Skip to content Skip to navigation

Faculty

Yang Lu Associate Professor

Academic Area: 
Cryptography and Its Application
Research Interests: 
  • Public Key Cryptography
  • Searchable Public Key Encryption
  • Cloud Security
Bio: 

Employment History

 

Associated Professor, Nanjing Normal University, China (2018-till now)

Post-doc, Hohai University, China (2010-2011)

Lecturer/Associated Professor, Hohai University, China (2003-2018)

 

Educational Background:

 

PhD, Information Security Science and Technology, PLA University of Science and Technology, China (2005.09-2009.06)

MS, Operations research and control, Nanjing Normal University, China (2000.09-2003.06)

BS, Mathematics Education, Nanjing Normal University, China (1996.09-2000.06)

 

Research

 

Research Projects:

 

  • PI, Research on searchable public key encryption against keyword guessing attacks, National Natural Science Foundation of China, No. 61772009, 2018.01-2021.12.
  • PI, Research on provably secure public key encryption with keyword search, Fundamental Research Funds for the Central Universities, No. 2017B17014, 2018.01-2019.12.
  • Co-PI, Research on leakage-resilient public key cryptosystems, Natural Science Foundation of Jiangsu Province, No. BK20161511, 2017.01-2019.12.
  • Co-PI, Research on novel public key cryptography, Program of China-USA Computer Science Research Center, 2017.01-2018.12.
  • Co-PI, Research on key technology of public key cryptography in clouds, Fundamental Research Funds for the Central Universities, No. 2016B10114,2017.01-2018.12.

 

Articles (2013-till now):

 

  • Yang Lu, Jiguo Li. Constructing pairing-free certificateless public key encryption with keyword search. Frontiers of Information Technology & Electronic Engineering, online, doi: 10.1631/FITEE.1700534. (SCI)
  • Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang. Provably secure certificate-based encryption with leakage resilience. Theoretical Computer Science, online, doi: 10.1016/j.tcs.2017.10.020. (SCI, CCF B)
  • Yang Lu, Gang Wang, Jiguo Li. On security of a secure channel free public key encryption with conjunctive field keyword search scheme. Information Technology and Control, 2018, 47(1): 56-62. (SCI)
  • Yang Lu, Jiguo Li, Jian Shen. Weakness and improvement of a certificate-based key-insulated signature in the standard model. The Computer Journal, 2017, 60(12): 1729-1744. (SCI, CCF B)
  • Yang Lu, Quanling Zhang, Jiguo Li, Jian Shen. An efficient certificate-based authenticated key agreement protocol without bilinear pairing. Information Technology and Control, 2017, 46(3): 345-359. (SCI)
  • Yang Lu, Gang Wang, Jiguo Li, Jian Shen. New construction of short certificate-based signature against existential forgery attacks. KSII Transactions on Internet and Information Systems, 2017, 11(7): 3629-3647. (SCI)
  • Yang Lu, Gang Wang, Jiguo Li, Jian Shen. Efficient designated server identity-based encryption with conjunctive keywords search. Annals of Telecommunications, 2017, 72(5-6): 359-370. (SCI, IF 1.412)
  • Yang Lu and Jiguo Li. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11(1): 161-177. (SCI)
  • Yang Lu and Jiguo Li. A provably secure certificate-based encryption scheme against malicious CA attacks in the standard model. Information Sciences, 2016, 372: 745-757. (SCI, JCR 1, IF 4.832, CCF B)
  • Yang Lu, Quanling Zhang, Jiguo Li. Comment on a certificateless one-pass and two-party authenticated key agreement protocol. Information Sciences, 2016, 369: 184-187. (SCI, JCR 1, IF 4.832, CCF B)
  • Yang Lu and Jiguo Li. Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science, 2016, 639: 42-59. (SCI, CCF B)
  • Yang Lu and Jiguo Li. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Generation Computer Systems, 2016, 62:140-147. (SCI, JCR 1, IF 3.997, CACR B, CCF C).
  • Yang Lu and Quanling Zhang. Enhanced certificate-based encryption scheme without bilinear pairings. KSII Transactions on Internet and Information Systems, 2016, 10(2): 881-896. (SCI) 
  • Yang Lu and Jiguo Li. An improved certificate-based signature scheme without random oracles. IET Information Security, 2016, 10(2): 80-86. (SCI, JCR 3, IF 1.037, CACR B, CCF C)
  • Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang and Futai Zhang. Continuous leakage-resilient certificate-based encryption. Information Sciences, 2016, 355-356: 1-14. (SCI, JCR 1, IF 4.832, CCF B)
  • Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu and Yichen Zhang. Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Security and Communication Networks, 2016, 9(10): 1016-1024. (SCI, IF 1.067, CCF C) 
  • Yang Lu, Quanling Zhang and Jiguo Li. Cryptanalysis of two tripartite authenticated key agreement protocols. In Proc. of DCABES 2015, pp. 159-162, 2015. (EI)
  • Yang Lu, Quanling Zhang and Jiguo Li. An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications, 2015, 9(3): 353-373. (SCI)
  • Yang Lu. Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds. KSII Transactions on Internet and Information Systems, 2015 9(7): 2703-2718. (SCI)
  • Yang Lu and Jiguo Li. Efficient construction of certificate-based encryption secure against public key replacement attacks in the standard model. Journal of Information Science and Engineering, 2014, 30(5): 1553-1568. (SCI, CACR C)
  • Yang Lu and Jiguo Li. Provably secure certificate-based signcryption scheme without pairings. KSII Transactions on Internet and Information Systems, 2014, 8(7): 2554 - 2571. (SCI)
  • Yang Lu and Jiguo Li. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. The Scientific World Journal, Volume 2014, Article ID 295419, 12 pages. (SCI, JCR 2)
  • Yang Lu and Jiguo Li. Efficient and provably-secure certificate-based key encapsulation mechanism in the standard model. Journal of Computer Research and Development, 2014, 51(7): 1497-1505. (EI)
  • Yang Lu and Jiguo Li. Novel construction of forward-secure public-key encryption in the standard model. Journal on Communications, 2014, 35(2): 33-39. (EI)
  • Yang Lu and Jiguo Li. Efficient constructions of certificate-based key encapsulation mechanism. International Journal of Internet Protocol Technology, 2014, 8(2/3): 96 - 106. (EI)
  • Yang Lu and Jiguo Li. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics, 2013, 90(12): 2603-2613. (SCI, JCR 3, IF: 0.825)
  • Yang Lu and Jiguo Li. Constructing pairing-free certificate-based encryption. International Journal of Innovative Computing, Information and Control, 2013, 9(11): 4509-4518. (EI)

 

Patents:

 

  • A short-live certificate-based key encapsulation mechanism system, China, ZL201310196758.2, 2016. (Ranking 1st)
  • A certificate-based proxy re-encryption method and system, China, ZL201310572508.4, 2016. (Ranking 1st)
  • An attribute-based encryption method and system, China, ZL201410612226.7, 2017. (Ranking 3rd)
  • A certificate-based conditional proxy re-encryption method and system, China, ZL201410614744.2, 2017. (Ranking 4th)

 

Contact:

 

Phone: +86 13401929210

Email: luyangnsd@163.com