\r
\r
Yu Chen, Qiong Huang, Zongyang Zhang (通讯作者), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited, the 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Lecture Notes in Computer Science, Vol.8544, pp. 274-289, Springer-Verlag, July 7-9, 2014. EI, CCF Rank C.\r
\r
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao, All-but-One Dual Projective Hashing and Its Applications, the 12th International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer Science, Vol. 8479, pp.181-198, Springer-Verlag, June 10-13, 2014. EI, CCF Rank C.\r
\r
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao, Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model, the Ninth International Conference on Provable Security (ProvSec 2015), Lecture Notes in Computer Science, Vol. 9451, pp.435-454. Springer-Verlag, November 24-26, 2015. EI.\r
\r
Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao, Efficient Tag Path Authentication Protocol with Less Tag Memory, the 12th International Conference on Information Security Practice and Experience (ISPEC 2016), Lecture Notes in Computer Science, Vol.10060, pp. 255-270, Springer-Verlag, November 16-18, 2016. EI.\r
\r
Yu Chen, Zongyang Zhang (通讯作者), Dongdai Lin, Zhenfu Cao, Generalized (Identity-Based) Hash Proof System and Its Applications, Security and Communication Networks, Vol. 9, Issue 12, pp. 1698-1716, Wiley, August 2016. SCI. CCF Rank C.\r
\r
Yu Chen, Qiong Huang, Zongyang Zhang (通讯作者), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More, International Journal of Information Security, Vol.15, Issue 1, pp. 15-33, Springer-Verlag, February, 2016. SCI.\r
\r
Hui Yu, Zongyang Zhang (通讯作者) and Jianwei Liu. Research on Scaling Technology of Bitcoin Blockchain, Journal of Computer Research and Development, Vol. 54, Issue 10, pp. 2390-2403, 2017. EI.\r
\r
Dawei Li, Jianwei Liu, Zongyang Zhang (通讯作者), Qianhong Wu, Wiran Liu, Revocable Hierarchical Identity-Based Broadcast Encryption, Tsinghua Science and Technology, Accept. 2017. SCI.\r
\r
Xinguang Zhou, Jianwei Liu, Qianhong Wu and Zongyang Zhang (通讯作者), Privacy Preservation for Outsourced Medical Data with Flexible Access Control, IEEE Access, Vol. 6, pp. 14827-14841, 2018. JCR Q1, SCI.\r
\r
吴进喜, 高莹, 张宗洋, 殷大鹏. 基于区块链的多方隐私保护公平合同签署协议. 信息安全学报. 2018. 已录用.\r
\r
Jiayuan Yin, Changren Wang, Zongyang Zhang (通讯作者), and Jianwei Liu. Revisiting the Incentive Mechanism of Bitcoin-NG. the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018), 已录用. EI, CCF Rank C.\r
\r
Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao. Post-Challenge Leakage in Public-Key Encryption, Theoretical Computer Science, Vol. 572, pp. 25–49, Elsevier, March, 2015. CCF Rank B.\r
\r
Yu Chen and Zongyang Zhang (通讯作者), Publicly Evaluable Pseudorandom Functions and Their Applications, Journal of Computer Security, Vol. 24, No. 2, pp. 289-320, IOS Express, April 19, 2016. CCF Rank B.\r
\r
Zongyang Zhang, Zhenfu Cao, Haojin Zhu. Constant-Round Adaptive Zero-Knowledge Proofs for NP, Information Science, Vol. 261, pp. 219-236, Elsevier, March, 2014. [SCI Impact Factor:4.832]. SCI , CCF Rank B, JCR Q1.\r
\r
Yuyu Wang, Zongyang Zhang (通讯作者), Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka, How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones, the 22nd International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, Vol.10032, pp. 465-495, Springer-Verlag, December 4-8, 2016. EI, CCF Rank B, 密码学领域三大旗舰会议之一.\r
\r
Xingguang Zhou, Jie Chen, Zongyang Zhang (通讯作者), Jianwei Liu, Qianhong Wu. Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage, the 9th International Symposium on Cyberspace Safety and Security (CSS 2017), Lecture Notes in Computer Science, Vol. 10581, pp. 411-426, Springer-Verlag, October 23–25, 2017. EI, 最佳学生论文奖.
§2017信息技术领域前沿跟踪研究,区块链技术编写组委员
§Globecom CISS 2016-2019,TPC
§ICITCS 2017、ProvSec 2016、ICITCS 2015、ProvSec 2014,PC

相关热点

扫码添加好友