今天是:

系部概况

师资队伍

师资队伍

当前位置: 首页 >> 系部概况 >> 师资队伍 >> 正文

常金勇

发布日期:2017-06-08    作者:     来源:     点击:

常金勇
政治面貌
副教授
最高学历
研究生
最高学位
学习经历
2000.9-2004.7 山西大学·数学科学学院,理学学士;
2006.9-2009.7 首都师范大学·数学科学学院,理学硕士;
2012.9-2016.1 中国科学院信息工程研究所·信息安全国家重点实验室,工学博士。
工作经历
2004.7-2006.9 长治学院·数学系,教师;
2009.7-2012.9 长治学院·数学系,教师;
2016.4-至今 北京大学·数学科学学院,博士后。
个人成果
项目情况:
1. 主持国家自然科学基金“相关密钥安全性若干关键问题研究”(No. 61602061),批准金额:24万,2017.1-2019.12.
2. 主持中国博士后科学基金(一等资助) (No. 2017M610021).
3. 作为主要成员参与国家自然科学基金“对依赖密钥的明文进行安全加密的性质研究”(No. 61402414),批准金额: 81万,2015.1-2018.12.
4. 参与国家自然科学基金“可证明安全的高效可搜索加密构造方法研究”(No. 61402471), 批准金额:24万,2015.1-2017.12.
5. 参与国家自然科学基金“具有用户部分属性撤销功能的基于属性加密算法研究”(No. 61402468),批准金额:25万,2015.1-2017.12.
6. 参加2014年度在奥地利维也纳举办的第 11 届安全与密码国际会议(SECRYPT’14)并作学术报告。
7. 主持山西省高校科技开发项目 “非线性薛定谔方程组基态解的研究”(No. 20111129)(已结题)。
论文情况:
[1] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Separations in Circular Security for Arbitrary Length Key Cycles-the CCA Case. Security and Communication Networks, online. (SCI, EI)
[2] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Homomorphic Network Coding Signature Schemes against Related-Key Attack in the Random Oracle. The 19th Annual International Conference on Information Security and Cryptology (ICISC-2016) (EI).
[3] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Security Analysis of a TESLA-Based Homomorphic MAC Schemes for Authentication in P2P Live Streaming System. Security and Communication Networks, Vol. 9(16), pp. 3309-3313, Nov. 2016. (SCI, EI)
[4] Jinyong Chang and Rui Xue, Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions. Security and Communication Networks, Vol. 8(8), pp. 1525-1536, May, 2015. (SCI, EI)
[5] Jinyong Chang and Rui Xue, The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICETransactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.4, pp. 1032-1037, April, 2015. (SCI, EI)
[6] Jinyong Chang and Rui Xue, A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. Journal of Communications. Vol. 10(1), pp. 43-47, January, 2015. (EI)
[7] Yu Chen, Jiang Zhang, Yi Deng, and Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptology ePrint Archive 2016: 1020.
[8] Bei Liang, Hongda Li and Jinyong Chang, Constrained Verfiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015. (EI)
[9] Bel Liang, Hongda Li and Jinyong Chang, The Generic Construction of Adaptively Secure Identity-Based Aggregate Signatures in the Random Oracle Model from Standard Signatures. CANS 2015. (EI)
 

[10] Bei Liang, Hongda Li and Jinyong Chang, The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015. (EI)

[11] Haidong Liu, Zhaoli Liu and Jinyong Chang, Existence and Uniqueness of Positive Solutions of Nonlinear Schrodinger Systems. Proceedings of the Royal Society of Edinburgh, 145A, 365-390, 2015. (SCI)
[12] Fei Tang, Hongda Li and Jinyong Chang, Multi-Use Unidirectional Proxy Re-Signatures of Constant Size Without Random Oracles. IEICETransactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.3, pp. 898-905, 2015. (SCI, EI)
[13] Fei Tang, Hongda Li and Jinyong Chang, Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICETransactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.2, pp. 762-766, 2015. (SCI, EI)
[14] Jinyong Chang and Rui Xue, KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. In 11th International Conference on Security and Cryptography, SECRYPT 2014, pp. 299-306, Vienna, Austria. (EI)
[15] Jinyong Chang and Rui Xue, On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICETransactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E97-A, No.11, pp. 2267-2271, November, 2014. (SCI, EI)
[16] Meihua Wei, Jinyong Chang and Lan Qi, Existence and Statility of Positive Steady-State Solutions for a Lotka-Volterra System with Intraspecific Competition. Advances in Difference Equations. May 30, 2014. (SCI)
[17] Jinyong Chang and Rui Xue, General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.Journal of Software. Vol. 9(10), pp. 2557-2563, October, 2014.
[18] 常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性. 密码学报,1(3): 235-243, 2014.
[19] Jinyong Chang, Note on Ground States of a Nonlinear Schrodinger System.Journal of Mathematical Analysis and Applications. 381(2), pp. 957-962, September, 2011. (SCI)
[20] Jinyong Chang and Zhaoli Liu, Ground States of Nonlinear Schrodinger Systems. Proceedings of the American Mathematics Society. 138(2), pp. 687-693, Feb. 2010. (SCI)