删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

福建师范大学数学与信息学院导师教师师资介绍简介-张福泰

本站小编 Free考研考试/2021-05-13



张福泰:男,汉族,2001年在西安电子科技大学获得密码学博士学位。现为福建师范大学教授,中国密码学会理事、密码算法专委会及组织委员会委员,密码学报编委。
联系方式:futai@fjnu.edu.cn, ffttzhang@sina.com
主要科研项目
1. 国家自然科学基金面上项目,**,车载网和车载云中信息安全与隐私保护关键技术研究,2016/01-2019/12,78.8万,已结题,参加
2. 国家自然科学基金青年基金,**,云存储中基于无证书加密的数据机密性保护与访问控制,2016/01-2018/12,20万元,已结题,参加
3. 国家自然科学基金面上项目, **, 具有泄漏弹性的基于身份的和无证书的密码体制, 2012/01-2015/12, 57万元,已结题, 主持
4. 国家自然科学基金面上项目, **, 高效无证书密码体制及其应用, 2007/01-2009/12, 26万元,已结题, 主持
5. 江苏省自然科学基金项目, BK**, 无证书密码体制基础理论研究, 2006/09-2008/12, 7.5万元,已结题, 主持
6. 江苏省高校自然科学研究计划重点项目, 03KJA520066, 可验证秘密分享及其应用, 2003/09-2005/12, 7.5万元,已结题, 主持
7. 国家自然科学基金面上项目,同态签名的聚合及其应用(**), 2017.01-2020.12,64万,已结题,主持
8. 江苏省重点研发计划 基于加密SD卡的移动支付安全中间件研发及示范应用 2011-09-01--2014-08-01 已结题,参加。
主要学术论文
1. Yumei Li, Futai Zhang*, Yinxia Sun. Lightweight Certificateless Linearly Homomorphic Network Coding Signature scheme for Electronic Health System.IET Information Security, 2021, 15(1): 131-146. DOI:10.1049/ise2.12011.
2.Yumei Li, Futai Zhang, Liu Xin. Secure Data Delivery with Identity-based Linearly Homomorphic Network Coding Signature Scheme in IoT. IEEE Transactions on Services Computing, Doi: 10.1109/TSC.2020.**, 2020.
3.Jie Zhang, Futai Zhang*, Xin Huang; Xin Liu. Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence. IEEE Transactions onDependable and Secure Computing, Doi: 10.1109/TDSC.2020.**, http://dx.doi.org/10.1109/TDSC.2020.**, 2020.
4.Ge Wu, Futai Zhang*, Limin Shen, Fuchun Guo, Willy Susilo. Certificateless aggregate signature scheme secure against fully chosen-key attacks.Information Sciences, 2020, 514: 288-301.
5. Ge Wu,Yi Mu,Willy Susilo,Fuchun Guo,Futai Zhang. Threshold privacy-preserving cloud auditing with multiple uploaders. International Journal of Information Security, 2019, 18: 321–331.
6.Yinxia Sun,Futai Zhang,Anmin Fu. Revocable Certificateless Encryption with Ciphertext Evolution. ACISP2018:741-749.
7.Limin Shen, Futai Zhang, Yinxia Sun, Jianfeng Ma. An efficient revocable ID-based encryption scheme in the standard model. International Journal of Embedded Systems,2017,9(2):168-176.
8.李素娟, 张明武, 张福泰. 抗(持续)辅助输入cca安全的pke构造方案的分析及改进. 计算机学报, 2017, 40(106) : 1-13.
9.Yanhong Liu, Futai Zhang*, Jie Zhang. Attacks to some verifiable multi-secret sharing schemes and two improved schemes. Information Sciences, 2016, 329: 524–539.
10.Jie Zhang, Futai Zhang*. Information-theoretical secure verifiable secret sharing with vector space access structures over bilinear groups and its applications. Future Generation Computer Systems,2015, 52: 109-115.
11.孙银霞, 张福泰, 沈丽敏. 抗签名密钥泄露的可撤销无证书签名. 软件学报, 2015, 26(12): 3196?3203.
12.Yinxia Sun, Futai Zhang, Limin Shen. Efficient revocable certificateless encryption against decryption key exposure. IET Information Security, 2015, 9 (3): 158-166.
13.Wenjie Yang,Futai Zhang*,Limin Shen.Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles.Security and Communication Networks, 2014, 7(2): 445-454.
14.Futai Zhang*, Limin Shen, Ge Wu.Notes on the security of certificateless aggregate signature schemes. Information Sciences, 2014, 287(2): 32–37. DOI: 10.1016/j.ins.2014.07.019.
15.Futai Zhang, Jie Zhang. Efficient and Information-Theoretical Secure Verifiable Secret Sharing over Bilinear Groups. Chinese Journal of Electronics, 2014, 23(1): 13-17.
16.Limin Shen, FutaiZhang, Yinxia Sun. Efficient revocable certificateless encryption secure in the standard model. Computer Journal, 2014, 57(4): 592-601.
17.Sujuan Li, Futai Zhang.Efficient leakage-resilient public key encryption from DDH assumption. Cluster Computing, 2013, 16(4): 797-806.
18.Songqin Miao, Futai Zhang*, Sujuan Li, Yi Mu. On security of a certificateless signcryption scheme.Information Sciences,2013, 232(5): 475-481.
19.刘艳红, 张福泰. 不需要安全信道的空间有效秘密分享方案. 计算机学报, 2012, 35(9): 1816-1822.
20.张福泰*, 孙银霞, 张 磊, 耿曼曼, 李素娟. 无证书公钥密码体制研究. 软件学报, 2011, 22(6): 1316-1332.
21.Hong Yuan, Futai Zhang*, Xinyi Huang, Yi Mu, Willy Susilo, Lei Zhang. Certificateless threshold signature scheme from bilinear maps. Information Sciences, 2010, 180(23): 4714-4728.
22.Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer. Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences,2010, 180(6): 1020-1030.
23.Futai Zhang*, Sujuan Li, Songqin Miao, Yi Mu, Willy Susilo, Xinyi Huang. Cryptanalysis on Two Certificateless Signature Schemes. International Journal of Computers, Communications & Control, 2010, 2010(4): 586-591.

相关话题/福建师范大学 数学