网络空间安全系教师简历

张跃欣

发布时间:2021-03-26浏览次数:1551

个人简介

张跃欣,男,汉族,19874月生,内蒙古包头人,现为福建师范大学数学与信息学院副教授。自2010年以来主要从事安全密钥协商方面的研究,在ESORICSACM\IEEE Transactions等国际学术会议和期刊上发表学术论文30余篇,主持国家自然科学青年基金1项。


联系方式

电子邮箱:zhangyuexin87@hotmail.com; yxzhang@fjnu.edu.cn


主持科研项目

国家自然科学青年科学基金项目,61902289,物联网环境下设备间密钥协商协议研究,2020/01-2022/1226万元,在研,主持


论文列表

期刊论文 (20):

1. Shisen Fang, Shaojun Yang, and Yuexin Zhang(张跃欣). Inner product encryption from ring learning with errors, Cybersecurity 3, no. 1 (2020): 1-11, 2020.

2. Xinyi Huang and Yuexin Zhang(张跃欣), “Indistinguishability and Unextractablility of Password-based Authentication in Blockchain”, Future Generation Computer Systems, Volume 112, pp. 561-566, 2020.

3. Feng Wang, Li Xu, Kim-Kwang Raymond Choo, Yuexin Zhang(张跃欣), Huaqun Wang, and Jiguo Li, Lightweight certificate-based public/private auditing scheme based on bilinear pairing for cloud storage, IEEE Access,  Volume 8(1), pp. 2258-2271, 2020.

4. Mahdi Dibaei, Xi Zheng, Kun Jiang, robert Abbas, Shigang Liu, Yuexin Zhang(张跃欣), Yang Xiang, and Shui Yu, “Attacks and Defences on Intelligent Connected Vehicles: A Survey”, Digital Communications and Networks, accepted on 7th November 2019.

5.Yuexin Zhang(张跃欣), Xinyi Huang, Xiaofeng Chen, Leo Zhang, Jun Zhang, and Yang Xiang, “A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle”, IEEE Internet of Things Journal. Volume 7(2), pp. 1061-1071, 2020.

6. Yuexin Zhang(张跃欣), Hong Zhao, Yang Xiang, Xinyi Huang, and Xiaofeng Chen, A Key Agreement Scheme for Smart Homes Using the Secret Mismatch Problem, IEEE Internet of Things Journal. Volume 6(6), pp. 10251 - 10260, 2019.

7. Fei Zhu, Wei Wu, Yuexin Zhang(张跃欣), and Xiaofeng Chen, Privacy-Preserving Authentication for General Directed Graphs in Industrial IoT. Information Sciences, Volume 502, pp. 218-228, 2019.

8. Min Wang, Yuexin Zhang(张跃欣), Jinhua Ma, and Wei Wu. “A Universal Designated Multi Verifiers Content Extraction Signature Scheme”. International Journal of Computational Science and Engineering. Volume 21(1), 49-59, 2020.

9. Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang(张跃欣), and Yang Xiang. “Block Design-based Key Agreement for Group Data Sharing in Cloud Computing”. IEEE Transactions on Dependable and Secure Computing. Volume 16(6), pp. 996 - 1010, 2019.

10. Yuexin Zhang(张跃欣), Yang Xiang, Xinyi Huang, Xiaofeng Chen, and Abdulhameed Alelaiwi. “A Matrix-Based Cross-Layer Key Establishment Protocol for Smart Homes”. Information Sciences. Volume 429, pp. 390-405, 2018.

11.Yuexin Zhang(张跃欣), Yang Xiang, Wei Wu, and Abdulhameed Alelaiwi. A Variant of Password Authenticated Key Exchange Protocol. Future Generation Computer Systems. Volume 78(2), pp. 699-711, 2018.

12.Yuexin Zhang(张跃欣), Yang Xiang, Tao Wang, Wei Wu, Jian Shen. “An Over-the-Air Key Establishment Protocol Using Keyless Cryptography”. Future Generation Computer Systems. Volume 79, pp. 284-294, 2018.

13. Yuexin Zhang(张跃欣), Yang Xiang, and Xinyi Huang. “Password-Authenticated Group Key Exchange: A Cross-Layer Design”. ACM Transactions on Internet Technology (TOIT). Volume 16(4), pp. 24:1-24:20, 2016.

14. Ayong Ye, Yongxing Zheng, Li Xu, Yuexin Zhang(张跃欣). “A Road-Network based Privacy-Preserving Approach in Trajectory Publishing”. Journal of Internet Technology. Volume 18(4), pp. 867-876, 2017.

15. Yuexin Zhang(张跃欣), Li Xu, Yang Xiang, and Xinyi Huang. “A Matrix-based Pairwise Key Establishment Scheme for Wireless Mesh Networks Using Pre-Deployment Knowledge”. IEEE Transactions on Emerging Topics in Computing. Volume 1, pp. 331-340, 2013.

16. Yuexin Zhang(张跃欣), Li Xu, Xinyi Huang, and Jie Li. “Matrix-based Key Pre-distribution Scheme in WMNs Using Pre and Post Deployment Knowledge”. International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC).  Volume 20(4), pp. 262-273, 2015.

17. Li Xu and Yuexin Zhang(张跃欣). “Matrix-based Pairwise key Establishment for Wireless Mesh Networks”. Future Generation Computer Systems. Volume 30, pp. 140-145, 2014. [Corresponding author]

18. Xi Cao, Li Xu, Yuexin Zhang(张跃欣), and Wei Wu. “Software Service Signature (S3) for Authentication in Cloud Computing”. Cluster Computing: The Journal of Networks, Software Tools and Applications. Volume 16, pp. 905-914, 2013.

19. Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, and Yuexin Zhang(张跃欣). “Provably Secure Certificate-based Key-Insulated Signature Scheme”. Concurrency and Computation: Practice and Experience. Volume 26, pp. 1546-1560, 2014.

20. Yuexin Zhang(张跃欣), Li Xu, and Xinyi Huang. “Polynomial-based Key Pre-distribution Scheme in Wireless Mesh Networks”. Journal of Computational Information System. Volume 8, pp. 2539-2550, 2012.

会议论文 (11):

1. Hong Zhao, Yuexin Zhang(张跃欣), Xinyi Huang, Yang Xiang, An Adaptive Physical Layer Key Extraction Scheme for Smart Homes. The 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-19), pp. 499-506, 2019. [Corresponding author, best paper award]

2. Hong Zhao, Yuexin Zhang(张跃欣), Xinyi Huang, and Yang Xiang. “An Adaptive Secret Key Establishment Scheme in Smart Home Environments”. IEEE International Conference on Communications (ICC’19), pp. 1-6, 2019. [Corresponding author]

3. Fei Zhu, Yuexin Zhang(张跃欣), Chao Liu, and Wei Wu. “A Universal Designated Multi-Verifier Transitive Signature Scheme”, The 13th International Conference on Information Security and Cryptology (INSCRYPT 2017), pp. 151-163, 2017. [best student paper award]

4. Yuexin Zhang(张跃欣), Yang Xiang, and Xinyi Huang. “A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems”. The 3rd Workshop on ACM Cyber-Physical System Security (CPSS 2017), pp. 43-53, 2017.

5. Xu Yang, Yuexin Zhang(张跃欣), Joseph K. Liu and Yali Zeng. “A Trust and Privacy Preserving Handover Authentication Protocol for Wireless Networks”. The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), pp. 138-143, 2016.

6. Yuexin Zhang(张跃欣), Yang Xiang, Xinyi Huang, and Li Xu. “A Cross-Layer Key Establishment Scheme in Wireless Mesh Networks”. European Symposium on Research in Computer Security (ESORICS 2014), pp: 526-541, 2014.

7. Yuexin Zhang(张跃欣), Li Xu, Yang Xiang, and Xinyi Huang. “Matrix-based Pairwise Key Establishment in Wireless Mesh Networks Using Deployment Knowledge”. IEEE International Conference on Communications (ICC’13), pp: 1604-1608, 2013.

8. Yuexin Zhang(张跃欣), Li Xu, Xinyi Huang, and Jie Li. “Matrix-based Pairwise Key Establishment with Pre and Post Deployment Knowledge for Wireless Mesh Networks”. The 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2013), pp: 153-158, 2013.

9. Xi Cao, Li Xu, Yuexin Zhang(张跃欣), and Wei Wu. “Identity-based Proxy Signature for Cloud Service in SaaS”. The 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2012), pp: 594-599, 2012.

10. Kun Peng and Yuexin Zhang(张跃欣). “A Secure Mix Network with an Efficient Validity Verification Mechanism”. The 5th International Conference on Internet and Distributed Computing Systems (IDCS 2012), Lecture Notes in Computer Science Volume 7646, pp. 85-96, 2012.

11. Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, and Yuexin Zhang(张跃欣). “Certificate-based Key-Insulated Signature”. The International Conference on Data and Knowledge Engineering (ICDKE 2012), Lecture Notes in Computer Science Volume 7696, pp. 206-220, 2012.