热点话题人物,欢迎提交收录!
最优雅的名人百科,欢迎向我们提交收录。
曹珍富
2023-05-10 19:03
  • 曹珍富
  • 曹珍富 - 博导-华东师范大学-软件工程学院-个人资料

近期热点

资料介绍

个人简历


学术成果
国家杰出青年基金获得者,享受国务院特殊津贴。1983年参加工作,1987年晋升副教授,1991年晋升正教授。从1986年起,作为第一完成人或独立完成人获得过教育部自然科学一等奖等省部级奖8项。从1981年开始发表学术论文以来,已在各种学术期刊、会议上发表500余篇论文(其中高质量论文400余篇),SCI检索160余篇,EI检索300余篇,总引用超过10000次,出版专著7部(包括1部CRC出版的英文专著)、主编(或副主编)全国教材两部,从1983年开始主持国家或省部级科研项目,至今已主持50余项,包括中国科学院青年奖励研究基金、国家自然科学基金A3前瞻计划项目、重点项目、杰出青年基金项目等重要科研项目。在高校执教30余年里,为国家有关部门科研人员、中科院和众多高校作邀请报告100余次,参与制定相关国家标准10余项。三十多年来,解决众多著名数学家或密码学家提出的公开难题,提出结合应用的密码学理论和多方密码学安全模型架构。
Monograph
[1] Zhenfu Cao. New Directions of Modern Cryptography. CRC Press, 2012.
[2] Zhenfu Cao, Diophantine Equation and Its Applications (in Chinese), Shanghai Jiao Tong Univ. Press, 2000.
[3] Zhenfu Cao. Public Key Cryptography (in Chinese). Heilongjiang Edu. Press, 1993.
[4] Zhenfu Cao. Introduction to Diophantine Equations (in Chinese). Harbin Institute of Technology Press, 1989.

研究领域


数论、密码学和网络安全新理论(云计算、云处理安全和隐私保护,大数据安全和隐私保护等)""

近期论文


1. Zhen Liu, Zhenfu Cao, and Duncan S. Wong. Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild. IEEE Transactions on Information Forensics and Security, 10(1): 55-68 (2015). 2. Jun Zhou, Xiaodong Lin, Xiaolei Dong, and Zhenfu Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems. DOI: 10.1109/TPDS.2014.2314119, to appear. 3. J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, DOI:10.1016/j.ins.2014.09.003, to appear. 4. Le Chen, Rongxing Lu, Khalid AlHarbi, Xiaodong Lin, and Zhenfu Cao. ReDD: Recommendation-based Data Dissemination in Privacy-preserving Mobile Social Networks. Security and Communication Networks, DOI: 10.1002/sec.1082, to appear. 5. Weiwei Jia, Haojin Zhu, Suguo Du, Xiaolei Dong, and Zhenfu Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks. DOI: 10.1002/sec.950, to appear. 6. Le Chen, Rongxing Lu, Zhenfu Cao, Khalid AlHarbi, and Xiaodong Lin. MuDA: Multifunctional Data Aggregation in Privacy-preserving Smart Grid Communications, Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-014-0292-0, to appear. 7. Le Chen, Rongxing Lu, and Zhenfu Cao, PDAFT: A Privacy-preserving Data Aggregation Scheme with Fault Tolerance for Smart Grid Communications, Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-014-0255-5, to appear. 8. Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao: CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System. The Computer Journal, 57(10): 1537-1556 (2014) 9. Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, Athanasios V. Vasilakos: Security and privacy for storage and computation in cloud computing. Information Sciences 258: 371-386 (2014) 10. Zongyang Zhang, Zhenfu Cao, Haojin Zhu: Constant-round adaptive zero-knowledge proofs for NP. Information Sciences 261: 219-236 (2014) 11. Hongbing Wang, Zhenfu Cao, Lifei Wei: A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption. Security and Communication Networks 7(1): 14-32 (2014) 12. Weiwei Jia, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Chengxin Xiao: Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal 8(2): 598-607 (2014) 13. Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong Dong, Zhenfu Cao: A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks. IEEE Trans. Parallel Distrib. Syst. 25(1): 22-32 (2014) 14. Zhenfu Cao, Keqiu Li, Xu Li, Patrick McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang: Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 25(2): 279-282 (2014) 15. Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (Sherman) Shen: SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs. Ad Hoc & Sensor Wireless Networks 19(1-2): 95-118 (2013) 16. Dazhi Sun and Zhenfu Cao. On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User Anonymity. Cryptologia, 37(4), 345-355, 2013. 17. Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang: Certificate-based proxy decryption systems with revocability in the standard model. Information Sciences 247: 188-201 (2013) 18. Dazhi Sun, Jinpeng Huai, and Zhenfu Cao. A comment on ' ' An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation''. Information Sciences, 223, 331-334, 2013. 19. Haiyong Bao, Zhenfu Cao: Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash. J. Intelligent Systems 22(2): 95-110 (2013) 20. Huang Lin, Xiaoyan Zhu, Y. Fang, Dongsheng Xing, Chi Zhang, and Zhenfu Cao. Efficient Trust Based Information Sharing Schemes over Distributed Collaborative Network. IEEE Journal on Selected Areas in Communications, 31(9), 279-290, 2013. 21. Dazhi Sun, Jianxin Li, Zhiyong Feng, Zhenfu Cao, and Guangquan Xu. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks. Personal and Ubiquitous Computing, 17(5), 895-905, 2013. 22. Hongbing Wang, Zhenfu Cao: More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles. Security and Communication Networks 6(2): 173-181 (2013) 23. Lifei Wei, Zhenfu Cao, Xiaolei Dong: Secure identity-based multisignature schemes under quadratic residue assumptions. Security and Communication Networks 6(6): 689-701 (2013) 24. Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang: New public key cryptosystems based on non-Abelian factorization problems. Security and Communication Networks 6(7): 912-922 (2013) 25. Zhen Liu, Zhenfu Cao, Duncan S. Wong: White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures. IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013) 26. Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin, Athanasios V. Vasilakos: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wireless Commun. 20(4) , 12-21, 2013. 27. Haiyong Bao, Mande Xie, Zhenfu Cao, and Shanshan Hong. Signature-Encryption Scheme: A Novel Solution to Mobile Computation. Advanced Materials Research. 546, 1415-1420, 2012. 28. Zongyang Zhang, Zhenfu Cao: Concurrent non-malleable statistically hiding commitment. Information Processing Letters 112(11): 443-448 (2012) 29. Jun Shao, Zhenfu Cao: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences 206: 83-95 (2012) 30. Zongyang Zhang, Zhenfu Cao, Haifeng Qian: Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Security and Communication Networks 5(12): 1404-1411 (2012) 31. Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo: An ID-based digital watermarking protocol for copyright protection. Computers & Electrical Engineering 37(4): 526-531 (2011) 32. Piyi Yang, Zhenfu Cao, Xiaolei Dong: Fuzzy identity based signature with applications to biometric authentication. Computers & Electrical Engineering 37(4): 532-540 (2011) 33. Hai Huang, Zhenfu Cao: Blake-Wilson, Johnson & Menezes protocol revisited. SCIENCE CHINA Information Sciences 54(7): 1365-1374 (2011) 34. Dongsheng Xing, Zhenfu Cao, Xiaolei Dong: Identity based signature scheme based on cubic residues. SCIENCE CHINA Information Sciences 54(10): 2001-2012 (2011) 35. Piyi Yang, Zhenfu Cao, Xiaolei Dong, Tanveer A. Zia: An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Communications Letters 15(11): 1205-1207 (2011) 36. Zhenfu Cao, Ivan Visconti, Zongyang Zhang: On constant-round concurrent non-malleable proof systems. Information Processing Letters 111(18): 883-890 (2011) 37. Piyi Yang, Zhenfu Cao, Xiaolei Dong: Threshold proxy re-signature. J. Systems Science & Complexity 24(4): 816-824 (2011) 38. Jun Shao, Zhenfu Cao, Peng Liu: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Security and Communication Networks 4(2): 122-135 (2011)


39. Hai Huang, Zhenfu Cao: Authenticated key exchange protocol with enhanced freshness properties. Security and Communication Networks 4(10): 1130-1136 (2011) 40. Hai Huang, Zhenfu Cao: IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol. Security and Communication Networks 4(10): 1153-1161 (2011) 41. Xiaolei Dong, Lifei Wei, Haojin Zhu, Zhenfu Cao, Licheng Wang: : An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE T. Vehicular Technology 60(2): 580-591 (2011) 42. Renwang Su, Zhenfu Cao: An efficient anonymous authentication mechanism for delay tolerant networks. Computers & Electrical Engineering 36(3): 435-441 (2010) 43. Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu: Conjugate adjoining problem in braid groups and new design of braid-based signatures. SCIENCE CHINA Information Sciences 53(3): 524-536 (2010) 44. Huang Lin, Zhenfu Cao: On the security of metering scheme. Computers & Mathematics with Applications 60(2): 272-275 (2010) 45. Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin: Proxy re-encryption with keyword search. Information Sciences 180(13): 2576-2587 (2010) 46. Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao: Secure threshold multi authority attribute based encryption without a central authority. Information Sciences 180(13): 2618-2632 (2010) 47. Hongbing Wang, Zhenfu Cao, Licheng Wang: Multi-use and unidirectional identity-based proxy re-encryption schemes. Information Sciences 180(20): 4042-4059 (2010) 48. Huang Lin and Zhenfu Cao. Metering scheme with fine grained pricing. Journal of Internet Technology, 11(6), 837-846, 2010. 49. Piyi Yang, Zhenfu Cao, Xiaolei Dong: Efficient certificateless threshold signatures without random oracles. J. Systems Science & Complexity 23(6): 1167-1182 (2010) 50. Zhenfu Cao. Universal encrypted deniable authentication protocol. International Journal of Network Security, 8(2), 151-158, 2009. 51. Xiaolei Dong, Haifeng Qian, and Zhenfu Cao. Provably secure RSA-type signature based on conic curve. Wireless Communications and Mobile Computing, 9(2), 217-225, 2009. 52. Shengbao Wang, Zhenfu Cao, Zhaohui Cheng, and Kim-Kwang Raymond Choo. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode, Science in China Series F, 52(8), 1358-1370, 2009. 53. Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. On the Anonymity of Some Authentication Schemes for Wireless Communications, IEEE Communications Letters, 13(3), 170-171, 2009. 54. Hai Huang and Zhenfu Cao. A Novel and Efficient Unlinkable Secret Handshakes Scheme, IEEE Communications Letters, 13(5), 363-365, 2009. 55. Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang. Security Weakness in a Dynamic Program Update Protocol for Wireless Sensor Networks, IEEE Communications Letters, 13(6), 426-428, 2009. 56. Feng Cao and Zhenfu Cao. A secure identity-based proxy multi-signature scheme, Information Sciences, 179(3), 292-302, 2009. 57. Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, and Lihua Wang. An improved identity-based key agreement protocol and its security proof, Information Sciences, 179(3), 307-318, 2009. 58. Feng Cao and Zhenfu Cao. An identity based universal designated verifier signature scheme secure in the standard model, Journal of Systems and Software, 82(4), 643-649, 2009. 59. Feng Cao and Zhenfu Cao. A secure identity-based multi-proxy signature scheme, Computers & Electrical Engineering, 35(1), 86-95, 2009. 60. Zhenfu Cao, Chuan I Chu, and Wai Chee Shiu. The exponontial Diophantine equation $AX^2 + BY^2 = \\lambda K^Z$ and its applications, Taiwanese Journal of Mathematics, 12(5), 1015-1034, 2008. 61. Xiaolei Dong, Zhenfu Cao, and Licheng Wang. New designing of cryptosystems based on quadratic fields, Science in China Series F, 51(8), 1106-1116, 2008. 62. Rongxing Lu, Xiaolei Dong, and Zhenfu Cao. Designing efficient proxy signature schemes for mobile communication, Science in China Series F, 51 (2), 183-195, 2008. 63. Shengbao Wang, Zhenfu Cao, Maurizio Adriano Strangio, and Lihua Wang. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol, IEEE Communications Letters, 12(2), 149-151, 2008. 64. Xiaodong Lin, Rongxing Lu, Pin-Han Ho, Xuemin(Sherman) Shen, and Zhenfu Cao. TUA: A novel compromise-resilient authentication architecture for wireless mesh networks, IEEE Transactions on Wireless Communications, 7(4), 1389-1399, 2008. 65. Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang. New (t, n) threshold directed signature scheme with provable security, Information Sciences, 178 (3), 756-765, 2008. 66. Xiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. Efficient and secure protocol in fair document exchange, Computer Standards & Interfaces, 30 (3), 167-176, MAR 2008. 67. Licheng Wang, Zhenfu Cao, Feng Cao. Haifeng Qian and Haiyong Bao. Biased bit commitment and applications, Journal of Information Science and Engineering, 24(2), 441-452, 2008. 68. Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, and Xiaohui Liang. A simple deniable authentication protocol based on the Diffie-Hellman algorithm, International Journal of Computer Mathematics, 85(9), 1315-1323, 2008. 69. Dazhi Sun and Zhenfu Cao. New cryptanalysis paradigm on a nonce-based mutual authentication scheme, International Journal of Network Security, 6(1), 116-120, 2008. 70. Shengbao Wang, Zhenfu Cao, and Feng Cao. Efficient identity-based authenticated key agreement with PKG forward secrecy, International Journal of Network Security, 7(2), 181-186, 2008. 71. Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang. A simple user authentication scheme for grid computing, International Journal of Network Security, 7(2), 202-206, 2008. 72. Shengbao Wang, Zhenfu Cao, and Haiyong Bao. Efficient certificateless authentication and key agreement (CL-AK) for grid computing, International Journal of Network Security, 7(3), 342-347, 2008. 73. Xiaolei Dong, W. C. Shiu, C. I. Chu, and Zhenfu Cao. The simultaneous Pell equations $y^2 - Dz^2 = 1$ and $x^2 - 2Dz^2 = 1$, Acta Arithmetica, 126(2), 115-123, 2007. 74. Rongxing Lu, Zhenfu Cao, and Xiaolei Dong. A new practical limited identity-based encryption scheme, Fundamenta Informaticae, 80(4), 461-474, 2007. 75. Dazhi Sun, Jinpeng Huai, Jizhou Sun, Zhenfu Cao. An efficient modular exponentiation algorithm against simple power analysis attacks, IEEE Transactions on Consumer Electronics, 53 (4): 1718-1723, 2007. 76. Licheng Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Simulatability and security of certificateless threshold signatures, Information Sciences, 177(6), 1382-1394, 2007. 77. Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiaochun Yun and Xiaoming Cheng. How to construct secure proxy cryptosystem, Information Sciences, 177(19), 4095-4108, 2007. 78. Zhenchuan Chai, Zhenfu Cao, and Xiaolei Dong. Efficient ID-based multi-receiver threshold decryption, International Journal of Foundations of Computer Science, 18(5), 987-1004, 2007. 79. Jun Shao, Zhenfu Cao, and Rongxing Lu. Improvement of Yang et al.'s threshold proxy signature scheme, Journal of Systems and Software, 80(2), 172-177, 2007. 80. Qin Wang and Zhenfu Cao. Identity-based proxy multi-signature, Journal of Systems and Software, 80(7), 1023-1029, 2007. 81. Rongxing Lu and Zhenfu Cao. Simple three-party key exchange protocol, Computers & Security, 26(1), 94-97, 2007. 82. Zhenchuan Chai, Zhenfu Cao, and Rongxing Lu. Threshold password authentication against guessing attacks in Ad hoc networks, Ad Hoc Networks, 5(7), 1046–1054, 2007.


83. Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun. A secure anonymous routing protocol with authenticated key exchange for Ad hoc networks, Computer Standards & Interfaces, 29(5), 521-527, 2007. 84. Rongxing Lu, Zhenfu Cao, and Haojin Zhu. An enhanced authenticated key agreement protocol for wireless mobile communication, Computer Standards & Interfaces, 29 (6), 647-652, 2007. 85. Rongxing Lu and Zhenfu Cao. Erratum to \
第十一届上海市政协委员、第十二届上海市政协常委。历任国际期刊Computers & Security 、Fundamenta Informaticae、Peer-to-Peer Networking and Applications、Security and Communication Networks、IEEE Transactions on Parallel and Distributed Systems和Wireless Communications and Mobile Computing等的副主编、编委或客座编辑,众多密码和安全及其相关方面权威国际会议的TPC主席或成员,国家自然科学基金专家评审组成员、国家自然科学奖评委、中国科学院杰出成就奖评委、国家重点实验室评估专家等。

相关热点

扫码添加好友