曾鹏
近期热点
资料介绍
个人简历
2009年9月毕业于上海交通大学计算机科学与工程系计算机软件与理论专业,获工学博士学位;2012年4月至2013年9月,国家公派访问丹麦技术大学(Technical University of Denmark)数学系(合作导师为IEEE Fellow Tom Holdolt教授)。2009年9月至今,在华东师范大学计算机科学与软件工程学院密码与网络安全系担任教学和科研工作。 2011年至今,主持科技部863计划(军口)项目、NSFC-浙江两化融合联合基金(重点项目)子课题、国家自然科学基金青年基金项目、教育部高等学校博士点基金(新教师类)项目等各一项,主持上海市自然科学基金项目两项;参与国家自然科学基金重点项目、国家自然科学基金委员会与丹麦国家研究基金会合作研究项目各一项,参与国家自然科学基金青年基金项目两项,参与上海市自然科学基金项目三项等。学术成果 (1)主持科研项目(国家级)1)NSFC-浙江两化融合联合基金项目(重点项目)子课题,面向工业供需链的云计算安全,2016.1.1-2019.12.31。2)科技部863计划(军口),******应用技术,2015.7.1-2016.6.30。3)国家自然科学基金青年基金项目,无线传感器网络中的广播认证技术研究,2012.1.1-2014.12.31。 (2)参与科研项目(国家级)1)国家自然科学基金重点项目,面向大数据系统的安全计算,2017.1.1-2021.12.31。2)国家自然科学基金青年基金项目,恶意软件静态分析与检测关键技术研究,2015.1.1-2017.12.31。3)国家自然科学基金青年基金项目,身份基和无证书认证非对称群密钥协商的研究,2013.1.1-2015.12.31。4)国家自然科学基金委员会与丹麦国家研究基金会合作研究项目,代数几何在编码理论与密码学中的应用,2011.1.1-2013.12.31。研究领域
公钥密码学、抗量子攻击密码、智能电网安全、云计算安全、大数据安全、隐私保护""近期论文
1)Chengju Li and Peng Zeng*, Constructions of linear codes with one-dimensional hull, IEEE Transactions on Information Theory, DOI 10.1109/TIT.2018.2863693. (SCI, EI, CCF A)2)Zuming Shen and Peng Zeng*, An RFID path authentication protocol based on Chebyshev polynomials, ATCI-2018, Accepted. (EI)3)Yuyin Qian and Peng Zeng*, An efficient authentication protocol for RFID-based supply chains, ATCI-2018, Accepted. (EI)4)Yuyin Qian, Peng Zeng*, Zuming Shen, and Kim-Kwang Raymond Choo, A Lightweight Path Authentication Protocol for RFID-based Supply Chains, in: Proceedings of the 2018 17th IEEE International Conference on Trust, Security And Privacy in Computing And Communications, (TrustCom-2018), New York, USA, Aug. 1-3, 2018: 1297-1302, Sep. 6, 2018. (EI, CCF C)5)Shanshan Ge, Peng Zeng*, Rongxing Lu, and Kim-Kwang Raymond Choo, FGDA: Fine-grained data analysis in privacy-preserving smart grid communications, Peer-to-Peer Networking and Applications, Sep. 1, 2018, 11(5): 966-978. (SCI, EI, CCF C)6)Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Xiaolei Dong, Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols, The Computer Journal, April 1, 2018, 61(4): 545–560. (SCI, EI, CCF B)7)Zuming Shen, Peng Zeng*, Yuyin Qian, and Kim-Kwang Raymond Choo, A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials, IEEE Access, Feb. 27, 2018, 6(1): 14560-14566. (SCI, EI, 中科院2区)8)Bofeng Pan and Peng Zeng*, A New Multidimensional and Fault-Tolerable Data Aggregation Scheme for Privacy-Preserving Smart Grid Communications, in: Proceedings of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, (ATCI-2017), Ningbo, China, June 16-18, 2017: 206-219, Oct. 21, 2017. (EI)9)Shanshan Ge, Peng Zeng*, and Kim-Kwang Raymond Choo, An Enhanced Anonymous Identification Scheme for Smart Grids, in: Proceedings of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, (ATCI-2017), Ningbo, China, June 16-18, 2017: 329-337, Oct. 21, 2017. (EI)10)Guomin Zhou, Peng Zeng*, Xiaohui Yuan*, Siyuan Chen, and Kim-Kwang Raymond Choo, An efficient code-based threshold ring signature scheme with a leader-participate model, Security and Communication Networks, August 2017, Volume 2017 (2017), Article ID 1915239, 7 pages. (SCI, EI, CCF C)11)Bofeng Pan, Peng Zeng*, and Kim-Kwang Raymond Choo, An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability, in: Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, June 28-30, 2017: 677-688, July 6, 2017. (EI)12)Siyuan Chen, Peng Zeng*, and Kim-Kwang Raymond Choo, A provably secure blind signature based on coding theory, in: Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016) , Wuhan, China, Dec. 13th -16th , 2016: 376-382, Jan. 19, 2017. (EI, CCF C)13)Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Qin Wang, An efficient ring signature scheme based on syndrome decoding problem, in: Proceedings of the 12th International Conference on Computational Intelligence and Security (CIS 2016), Wuxi, China, Dec. 16th – 19th , 2016: 228-232, Jan. 19, 2017. (EI)14)Ya Gao, Peng Zeng*, Kim-Kwang Raymond Choo, and Fu Song, An Improved Online/Offline Identity-based Signature Scheme for WSNs, International Journal of Network Security, Nov. 2016, 18(6): 1143-1151. (EI)15)Shengbao Wang, Peng Zeng*, Kim-Kwang Raymond Choo, and Hongbing Wang, A CCA2-Secure Multi-Decrypter Encryption Scheme without Random Oracles, Informatica, Sep. 2015, 26(3): 543-556. (SCI)16)Tom Hoholdt, Fernando Pinero, and Peng Zeng*, Optimal Codes as Tanner Codes with Cyclic Component Codes, Designs, Codes and Cryptography, July 2015, 76(1): 37-47. (SCI, EI, CCF B)17)Ya Gao, Peng Zeng*, and Kim-Kwang Raymond Choo, Multi-Sender Broadcast Authentication in Wireless Sensor Networks, in: proceedings of the 2014 10th International Conference on Computational Intelligence and Security (CIS 2014), IEEE Press, Yunnan Province, China, Nov. 15th -16th, 2014: 633-637, Jan. 22, 2015. (EI)18)Hongbing Wang, Peng Zeng*, and Kim-Kwang Raymond Choo, MDMR-IBE: Efficient Multiple Domain Multi-Receiver Identity-Based Encryption, Security and Communication Networks, Nov. 2014, 7(11): 1641-1651. (SCI, EI, CCF C)19)Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, and Peng Zeng, Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security, Information Sciences, July 2014, 272: 223-237. (SCI, EI, CCF B、中科院2区)20)Tom Høholdt, Fernando Pi˜nero, and Peng Zeng*, Some optimal codes as Tanner codes with BCH component codes, in: Proceedings of the 19th Conference on Applications of Computer Algebra, Spain, July 2nd - 6th, 2013: 122-126, 2013.21)Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Peng Zeng, Jianwei Liu, Ruiying Du, A generic construction of proxy signatures from certificateless signatures, in: proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, Spain, Mar. 25th - 28th, 2013: 259-266, 2013. (EI)22)Shengbao Wang, Qi Xie, Qiang Tang, Peng Zeng*, and Wei Chen, A two-party combined cryptographic scheme and its application, Chinese Journal of Electronics, Oct. 2012, 21(4): 687-691. (SCI, EI)23)Peng Zeng, Zhenfu Cao, and Kim-Kwang Raymond Choo, An ID-based digital watermarking protocol for copyright protection, Computers & Electrical Engineering, July 2011, 37(4): 526-531. (SCI, EI)24)Peng Zeng, Zhenfu Cao, and Huang Lin, Analysis and enhancement of a watermarking protocol for web context, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 392-396. (EI)25)Peng Zeng, Zhenfu Cao, and Huang Lin, A new buyer-seller watermarking protocol without double embedding, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 397-402. (EI)26)Peng Zeng, Kim-Kwang Raymond Choo, and Da-Zhi Sun, On the security of an enhanced novel access control protocol for wireless sensor networks, IEEE Transactions on Consumer Electronics, May 2010, 56(2): 566-569. (SCI, EI)27)Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang, Security weakness in a dynamic program update protocol for wireless sensor networks, IEEE Communications Letters, June 2009, 13(6): 426-428. (SCI, EI)28)Peng Zeng, Zhenfu Cao, Kim-Kwang Raymond Choo, and Shengbao Wang, On the anonymity of some authentication schemes for wireless communications, IEEE Communications Letters, Mar. 2009, 13(3): 170-171. (SCI, EI)29)Licheng Wang, Zhenfu Cao, Peng Zeng, and Xiangxue Li, One-more matching conjugate problem and security of braid-based signatures, in: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ACM Press, Singapore, Mar. 20-22 , 2007: 295-301, 2007. (CCF C)多个国际/国内期刊、会议审稿人。 相关热点