首页 >> 研究生培养 >> 硕导介绍 >> 正文

张宗洋

作者:       发布: 2018-05-24      来源:

打印

张宗洋Zongyang Zhang

职 称

讲师

学 历

博士

电 话

办公室

新主楼F921

系 别

网络空间安全学院

职 务

院长助理

电子信箱

zongyangzhang@buaa.edu.cn

传 真


个人主页

谷歌个人主页   北航教师主页
学习经历

2001.9-2005.6:河海大学,学士,计算机科学与技术

2005.9-2008.3:上海交通大学,硕士,计算机软件与理论

2007.9-2012.1:上海交通大学,博士,计算机软件与理论

工作经历

2012.3-2014.8:上海交通大学,博士后

2012.9-2014.3:日本产业技术综合研究所,博士后

2014.4-2016.3:日本学术振兴会,博士后

2016.4-2018.5:北航电子信息工程学院,讲师

2018.5-至今:  北航网络空间安全学院,讲师

研究领域

区块链与密码货币、公钥密码学、网络安全

欢迎有志于区块链、密码学技术研究的学生推免2019级硕士研究生!

荣誉及奖励
  • 2018年获北航学院2017级优秀班主任

  • 2018年获北航学院优秀导师

  • 2018年获第十一届全国大学生信息安全竞赛优秀指导教师奖

  • 2018年获得北京市高等教育教学成果二等奖(排名7)

  • 2017年获得北航青年教师培训基础班优秀学员称号

  • 2016年获得北京航空航天大学“蓝天新秀”称号

  • 2014年获上海市优秀博士学位论文                          

开授课程
本科生主讲课程    

 1、网络空间安全导论

 2、区块链

研究生主讲课程

 1、密码协议设计与分析

 2、信息安全数学基础

教学及科研成果
发表学术论文30余篇。

会议论文:

1、Yanting Zhang, Jianwei Liu, Zongyang Zhang(通讯作者), and Yang Hu. Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices.the 21st Information Security Conference (ISC 2018), EI, CCF Rank C.

2、Jiayuan Yin, Changren Wang,Zongyang Zhang (通讯作者), and Jianwei Liu. Revisiting the Incentive Mechanism of Bitcoin-NG. the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018). EI, CCF Rank C.

3、Xingguang Zhou, Jie Chen,Zongyang Zhang (通讯作者), Jianwei Liu, Qianhong Wu. Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage, the 9th International Symposium on Cyberspace Safety and Security(CSS 2017), Lecture Notes in Computer Science, Vol. 10581, pp. 411-426, Springer-Verlag, October 23–25, 2017.EI,最佳学生论文奖. Accession number: 20174704429805

4、Yuyu Wang,Zongyang Zhang (corresponding Author), Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka, How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.ASIACRYPT 2016, Lecture Notes in Computer Science, Vol.10032, pp. 465-495, Springer-Verlag, December, 2016.(CCF Rank B).Accession number: 20170103223195

5、Hongbing Wang, Yingjiu Li,Zongyang Zhang, Yunlei Zhao, Efficient Tag Path Authentication Protocol with Less Tag Memory.ISPEC 2016: Lecture Notes in Computer Science, Vol.10060, pp. 255-270, Springer-Verlag, November, 2016. Accession number: 20164803058576

6、Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao, Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model,PROVSEC 2015, Lecture Notes in Computer Science,Vol.9451, pp. 435-454, Springer-Verlag, November, 2015.Accession number: 20154901649023

7、Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo,Zongyang Zhang, Black-Box Separations for One-More (Static) CDH and Its Generalization, the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2014), Lecture Notes in Computer Science, Vol.8874, pp. 366-385, Springer-Verlag, December, 2014.(CCF Rank B).Accession number: 20145000322604

8、Yu Chen,Zongyang Zhang (corresponding Author), Publicly Evaluable Pseudorandom Functions and their Applications, the 9th Conference on Security and Cryptography for Networks (SCN 2014), Lecture Notes in Computer Science Volume 8642, pp 115-134, Springer-Verlag, September, 2014.Accession number: 20151600762144

9、Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, and Yunlei Zhao, All-but-One Dual Projective Hashing and Its Applications, the 12nd International Conference on Applied Cryptography and Network Security (ACNS 2014), Lecture Notes in Computer Science Volume 8479, pp 181-198, Springer-Verlag, June, 2014. (CCF Rank C)Accession number: 20142817915544

10、Yu Chen, Qiong Huang andZongyang Zhang (corresponding author), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited, the 19th Australasian Conference on Information Security and Privacy (ACISP 2014), Lecture Notes in Computer Science Volume 8544, pp 274-289, Springer-Verlag, July, 2014. (CCF Rank C)Accession number: 20142917957128

11、Yu Chen,Zongyang Zhang (corresponding author), Dongdai Lin and Zhenfu Cao, Anonymous Identity-Based Hash Proof System and Its Applications, Provable Security (ProvSec 2012), Lecture Notes in Computer Science, Vol.7496, pp. 143-160, Springer-Verlag, September, 2012.Accession number: 20123715434391

12、Yu Chen,Zongyang Zhang, Dongdai Lin and Zhenfu Cao, Identity Based Extractable Hash Proofs and their Applications, Applied Cryptography and Network Security (ACNS 2012), Lecture Notes in Computer Science, Vol. 7341, pp.153-170, Springer-Verlag, June, 2012. (CCF Rank C).Accession number: 20122815224979

13、Hongbing Wang, Yingjiu Li,Zongyang Zhangand Zhenfu Cao, Two-level Path Authentication in EPCglobal Network, 2012 IEEE International Conference on RFID (IEEE RFID 2012), pp. 24-31, April, 2012.Accession number:20122115052440

期刊论文:

1、Hui Yu,Zongyang Zhang (通讯作者)and Jianwei Liu. Research on Scaling Technology of Bitcoin Blockchain,Journal of Computer Research and Development, Vol. 54, Issue 10, pp. 2390-2403, 2017.EI. Accession number: 20175004531143

2、Xinguang Zhou, Jianwei Liu, Qianhong Wu andZongyang Zhang (通讯作者), Privacy Preservation for Outsourced Medical Data with Flexible Access Control,IEEE Access,Vol. 6, pp. 14827-14841,2018.JCR Q1,SCI. Accession number:WOS:000428959000001

3、Dawei Li, Jianwei Liu,Zongyang Zhang (通讯作者),Qianhong Wu, Wiran Liu, Revocable Hierarchical Identity-Based Broadcast Encryption,Tsinghua Science and Technology,Accept. 2017.SCI.

4、Yu Chen andZongyang Zhang(corresponding author), Publicly Evaluable Pseudorandom Functions and Their Applications,Journal of Computer Security, Volume. 24, No. 2, pp. 289-320, 2016,CCF Rank B, Accession number: 20161902365114

5、Yu Chen, Qiong Huang andZongyang Zhang (corresponding author), Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More,International Journal of Information Security, Volume 15, pp. 15–33, Feb, 2016. (JCR Q2),Accession Number:WOS:000369997700002

6、Yu Chen,Zongyang Zhang (corresponding author),Dongdai Lin, Zhenfu Cao. Generalized (Identity-Based) Hash Proof System and Its Applications,Security and Communication Networks, Volume 9, pp. 1698–1716, Aug, 2016.(CCF Rank C, JCR Q4)Accession Number: WOS:000380004400006

7、Zongyang Zhang, Sherman S.M. Chow and Zhenfu Cao. Post-Challenge Leakage in Public-Key Encryption,Theoretical Computer Science, Volume 572, pp. 25–49, March, 2015. (CCF Rank B, JCR Q4),Accession Number:WOS:000350939800002

8、Zongyang Zhang, Zhenfu Cao, Haojin Zhu. Constant-Round Adaptive Zero-Knowledge Proofs for NP,Information Science, Volume 261, pp. 219-236, March, 2014. (CCF Rank B, JCR Q1),Accession Number:WOS:000331689700012

9、Yu Chen,Zongyang Zhang (corresponding author),Dongdai Lin, Zhenfu Cao. CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof System,The Computer Journal, Volume 57, Issue 10, pp. 1537-1556, 2014. (CCF Rank B, JCR Q4),Accession Number:WOS:000343417100006

10、Zongyang Zhang, Zhenfu Cao and Haifeng Qian, Chosen-Ciphertext Attack Secure Public Key Encryption with Auxiliary Inputs,Security and Communication Networks, 2012, Vol. 5,No. 12, pp. 1404–1411, December, 2012 .(CCF Rank C, JCR Q4), Accession Number:WOS:000311403800011

11、Zongyang Zhangand Zhenfu Cao, Concurrent Non-Malleable Statistically Hiding Commitment,Information Processing Letters, Vol.12, No. 11, pp. 443–448, June, 2012. (CCF Rank C, JCR Q4),Accession Number:WOS:000303303000007

学术与社会服务

2017信息技术领域前沿跟踪研究,区块链技术编写组委员

Globecom CISS 2016-2018,TPC

ICITCS 2017、ProvSec 2016、ICITCS 2015、ProvSec 2014,PC

科研项目

1、“高可靠低时延信息加解密技术研究”子课题,民用飞机专项科研,主持,2018.1-2020.12

2、“智能服务交易模型及关键技术”子课题,重点研发计划,主持,2017.12-2020.11

3、抗大规模监视的公钥密码体制研究,北京市自然科学基金面上项目,主持,2018.01-2020.06

4、高效可扩展隐私保护密码货币设计与分析,国家密码发展基金,主持,2018.9-2020.9

5、安全可扩展区块链共识协议研究,CCF-绿盟鲲鹏基金,主持,2018.9-2019.9
6、抗大规模监视的公钥密码系统设计与分析,信息安全国家重点实验室开放课题,主持,2017.01-2018.12  

7、基于北斗导航的共享单车安全信息系统,北斗应用研究院开放课题重大项目,主持,2017.08-2018.07

8、抗中间人攻击的密码协议研究,国家自然科学基金青年基金,主持,2014.01-2016.12