• / Prof. Liangfeng Zhang / 张良峰 助理教授、研究员
    电话:(021)54207362
    Email: zhanglf@@shanghaitech.edu.cn
    办公室: 上海市浦东新区华夏中路393号信息学院1A-504D室
    专业方向: 计算机科学与技术
Prof. Liangfeng Zhang / 张良峰 助理教授、研究员

电 话:(021)54207362
Email :zhanglf@@shanghaitech.edu.cn
办公室:上海市浦东新区华夏中路393号信息学院1A-504D室
个人主页: http://faculty.sist.shanghaitech.edu.cn/faculty/zhanglf/
专业方向: 计算机科学与技术
张良峰 研究组招聘广告(点击进入)

研究领域


  • 私有信息检索

  • 可验证的计算

  • 安全多方计算

  • 局部可译码


个人简历

张良峰博士分别在同济大学数学系,上海交通大学数学系和南洋理工大学数学科学系获得学士(应用数学),硕士(应用数学)和博士(密码学与信息安全)学位; 2012年博士毕业后在卡尔加里大学计算机科学系从事博士后研究工作; 主要研究领域包括现代密码学与代数编码论。2015年3月,张良峰博士作为助理教授、研究员加入上海科技大学。

代表性论文

1.S. Xu, L. Zhang, “Cryptanalysis of Morillo-Obrador polynomial delegation schemes”,IET INFORMATION SECURITY, Vol 12, Issue 2, pp127-132, Mar 2018.

2.S. Xu, Y. He, and L. Zhang.(2018). Cryptanalysis of tran-pang-deng verifiable homomorphic encryption. In 20th International Conference on International Conference on Information Security and Cryptology (pp. 59-70). Springer, Seoul, Korea.

3.G. Ohtake, R. Safavi-Naini, and L. Zhang, Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary”,Computers & SecurityVol 1, Issue 1, pp1-20, 2018.

4.G. Ohtake, R. Safavi-Naini, and L. Zhang,“Efficient verifiable attribute-based keyword search”,IEICE ISEC Technical ReportVol 116, Issue 505, pp195-202, 2017.

5.G. Ohtake, R. Safavi-Naini, and L. Zhang,“Implementation and evaluation of outsourcing scheme of attribute-based encryption”,IEICE ISEC Technical ReportVol 116, Issue 129, pp129-136, 2016.

6.L. Zhang, R. Safavi-Naini,“Batch verifiable computation of outsourced functions, Designs, Codes and Cryptography,Vol 77, Issue 2-3, pp563-585, 2015.

7.L. Zhang, R. Safavi-Naini, G. Pernul,PYA. Ryan, and E. Weippl (2015). Batch Verifiable Computation of Polynomials on Outsourced Data. COMPUTER SECURITY - ESORICS (pp. 167-185). Springer,Vienna, Austria.

8.L. Zhang, R. Safavi-Naini (2014) Verifiable Delegation of Computations with Storage-Verification Trade-off, Proceedings of the 19th European Symposium on Research in Computer Security-ESORICS (pp. 112-129). Springer, Wroclaw, Poland.

9.L. Zhang and R. Safavi-Naini (2014) Verifiable Multi-Server Private Information Retrieval, Proceedings of the 12th International Conference on Applied Cryptography and Network Security-ACNS ( pp. 62-79), Springer, Lausanne, Switzerland.

10.L. Zhang, A Coding-Theoretic Application of Baranyais Theorem, IEEE Transactions on Information Theory, Vol. 60, Issue. 11, pp. 6988-6992, 2014.

11.Y. Chee, S. Ling, H. Wang, and L. Zhang, Upper Bounds on Matching Families in Z_pq^n, IEEE Transactions on Information Theory, Vol. 59, Issue. 8, pp. 5131-5139, 2013.

12.Y. Chee, T. Feng, S. Ling, H. Wang, and L. Zhang, Query-Efficient Locally Decodable Codes of Subexponential Length, Computational Complexity, Vol. 22, Issue 1, pp. 159-189, 2013.