张福泰

发布时间:2021-04-08浏览次数:1095


张福泰:男,汉族2001年在西安电子科技大学获得密码学博士学位。现为福建师范大学教授,中国密码学会理事、密码算法专委会及组织委员会委员,密码学报编委。  

 

联系方式:futai@fjnu.edu.cn, ffttzhang@sina.com

 

主要科研项目

1. 国家自然科学基金面上项目,61572198,车载网和车载云中信息安全与隐私保护关键技术研究, 2016/01-2019/1278.8万,已结题,参加

2. 国家自然科学基金青年基金,61502237,云存储中基于无证书加密的数据机密性保护与访问控制,2016/01-2018/1220万元,已结题,参加

3. 国家自然科学基金面上项目, 61170298, 具有泄漏弹性的基于身份的和无证书的密码体制, 2012/01-2015/12, 57万元,已结题, 主持

4. 国家自然科学基金面上项目, 60673070, 高效无证书密码体制及其应用, 2007/01-2009/12, 26万元,已结题, 主持

5. 江苏省自然科学基金项目, BK2006217, 无证书密码体制基础理论研究, 2006/09-2008/12, 7.5万元,已结题, 主持

6. 江苏省高校自然科学研究计划重点项目, 03KJA520066, 可验证秘密分享及其应用, 2003/09-2005/12, 7.5万元,已结题, 主持

7. 国家自然科学基金面上项目,同态签名的聚合及其应用(61672289)2017.01-2020.1264万,已结题,主持

8. 江苏省重点研发计划 基于加密SD卡的移动支付安全中间件研发及示范应用   2011-09-01--2014-08-01  已结题,参加。

 

主要学术论文

1.   Yumei Li, Futai Zhang *, Yinxia Sun. Lightweight Certificateless Linearly Homomorphic Network Coding Signature scheme for Electronic Health System. IET Information Security, 2021, 15(1): 131-146. DOI10.1049/ise2.12011.

2.  Yumei Li, Futai Zhang, Liu Xin. Secure Data Delivery with Identity-based Linearly Homomorphic Network Coding Signature Scheme in IoT. IEEE Transactions on Services Computing, Doi: 10.1109/TSC.2020.3039976, 2020.

3.  Jie Zhang, Futai Zhang*, Xin Huang; Xin Liu. Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Transactions on Dependable and Secure Computing, Doi: 10.1109/TDSC.2020.2967703, http://dx.doi.org/10.1109/TDSC.2020.2967703, 2020.

4.  Ge Wu, Futai Zhang*, Limin Shen, Fuchun Guo, Willy Susilo. Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences, 2020, 514: 288-301.

5.  Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo, Futai Zhang. Threshold privacy-preserving cloud auditing with multiple uploaders. International Journal of Information Security, 2019, 18: 321–331.

6.  Yinxia SunFutai ZhangAnmin Fu. Revocable Certificateless Encryption with Ciphertext Evolution. ACISP 2018: 741-749.

7.  Limin Shen,  Futai Zhang, Yinxia Sun, Jianfeng Ma. An efficient revocable ID-based encryption scheme in the standard model. International Journal of Embedded Systems2017, 9(2): 168-176.

8. 李素娟, 张明武, 张福泰. (持续)辅助输入cca安全的pke构造方案的分析及改进. 计算机学报, 2017, 40(106) : 1-13.

9.  Yanhong Liu, Futai Zhang*, Jie Zhang. Attacks to some verifiable multi-secret sharing schemes and two improved schemes. Information Sciences, 2016, 329: 524–539.

10. Jie Zhang, Futai Zhang*. Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications. Future Generation Computer Systems, 2015, 52: 109-115.

11. 孙银霞, 张福泰, 沈丽敏. 抗签名密钥泄露的可撤销无证书签名. 软件学报, 2015, 26(12): 3196−3203.

12.Yinxia Sun, Futai Zhang, Limin Shen. Efficient revocable certificateless encryption against decryption key exposure. IET Information Security, 2015, 9 (3): 158-166.

13. Wenjie Yang, Futai Zhang*, Limin Shen. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Security and Communication Networks, 2014, 7(2): 445-454.

14. Futai Zhang*, Limin Shen, Ge Wu. Notes on the security of certificateless aggregate signature schemes. Information Sciences, 2014, 287(2): 32–37. DOI: 10.1016/j.ins.2014.07.019.

15. Futai Zhang, Jie Zhang. Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups. Chinese Journal of Electronics, 2014, 23(1): 13-17.

16. Limin Shen, Futai Zhang, Yinxia Sun. Efficient revocable certificateless encryption secure in the standard model. Computer Journal, 2014, 57(4): 592-601.

17. Sujuan Li, Futai Zhang. Efficient leakage-resilient public key encryption from DDH assumption. Cluster Computing, 2013, 16(4): 797-806.

18. Songqin Miao, Futai Zhang*, Sujuan Li, Yi Mu. On security of a certificateless signcryption scheme.Information Sciences, 2013, 232(5): 475-481.

19. 刘艳红, 张福泰. 不需要安全信道的空间有效秘密分享方案. 计算机学报, 2012, 35(9): 1816-1822.

20. 张福泰*, 孙银霞,      ,   耿曼曼,   李素娟. 无证书公钥密码体制研究. 软件学报, 2011, 22(6): 1316-1332.

21. Hong Yuan, Futai Zhang*, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang. Certificateless threshold signature scheme from bilinear maps. Information Sciences, 2010, 180(23): 4714-4728.

22. Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer. Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020-1030.

23. Futai Zhang*, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang. Cryptanalysis on Two Certificateless Signature Schemes. International Journal of Computers, Communications & Control, 2010, 2010(4): 586-591.