您当前所在的位置:首页 > 团队队伍 > 教师名录

教师名录

龙宇
副教授

邮箱:longyu@sjtu.edu.cn

所在研究所:信息安全与密码学研究所

个人简介

龙宇,女,1980年10月生。2008年2月在上海交大计算机系获计算机系统结构博士学位。同期受聘进入1946伟德国际源自英国计算机系工作,2016年起任副教授、博导。2012年6月至2013年6月受邀访问巴黎高等师范公司(ENS)计算机系。长期从事公钥密码学、区块链、信息安全、可信计算及云计算安全等领域的研究,取得了较好的成绩。目前为止在国内外知名学术期刊及会议上发表文章70余篇,申请专利11项。近年来,其研究重点为及密码学及在区块链安全协议中应用。作为项目负责人或骨干成员主持和参与了一系列国家/省部级重点科研项目,代表性项目包括:

① 针对区块链相关的科研及应用方面:上海市科委项目《基于区块链技术的数据全生命周期完整性保护技术研究》项目(2019-2021)、教育部高等公司区块链创新行动计划《基于区块链的新型监管体系关键技术研究》(2020-2022)、中国工程院《中国区块链战略发展研究》(2021)、山东省重点研发计划《大规模分布式区块链安全协同技术》(2022-2024)、上海市科委项目《面向复杂开源联盟链间多层次跨链需求的安全隐私跨链技术研究》(2024-2025)等。

② 针对密码算法和协议的设计与证明:“新型功能加密体制中的关键问题研究”(国家自然科学基金,2016)、“网络环境下可证明安全分布式公钥加密体制的研究”(国家自然科学基金,2010)、“面向真实网络环境的分布式公钥加密体制的基础问题研究”(博士点基金,2010)、“云计算环境下数据安全基础问题研究”(国家自然科学基金重点项目、2012)、“密码算法基础理论研究”(国家“973”计划项目,2007-2011)等。



教育背景

Sep 2004 - Feb 2008, Doctor’s 
   Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China 
   Supervisors: Prof. Kefei Chen 
   Doctoral Dissertation: The Formal Study of Secure Threshold Cryptographic schemes
Sep 2002 - March 2005, Master’s 
   Department of Information Security Engineering , Shanghai Jiao Tong University, Shanghai, China 
   Supervisor: Prof. Zhenfu Cao 
   Master Thesis: Research of Threshold Key Escrow 
Sep 1998-Jul 2002, B.S. 
   Department of Computer and Communication Engineering, SouthWest Jiao Tong University, Chengdu, China

工作履历

Jan 2016-, Associate Professor, Shanghai Jiao Tong Uniersity

Feb 2008- Dec 2015, Research Assitant, Shanghai Jiao Tong University

June 2012-June 2013,  Visiting Researcher, ENS, France

Sep 2008- Mar 2009, Visiting Researcher, IBM Chinese Research Center


教授课程

2009-now, spring term/autumn term, for master of CS, Cryptography algorithm and protocol

2015-2017,  spring term/autumn term,  for master of CS, 计算机安全学

2013-now, autumn term,  for undergraduates, Basics of Computer Security and Cryptography

2013-now, spring term/autumn term, for undergraduates of CS / IEEE class/ Zhiyuan honored class, Discrete  Mathematics


论文发表

1. Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shi-Feng Sun, Dawu Gu. Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols[C]. In the 30th Australasian Conference on Information Security and Privacy (ACISP), July 2025. 

2. Haojun Zhai, Chenke Wang, Yu Long, Xian Xu, Dawu Gu. Secure Threshold Wallet Supporting Full Stealth Address[C]. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC), June 2025.

3. Zhonghui Ge, Chenke Wang, Yu Long, Dawu Gu, Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing, IEEE Transactions on Dependable and Secure Computing, TDSC 2024. 

4. BlindShuffler: Universal and Trustless Mixing for Confidential Transactions, Chenke Wang, Zhonghui Ge, Yu Long, Xian Xu, Shifeng Sun*, Dawu Gu*, AsiaCCS 2024.

5. FaBFT: Flexible Asynchronous BFT Protocol Using DAG, Yu Song, Yu Long, Xian Xu, Dawu Gu, INSCRYPT

6. Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs, Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu, ACM CCS 2023.

7. Magma: Robust and Flexible Multi-Party Payment Channel, Zhonghui Ge, Yi Zhang, Yu Long*, Dawu Gu*, IEEE TDSC 2023.

8. MixCT: Mixing Confidential Transactions from Homomorphic Commitment, Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu, ESORICS 2022.

9. UCC: Universal and Committee-based Cross-chain Framework, yizhang, zhonghui ge, yu long, dawu gu. ISPEC 2022

10. Shenwei Chen, Zhen Liu, Yu Long and Dawu Gu, DeChain: A Blockchain Framework Enhancing Decentralization via Sharding, ACISP 2022.

11. Yu Song, Guoshun Fan, Yu Long, Zhen Liu, Xian Xu, Dawu Gu, Grape: Efficient Hybrid Consensus Protocol Using DAG, DPM 2022/CBT 2022.

12. Zhonghui Ge, Yi Zhang, Yu Long and Dawu Gu, Shaduf: Non-Cycle Payment Channel Rebalancing, NDSS 2022.

13.  Chunliang Chen, LiangliangWang, Yu Long, yiyuan Luo, Kefei Chen, A blockchain-based dynamic and traceable data integrity verification scheme for smart homes, Journal of Systems Architecture, 2022

14. 霍鑫磊,龙宇,谷大武,一种基于联盟链的兼具授权监管与隐私保护方案,小型微型计算机系统,2021

15. 葛钟慧,  张奕,龙宇,刘振,刘志强,谷大武, 一种支持高并发的多人链下支付方案,计算机学报,2021

16. 高政风,郑继来,汤舒扬,龙宇,刘志强,刘振,谷大武,基于 DAG 的分布式账本共识机制研究, 软件学报。2020

17. 蔡晓晴,邓尧,张亮,史久琛,陈全,郑文立,刘志强,龙宇,王堃,李超,过敏意, 区块链原理及其核心技术,计算机学报,2021

18. Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu and Ning Liu,  A Practical Dynamic Enhanced BFT protocol,NSS 2019,NSS

19. Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu and Dawu Gu, Gnocchi: Multiplexed Payment Channels for Cryptocurrencies,NSS 2019, 

20. Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu,Feihuan,yanxue Jia, TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility,  ProvSec 2019.

21. Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu,  A Secure and Practical Blockchain Scheme for IoT, IEEE Trustcom 2019

22. Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Making Monero Hard-to-Trace and More Efficient, IEEE Trustcom 2019, Trustcom 2019

23. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu, Z-Channel: Scalable and Efficient Scheme in Zerocas, Computers & Security ,special issue on Blockchain and Cryptocurrency ,2019

24. Zhiqiang Liu, Shuyang Tang, Sherman Chow, Zhen Liu, Yu Long , Fork-Free Hybrid Consensus with Flexible Proof-of-Activity, Future Generation Computer Systems, 2019

25. Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu and Yu Yu. Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol, INSCRYPT 2018

26. Long Yu; Wang Xin; Xu Xian; Hong Xuan, Highly-descriptive chain of trust in trusted computing, 清华大学学报(自然科学版), 2018 

27. Huige Wang, Kefei Chen, Joseph Liu, Ziyuan Hu, Yu Long, Access Control Encryption with Efficient Verifiable Sanitized Decryption, Information Sciences, V. 465, pp. 72-85, 2018

28. 潘晨,刘志强,刘振,龙宇. 区块链可扩展性研究:问题与方法,计算机研究与发展,2018. 

29. Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu, Z-Channel: scalable and efficient scheme in zerocash, ACISP 2018.

30. Fenjun Chen, Zhiqiang Liu, Yu Long, Zhen Liu, Secure Scheme Against Compromised Hash in Proof-of-work Blockchain, NSS 2018.

31. Xu Hao, Long Yu, Liu Zhiqian, Liu Zhen, Dynamic practical byzantine fault tolerance. IEEE CNS 2018.

32. Liangliang Wang, Kefei Chen, Yu Long, HuigeWang, An efficient pairing-free certificateless signature scheme for resource-limited systems, Science China information Sciences.

33. Liangliang Wang, Kefei Chen, Yu Long and Huige Wang. Cryptanalysis of a certificateless aggregate signature scheme. Security and Communication Networks, 2016.

34. Liangliang Wang, Junzuo Lai, Hu Xiong, Kefei Chen, Yu Long: Fuzzy certificateless signature. Security and Communication Networks 2016.

35. Huige Wang,Kefei Chen,Yu Long,J Ye,Liangliang Wang,A new randomized message-locked encryption in the standard model,Peer-to-Peer Networking and Applications, 2016.

36. Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, A new RSA-based proxy re-encryption scheme, Journal of Computational Information Systems.

37. Liangliang Wang, Kefei Chen, Yu Long, Xianping Mao, A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings, International Conference on Intelligent Networking & Collaborative Systems 2015. 

38. Jianhong Chen, Yu Long, Kefei Chen, Attribute-based parallel key insulated signature, Cybernetics and Information Technologies, 2015. 

39. X Mao,K Chen,L Wang,Y Long, On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme,2014 International Conference on Intelligent Networking and Collaborative Systems (INCOS 2014) 

40. Xianping Mao,Kefei Chen, Yu Long, Liangliang Wang, Attribute base signature on Lattice, Journal of Shanghai Jiaotong University ,2014,19(4):406-411 

41. Yu Long, Kefei Chen, XianpingMao, New Constructions of Dynamic Threshold Cryptosystem, Journal of Shanghai Jiaotong University ,2014,19(4):431-435

42. Jianhong Chen, Yu Long, Kefei Chen, Attribute-based Key Insulated Signature and Its Applications, Information Sciences, Available online 18 February 2014.

43. Yongtao Wang, Kefei Chen, Yu Long, Accountable Authority Key Policy Attribute-based Encryption, SCIENCE CHINA, Vol. 55, No. 7: 1631-1638, 2012.

44. Xuan Hong, Yu Long, A Novel Unidirectional Proxy Re-Signature Scheme and Its Application for MANETS, Journal of Computers, Vol. 7, No. 7: 1796-1800, 2012.

45. 陈剑洪, 陈克非, 龙 宇, 万中美, 于 坤, 孙成富, 陈礼青,密文策略的属性基并行密钥隔离加密,软件学报,第23卷, 第10期, 页码:2795-2804页,2012.

46. Yu Long, Xian Xu, Kefei Chen, Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG, 计算机研究与发展, Vol. 49, No. 5: 932-938, 2012.

47. Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan, Identity Based Key Insulated Signcryption, INFORMATICA, Vol. 23, No. 1: 27-45, 2012.

48. 徐贤,龙宇,基于TPM的强身份认证研究,计算机工程,第38卷,第4期,23-27页,2012.

49. Shengli Liu, Yu Long, Kefei Chen, Key Updating Technique in Identity-based Encryption,Information Sciences, Vol. 181: 2436–2440, 2011.

50. Jianhong Chen, Yu Long, Kefei Chen, Yongtao Wang, Identity Based Key Insulated Proxy Signature without Random Oracles, Journal of Shanghai Jiao Tong University, Vol. 16, No. 5: 557-566, 2011.

51. Weidong Qiu, Zheng Gong, Bozhong Liu, Yu Long, Kefei Chen, Restrictive partially blind signature for resource-constrained information systems, Knowledge Information Systems, Vol. 26:87–103, 2011.

52. Chen Jianhong, Long Yu, Chen Kefei, Wang Yongtao, Li Xiangxue, An Efficient Threshold Key-Insulated Signature Scheme, Journal of Shanghai Jiao Tong University, Vol. 16, No. 6: 658-662, 2011.

53. Yu Long, Kefei Chen, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Information Sciences, Vol. 80, No. 7: 1167-1181, 2010. 

54. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Practical Certificateless Aggregate Signatures from Bilinear Maps, Journal of Information Science and Engineering, Vol. 26: 2093-2106, 2010.

55. Mi Wen, Zhi Yin, Yu Long, Yong Wang, An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks, Wireless Sensor Network, Vol. 2: 689-697, 2010.

56. Long Yu, Li Xiangxue, Chen Kefei, Hong Xuan, Distributed Certificateless Key Encapsulation Mechanism Secure Against the Adaptive Adversary, Journal of Shanghai Jiao Tong University, Vol. 14, No. 1: 102-107, 2009.

57. Yu Long, Zheng Gong, Kefei Chen, Shengli Liu, Provably Secure Identity-based Threshold Key Escrow from Pairing, International Journal of Network Security, Vol. 8, No. 3: 227-234, 2009.

58. Zhong-mei WAN, Xue-jia LAI, Jian WENG, Sheng-li LIU, Yu LONG, Xuan HONG, Certificateless key-insulated signature without random oracles, Journal of Zhejiang University  (Science A), Vol. 10, No. 12: 1790-1800, 2009.

59. Hong Xuan, Chen Kefei, Long Yu, Universally Composable Proactive Threshold RSA Signature Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 659-663, 2008.

60. Wan Zhong mei, Lai Xue-jia, Weng Jian, Hong Xuan, Long Yu, Jia Wei Wei,On Constructing Certificateless Proxy Signature From Certificateless Signature,Journal of Shanghai Jiao Tong University, Vol. 13, No. 6: 692-694, 2008.

61. Yu Long, Kefei Chen, Certificateless Threshold Cryptosystem Secure Against Chosen-Ciphertext Attack, Information Sciences, Vol. 177: 5620-5637, 2007. 

62. Long Yu, Chen Kefei, Gong Zheng, Efficient Chosen-Ciphertext Secure Certificateless Threshold Key Encapsulation Mechanism, Proceeding of the China Cryptography Conference 2007. 

63. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Adaptive Chosen-Ciphertext Attack, Computers and Electrical Engineering, Vol. 33: 166-176, 2007.

64. Z. Gong, Yu Long, K.F. Chen, Efficient Partially Blind Signature from LFSR, SNPD 2007, Vol. 2: 717-722, Qindao, China.

65. Zheng Gong, Yu Long, Xuan Hong, Kefei Chen, Two Certificateless Aggregate Signatures From Bilinear Maps. SNPD 2007, Vol. 3: 188-193, Qindao, China.

66. Yu Long, Kefei Chen, Shengli Liu, Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing, INFORMATICA, Vol. 17, No. 4: 519-534, 2006.

67. Yu Long, Li Shiqun, Liu Shengli, Chen Kefei, How to Construct Provably Secure ID-based Mediated Threshold Cryptosystems without Key Escrow, Proceeding of the China Cryptography Conference 2006. 

68. Yu Long, Chen Kefei, Hong Xuan, A New Chosen Ciphertext Secure ID-Based Threshold Decryption Scheme from Pairing, Chinese Journal of Computers, Vol.29. No.9: 1679-1687, 2006. 

69. Yu Long, Kefei Chen, Construction of Dynamic Threshold Decryption Scheme from Pairing, International Journal of Network Security, Vol. 2, No.2: 111–113, 2006. 

70. Yu Long, Kefei Chen, Shengli Liu, ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack, Journal of Shanghai Jiao Tong University (Science), Vol. E-11, No. 2: 127-133, 2006. 

71. Yu Long, Zhenfu Cao, Kefei Chen, A Dynamic Threshold Commercial Key Escrow Scheme Based on Conic, Applied Mathematics and Computation, Vol. 171, No. 2: 972-982, 2005.