秦波

秦波,西安电子科技大学博士,先后任西班牙URV大学Juan de la Cierva学者和Senior researcher,现为中国人民大学教师。主持或共同主持中国、西班牙国家级研究项目4项,是欧盟第七规划等近10个国际国内项目的主要研究人员,在IEEE/ACM ToN, IEEE TC, IEEE TPDS等国际期刊上录用和发表论文20余篇,在Eurocrypt, Asiacrypt, ACM CCS, Esorics等国际会议上录用和发表论文30余篇。担任ICDM等多个国际会议TPC委员,美国数学学会Mathematic Reviews评论员,是ICDM, Asiacrypt, ESORICS, GLOBCOM等10余个国际会议审稿专家,IEEE TKDE, IEEE TPDS, IEEE TIFS, IEEE TVT, IEEE WCM等期刊审稿专家。
欢迎高年级本科生加入我们的课题组,参与我们的科研工作。
如果你对信息安全感兴趣,欢迎报考我的研究生,请直接与我联系。

详细>>

电话 :010-62512492, 13552253617

电子邮箱:bo.qin@ruc.edu.cn

详细资料

研究方向

新兴信息系统安全,数据安全与隐私保护,云计算安全,应用密码学

对学生的培养要求

1.积极乐观,踏实勤奋;

2.良好数学、计算机或通信领域知识与技能基础;

3.良好的英语阅读和写作水平;

4.良好的沟通能力。

科研项目

调和VANET中安全冲突的密码技术研究(自然科学基金);

量子计算下安全的基于格问题的数字签名方案研究(自然科学基金);

非对称群密钥协商理论与关键技术研究(自然科学基金);

基于有限域上多变量多项式的签字研究(自然科学基金);

In Cloud We Trust? Improving trust in the Cloud Via Security, Privacy, Reliability, and Integrity(西班牙教育与科技部项目);

Cloud computing SECloud, investigación y desarrollo de una plataforma SEgura para aplicaciones(西班牙工贸部项目);

Peer-to-peer User-Private Information Retrieval (RIPUP)(西班牙工贸部项目);

eVerification, Verficación electrónica para sistemas de votación electrónica presencial(西班牙工贸部项目)。

科研成果

[4] Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm. IEEE-ACM Transactions on Networking, vol. 21, no. 2, pp. 621-633, Apr 2013, ISSN: 1063-6692.

[5] Fair Remote Retrieval of Outsourced Private Medical Records in Electronic Health Networks. Journal of Biomedical Informatics. Accepted, 2013.

[6] Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security. Information Sciences, vol. 272, pp. 223-237, 2014.

[7] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences, vol. 275: 370-384, 2014.

[8] Provably Secure Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. Information Sciences, vol. 210, pp. 67-80, 2012.

[9] Provably Secure One-Round Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. Information Sciences, vol. 181, no. 19, pp. 4318-4329, 2011.

[10] Simultaneous authentication and secrecy in identity-based data upload to cloud. Cluster Computing, vol. 16, no. 4, pp. 845-859, 2013.

[11] An Improved One-to-many Authentication Scheme for Access Control in Pay-TV Systems. IET Information Security, vol. 6, no. 4, pp. 281 - 290, Dec. 2012.

[12] Identity-based remote data possession checking in public clouds. IET Information Security 8(2): 114-121 (2014)

[13] Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Information Security, Vol. 6, no. 1, pp. 20-27, Mar 2012.

[14] Provably-secure electronic cash based on certificateless partially-blind signatures. Electronic Commerce Research and Applications, vol. 10, no. 5, 2011.

[15] Asymmetric group key agreement protocol for open networks and its application to broadcast encryption. Computer Networks, vol. 55, no. 15, pp. 3246-3255, 2011.

[16] Efficient many-to-one authentication with certificateless aggregate signatures. Computer Networks, vol. 54, no. 14, pp. 2482-2491, 2010.

[17] Identity-Based Optimistic Fair Exchange in the Standard Model. Security and Communication Networks. vol. 6, no. 8, 1010-1020, 2013.

[18] Identity-based optimistic fair exchange in the standard model. Security and Communication Networks, vol. 6, no. 8, pp. 1010-1020, 2013.

部分CCF推荐国际会议

[1] Who Is Touching My Cloud? ESORICS 2014, accepted, 2014.

[2] Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test. ESORICS 2014, accepted, 2014.

[3] Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS 2014, accepted, 2014.

[4] Tracing and revoking leaked credentials: Accountability in leaking sensitive outsourced data. ASIACCS 2014, pp. 425-434, 2014.

[5] Hierarchical Identity-Based Broadcast Encryption. ACISP 2014, pp. 242-257, 2014.

[6] Practical Distributed Signatures in the Standard Model. CT-RSA 2014, pp. 307-326, 2014.

[7] Preserving Security and Privacy in Large-Scale VANETs. ICICS 2011, pp. 121–135, 2011.

[8] Bridging Broadcast Encryption and Group Key Agreement. Asiacrypt’11, pp. 143–160, 2011.

[9] Threshold Public-key Encryption with Adaptive Security and Short Ciphertexts. ICICS 2010, pp. 62–76, 2010.

[10] Ad Hoc Broadcast Encryption, ACM CCS 2010, pp. 741-742, 2010

荣誉获奖

陕西省自然科学奖;

西班牙教育部Juan de la Cierva研究奖;

西班牙URV大学优秀研究人员奖。