教师名录
邮箱:liuzhen@sjtu.edu.cn
所在研究所:量子计算研究所(筹)
教育背景
1995-09 至 1999-07 1946伟德国际源自英国 应用数学 学士
1999-09 至 2002-03 1946伟德国际源自英国 基础数学 硕士
2008-09 至 2013-06 1946伟德国际源自英国 计算机软件与理论 博士
2010-09 至 2013-06 香港城市大学 计算机科学 博士
工作履历
2024 至 今 1946伟德国际源自英国 1946伟德国际源自英国 长聘副教授
2016 至 2024 1946伟德国际源自英国 计算机科学与工程系 特别研究员、副教授、长聘教轨副教授
2015 至 2016 香港应用科技研究院 高级工程师
2013 至 2015 香港城市大学 博士后
教授课程
本科课程:
网络安全技术 (秋季学期)
区块链技术 (春季学期)
研究生课程:
可证明安全理论 (春季学期)
区块链技术 (秋季学期)
论文发表
1. Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, and Haojin Zhu, “HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation,” IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), (2024, Early Access), DOI: 10.1109/TDSC.2024.3520828.
2. Xingkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang, “MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients,” IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), (2024, Early Access), DOI: 10.1109/TDSC.2024.3449770.
3. Xin Yin, Zhen Liu, "A secure hierarchical deterministic wallet with stealth address from lattices," Theor. Comput. Sci. 1009: 114672 (2024).
4. Mingxing Hu, Weijiong Zhang, Zhen Liu, “An Improved Lattice-based Ring Signature with Unclaimable Anonymity in the Standard Model,” Comput. J., 66(10):2542-2553 (2023).
5. Jiachun Li, Weijiong Zhang, Yan Meng, Shaofeng Li, Lichuan Ma, Zhen Liu, Haojin Zhu, “Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network,” IEEE Trans. Veh. Technol. 72(8): 10682-10695 (2023).
6. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, Huaxiong Wang, Xiaorong Ke, Yining Liu, “Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” IEEE Transactions on Dependable and Secure Computing 19(5): 2934-2951 (2022).
7. Zhen Liu, Qiong Huang, and Duncan S. Wong, “On Enabling Attribute-Based Encryption to Be Traceable against Traitors,” Comput. J. 64(4): 575-598 (2021).
8. Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao, “All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application,” Comput. J. 62(8): 1148-1157 (2019).
9. Erdong Deng, Huajun Zhang, Peilin Wu, Fei Guo, Zhen Liu, Haojin Zhu, and Zhenfu Cao, “Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing,” Inf. Sci. 504: 354-371 (2019)
10. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and efficient scheme in Zerocash,” Computers & Security 86: 112-131 (2019).
11. Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, and Yu Long, “Fork-free hybrid consensus with flexible Proof-of-Activity,” Future Generation Comp. Syst. 96: 515-524 (2019).
12. Hao Wang, Zhen Liu, Zhe Liu, and Duncan S. Wong, “Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps,” Frontiers of Computer Science 10(4): 741-754 (2016).
13. Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen, “Time-Domain Attribute-based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach,” IEEE Transactions on Multimedia 18(5): 940-950 (2016).
14. Zhen Liu and Duncan S. Wong, “Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” Comput. J. 59(7): 983-1004 (2016).
15. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild,” IEEE Transactions on Information Forensics and Security 10(1): 55-68 (2015).
16. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “White-box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures,” IEEE Transactions on Information Forensics and Security 8(1): 76-88 (2013).
17. 葛钟慧,张奕,龙宇,刘振,刘志强,谷大武,“一种支持高并发的多人链下支付方案”,计算机学报,2021,44(1): 132-146.
18. 高政风,郑继来,汤舒扬,龙宇,刘志强,刘振,谷大武,“基于 DAG 的分布式账本共识机制研究”, 软件学报,2020,31(4):1124-1142.
19. 潘晨,刘志强,刘振,龙宇,“区块链可扩展性研究:问题与方法”,计算机研究与发展,2018, 55(10): 2099-2110.
1. Chunping Zhu, Xingkai Wang, Zhen Liu, “Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 19th International Conference on Information Security and Cryptology (Inscrypt 2023), pp. 44-64.
2. Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu, “RAI2: Responsible Identity Audit Governing the Artificial Intelligence,” The 30th Annual Network and Distributed System Security Symposium (NDSS 2023)
3. Shenwei Chen, Zhen Liu, Yu Long, and Dawu Gu, “DeChain: A Blockchain Framework Enhancing Decentralization via Sharding” The 27-th Australasian Conference on Information Security and Privacy (ACISP 2022), pp. 469-488.
4. Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen and Haojin Zhu, “Secure Hierarchical Deterministic Wallet Supporting Stealth Address,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 1, pp. 89-109.
5. Xingkai Wang, Zhenfu Cao, Zhen Liu, and Kaitai Liang, “ Lighter is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 2, 105-125.
6. Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, and Dawu Gu, “MixCT: Mixing Confidential Transactions from Homomorphic Commitment,” The 27th European Symposium on Research in Computer Security (ESORICS 2022), Part 3, 763-769.
7. Geng Wang, Ming Wan, Zhen Liu, Dawu Gu, “Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption,” In Proc. of the 17th International Conference on Information Security and Cryptology (Inscrypt 2021), pp. 421-441.
8. Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, and Yu Yu, “MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK),” The 26th European Symposium on Research in Computer Security (ESORICS 2021), Part 2, pp.332-351.
9. Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, and Yu Yu, “A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 25th European Symposium on Research in Computer Security (ESORICS 2020), Part 2, pp.357-377.
10. Zhen Liu, Khoa Nguyen, Guomin Yang, Duncan S. Wong, and Huaxiong Wang, “A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses,” In Proc. of the 24th European Symposium on Research in Computer Security (ESORICS 2019), Part 1, pp. 726 – 746, Springer, 2019.
11. Zhen Liu, Guomin Yang, Duncan S. Wong, Khoa Nguyen, and Huaxiong Wang, “Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key,” The 4th IEEE European Symposium on Security and Privacy (Euro S&P 2019), pp. 215-230, IEEE, 2019.
12. Geng Wang, Zhen Liu and Dawu Gu, “Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption,” The 21th International Conference on Information and Communications Security (ICICS 2019), pp. 378-396, Springer, 2019.
13. Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, and Ning Liu, “A Practical Dynamic Enhanced BFT Protocol,” 13th International Conference on Network and System Security (NSS 2019), pp. 288-304, Springer, 2019.
14. Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu and Dawu Gu, “Gnocchi: Multiplexed Payment Channels for Cryptocurrencies,” 13th International Conference on Network and System Security (NSS 2019), pp. 488-503, Springer, 2019.
15. Shuyang Tang, Yao Deng, Jilai Zheng, Zhiqiang Liu, Zhen Liu, Yu Long and Dawu Gu, “Towards a Multi-Chain Future of Proof-of-Space,” Securecomm (1) 2019, pp. 23-38, Springer, 2019.
16. Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu, “Making Monero Hard-to-Trace and More Efficient," TrustCom/BigDataSE 2019: 514-521
17. Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu, “A Secure and Practical Blockchain Scheme for IoT,” TrustCom/BigDataSE 2019: 538-545.
18. Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia, “TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility,” The 13th International Conference on Provable Security (ProvSec 2019), pp. 339-346, Springer, 2019.
19. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, and Dawu Gu, “Z-Channel: Scalable and Efficient Scheme in Zerocash,” The 23th Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 687-705, Springer, 2018.
20. Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, “Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol,” In Proc. of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 49-69, Springer, 2018.
21. Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, and Dawu Gu, “Dynamic Practical Byzantine Fault Tolerance,” 2018 IEEE Conference on Communications and Network Security (CNS 2018), pp. 1-8, IEEE, 2018.
22. Fengjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, and Ning Ding, “Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain,” 12th International Conference on Network and System Security (NSS 2018), pp. 1-15, Springer, 2018.
23. Zhen Liu, Duncan S. Wong, and Jack Poon, “Dealerless Corporate Key Generation for Identity-Based Encryption Schemes,” The 11th ACM on Asia Conference on Computer and Communications Security (ASIACCS 2016), pp. 211-222, ACM, 2016.
24. Zhen Liu and Duncan S. Wong, “Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable,” The 17th International Conference on Information and Communications Security (ICICS 2015), pp. 109-124, Springer, 2015.
25. Zhen Liu and Duncan S. Wong, “Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe,” In Proc. of the 13th International Conference on Applied Cryptography and Network Security (ACNS 2015), pp. 127 – 146, Springer, 2015.
26. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts,” In Proc. of the 10th International Conference on Information Security and Cryptology (Inscrypt 2014), pp. 403 – 423, Springer, 2014.
27. Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, and Xiao Tan, “Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage,” In Proc. of the 19th European Symposium on Research in Computer Security (ESORICS 2014), pp. 326 – 343, Springer, 2014.
28. Zhen Liu, Zhenfu Cao, and Duncan S. Wong, “Blackbox Traceable CP-ABE: How to Catch People Leaking Their Keys by Selling Decryption Devices on eBay,” In Proc. of the 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 475-486, ACM, 2013.
29. Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, and Chunming Tang, “A CCA-Secure Identity-Based Conditional Proxy Re-Encryption Without Random Oracles,” In Proc. of the 15th International Conference on Information Security and Cryptology (ICISC 2012), pp. 231-246, Springer, 2012.
30. Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, and Tsz Hon Yuen, “Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles,” In Proc. of the 16th European Symposium on Research in Computer Security (ESORICS 2011), pp. 278 – 297, Springer, 2011.
资助项目
1. "区块链应用场景下的新型数字签名研究",国家密码科学基金(面上项目),2025.1.1-2027.12.31,主持。
2. “面向区块链隐私保护的格密码方案研究”,国家自然科学基金(面上项目),2021.1.1-2024.12.31,主持。
3. “属性基加密中背叛者追踪问题的研究”,国家自然科学基金(面上项目),2017.1.1-2020.12.31,主持。
学术服务
中国密码学会区块链专委会委员