个人资料
教育经历2009年9月毕业于上海交通大学计算机科学与工程系,获工学博士学位; 2012年4月至2013年9月,国家公派访问丹麦技术大学数学系。 工作经历2009年9月至今,在华东师范大学软件工程学院担任教学和科研工作。 个人简介曾鹏,博士,副教授,博士生导师。主要从事大数据安全与隐私保护、区块链、云计算安全、抗量子攻击密码等方面研究,以第一作者或通讯作者身份发表论文40余篇,其中含IEEE Transactions on Information Forensics & Security、IEEE Transactions on Information Theory、IEEE Internet of Things Journal、Designs, Codes and Cryptography、The Computer Journal等主流国际SCI/CCF期刊学术论文20余篇,获由英国计算机协会和牛津大学出版社联合颁发的2019年度威尔克斯奖。主持科技部军口863计划项目、国家自然科学基金委员会与浙江省人民政府两化融合联合基金项目课题、国家自然科学基金青年基金项目、教育部高等学校博士点基金项目、国家重点研发计划项目子课题等各一项;主持上海市自然科学基金项目三项;主持横向课题四项。参与国家自然科学基金创新群体项目、国家重点研发计划项目、国家自然科学基金重点项目、国家自然科学基金委员会与丹麦国家研究基金会合作研究项目、国家自然科学基金面上项目等。 招收有网络空间安全、数学、计算机等专业背景的硕士生和博士生。 社会兼职研究方向大数据安全与隐私保护、区块链、云计算安全、抗量子攻击密码等 招生与培养开授课程《信息安全技术》、《密码学原理与实践》、《编码理论》等 科研项目n 上海市自然科学基金项目,大数据存储安全中的关键密码技术研究,2023.4.1-2026.3.31。(主持) n 国家重点研发计划“区块链”重点专项项目,面向区块链分布式场景的密码技术,2022.11.1-2025.10.31。(参与) n 国家重点研发计划“区块链”重点专项项目子课题: 多场景下的细粒度访问控制和身份管理机制的研究,2021.12.1-2024.11.30。(主持) n 国家自然科学基金面上项目,信任驱动的车载边缘网络协同式可信接入技术研究,2021.1.1-2024.12.31。(参与) n 上海市科学技术委员会,工业控制系统信息安全风险测评关键技术及应用,2018.7.1-2020.6.30。(参与) n 上海市自然科学基金项目,后量子公钥加密和数字签名算法研究,2017.5.1-2020.4.30。(主持) n 国家自然科学基金重点项目,面向大数据系统的安全计算,2017.1.1-2021.12.31。(参与) n 上海市科技成果转化和产业化项目,面向大数据的数据访问控制安全与隐私保护研究,2016.7.1-2018.6.30。(参与) n 国家自然科学基金委员会与浙江省人民政府两化融合联合基金项目课题,面向工业供需链的云计算安全,2016.1.1-2019.12.31。(主持) n 科技部863计划,******应用技术,2015.7.1-2016.6.30。(主持) n 国家自然科学基金青年基金项目,无线传感器网络中的广播认证技术研究,2012.1.1-2014.12.31。(主持) n 上海市自然科学基金项目,无线传感器网络中的安全认证机制研究,2011.4.1-2014.3.31。(主持) n 国家自然科学基金委员会与丹麦国家研究基金会合作研究项目,代数几何在编码理论与密码学中的应用,2011.1.1-2013.12.31。(参与) n 国家自然科学基金委员会创新研究群体科学基金项目,网络化信息物理计算基础研究,2011.1.1-2016.12.31。(参与) 学术成果n Jiayan Shen, Peng Zeng*, Kim-Kwang Raymond Choo, and Chengju Li, A certificateless provable datapossession scheme for cloud-based EHRs, IEEE Transactions on Information Forensics & Security, Jan. 20, 2023, 18: 1156-1168. (CCF A, 中科院一区) n Xiangqi Kong, Peng Zeng*, and Chengju Li, PPFP: An efficient privacy-preserving fair payment protocol for V2G based on blockchain, in: Proceedings of the 2022 IEEE the 8th International Conference on Computer and Communications (ICCC 2022), 1308-1313. (EI) n Huajie Cheng, Peng Zeng*, and Chengju Li, LBFP: A lightweight bitcoin-based fair payment for outsourced computation, in: Proceedings of the 2022 IEEE the 8th International Conference on Computer and Communications (ICCC 2022), 1344-1349. (EI) n Yinzhao Lei, Chengju Li*, Yansheng Wu, Peng Zeng, More results on hulls of some primitive binary and ternary BCH codes, Finite Fields and Their Applications, September 2022, 82(2022)102066: 1-29. (SCI, 中科院数学二区) n Siyuan Chen, Peng Zeng*, and Kim-Kwang Raymond Choo, A new code-based blind signature scheme, The Computer Journal, July 15, 2022, 65(7): 1776–1786. (SCI, EI, CCF B) n Jiayan Shen, Peng Zeng*, and Kim-Kwang Raymond Choo, Multicopy and multiserver provable data possession for cloud-based IoT, IEEE Internet of Things Journal, July 15, 2022, 9(14): 12300-12310. (SCI, EI, 中科院一区) n Peng Zeng, Zhiting Zhang*, Rongxing Lu, and Kim-Kwang Raymond Choo*, Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things, IEEE Internet of Things Journal, July 1, 2021, 8(13): 10963-10972. (SCI, EI, 中科院一区) n Zhiting Zhang, Peng Zeng*, Bofeng Pan, and Kim-Kwang Raymond Choo, Large-universe attribute-based encryption with public traceability for cloud storage, IEEE Internet of Things Journal, Oct. 9, 2020, 7(10): 10314-10323. (SCI, EI, 中科院一区) n Yue Huang, Peng Zeng*, and Kim-Kwang Raymond Choo, An efficient privacy-preserving protocol for computing k-th minimum value in P2P networks, Journal of Circuits, Systems, and Computers, July 2020, 29(9) 2050138: 1-20. (SCI, EI) n Peng Zeng, Bofeng Pan*, Kim-Kwang Raymond Choo, and Hong Liu*, MMDA: multidimensional and multidirectional data aggregation for edge computing-enhanced IoT, Journal of Systems Architecture, June 2020, 106 (2020) 101713: 1-9. (SCI, EI, CCF B) n Jing Zhao and Peng Zeng*, Efficient and large universe ciphertext-policy attribute-based encryption with black-box traceability for ehealth, in: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Haikou, China, Feb. 28-29, 2020, AISC 1147: 480–485, Mar. 2020. (EI) n Yuzhuang Zhou, Peng Zeng*, and Siyuan Chen, An improved code-based encryption scheme with a new construction of public key, in: Proceedings of the 2019 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2019), Anhui, China, June 21-23, 2019, AISC 1017: 959–968, Jan. 2020. (EI) n Peng Zeng, Siyuan Chen*, and Kim-Kwang Raymond Choo, An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case, Human-centric Computing and Information Sciences, Dec. 2019, 9(1): 1-15. (SCI) n Chengju Li and Peng Zeng*, Constructions of linear codes with one-dimensional hull, IEEE Transactions on Information Theory, March 2019, 65(3): 1668-1676. (SCI, EI, CCF A) n Zuming Shen and Peng Zeng*, An RFID path authentication protocol based on Chebyshev polynomials, in: Proceedings of the 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2018), Shanghai, China, July 11-13, 2018, AISC 842: 17-27, Jan. 2019. (EI) n Yuyin Qian and Peng Zeng*, An efficient authentication protocol for RFID-based supply chains, in: Proceedings of the 2018 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2018), Shanghai, China, July 11-13, 2018, AISC 842: 28-37, Jan. 2019. (EI) n Yuyin Qian, Peng Zeng*, Zuming Shen, and Kim-Kwang Raymond Choo, A lightweight path authentication protocol for RFID-based supply chains, in: Proceedings of the 2018 17th IEEE International Conference on Trust, Security And Privacy in Computing And Communications (TrustCom 2018), New York, USA, Aug. 1-3, 2018: 1297-1302, Sep. 6, 2018. (EI, CCF C) n Shanshan Ge, Peng Zeng*, Rongxing Lu, and Kim-Kwang Raymond Choo, FGDA: Fine-grained data analysis in privacy-preserving smart grid communications, Peer-to-Peer Networking and Applications, Sep. 1, 2018, 11(5): 966-978. (SCI, EI, CCF C) n Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Xiaolei Dong, Efficient ring signature and group signature schemes based on q-ary identification protocols, The Computer Journal, April 1, 2018, 61(4): 545–560. (SCI, EI, CCF B, 获英国计算机协会和牛津大学出版社联合颁发的2019年度威尔克斯奖) n Shanshan Ge, Peng Zeng*, and Kim-Kwang Raymond Choo, An enhanced anonymous identification scheme for smart grids, in: Proceedings of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence (ATCI 2017), Ningbo, China, June 16-18, 2017, AISC 580: 329-337, Oct. 21, 2017. (EI) n Guomin Zhou, Peng Zeng*, Xiaohui Yuan*, Siyuan Chen, and Kim-Kwang Raymond Choo, An efficient code-based threshold ring signature scheme with a leader-participate model, Security and Communication Networks, August 2017, Volume 2017 (2017), Article ID 1915239, 7 pages. (SCI, EI, CCF C) n Bofeng Pan, Peng Zeng*, and Kim-Kwang Raymond Choo, An efficient data aggregation scheme in privacy-preserving smart grid communications with a high practicability, in: Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017), Torino, Italy, June 28-30, 2017, AISC 611: 677-688, July 6, 2017. (EI) n Siyuan Chen, Peng Zeng*, and Kim-Kwang Raymond Choo, A provably secure blind signature based on coding theory, in: Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016), Wuhan, China, Dec. 13th -16th, 2016: 376-382, Jan. 19, 2017. (EI, CCF C) n Siyuan Chen, Peng Zeng*, Kim-Kwang Raymond Choo, and Qin Wang, An efficient ring signature scheme based on syndrome decoding problem, in: Proceedings of the 12th International Conference on Computational Intelligence and Security (CIS 2016), IEEE Press, Wuxi, China, Dec. 16th – 19th, 2016: 228-232, Jan. 19, 2017. (EI) n Ya Gao, Peng Zeng*, Kim-Kwang Raymond Choo, and Fu Song, An improved online/offline identity-based signature scheme for WSNs, International Journal of Network Security, Nov. 2016, 18(6): 1143-1151. (EI) n Shengbao Wang, Peng Zeng*, Kim-Kwang Raymond Choo, and Hongbing Wang, A CCA2-secure multi-decrypter encryption scheme without random oracles, Informatica, Sep. 2015, 26(3): 543-556. (SCI) n Tom Hoholdt, Fernando Pinero, and Peng Zeng*, Optimal codes as tanner codes with cyclic component codes, Designs, Codes and Cryptography, July 2015, 76(1): 37-47. (SCI, EI, CCF B) n Ya Gao, Peng Zeng*, and Kim-Kwang Raymond Choo, Multi-sender broadcast authentication in wireless sensor networks, in: proceedings of the 2014 10th International Conference on Computational Intelligence and Security (CIS 2014), IEEE Press, Yunnan, China, Nov. 15th -16th, 2014: 633-637, Jan. 22, 2015. (EI) n Hongbing Wang, Peng Zeng*, and Kim-Kwang Raymond Choo, MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption, Security and Communication Networks, Nov. 2014, 7(11): 1641-1651. (SCI, EI, CCF C) n Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, and Peng Zeng, Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security, Information Sciences, July 2014, 272: 223-237. (SCI, EI, CCF B、中科院二区) n Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer, Peng Zeng, Jianwei Liu, Ruiying Du, A generic construction of proxy signatures from certificateless signatures, in: proceedings of the IEEE 27th International Conference on Advanced Information Networking and Applications, Spain, Mar. 25th - 28th, 2013: 259-266, 2013. (EI) n Shengbao Wang, Qi Xie, Qiang Tang, Peng Zeng*, and Wei Chen, A two-party combined cryptographic scheme and its application, Chinese Journal of Electronics, Oct. 2012, 21(4): 687-691. (SCI, EI) n Peng Zeng, Zhenfu Cao, and Kim-Kwang Raymond Choo, An ID-based digital watermarking protocol for copyright protection, Computers & Electrical Engineering, July 2011, 37(4): 526-531. (SCI, EI) n Peng Zeng, Zhenfu Cao, and Huang Lin, Analysis and enhancement of a watermarking protocol for web context, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 392-396. (EI) n Peng Zeng, Zhenfu Cao, and Huang Lin, A new buyer-seller watermarking protocol without double embedding, Journal of Shanghai Jiaotong University (Science), Aug. 2010, 15(4): 397-402. (EI) n Peng Zeng, Kim-Kwang Raymond Choo, and Da-Zhi Sun, On the security of an enhanced novel access control protocol for wireless sensor networks, IEEE Transactions on Consumer Electronics, May 2010, 56(2): 566-569. (SCI, EI) 荣誉及奖励 |