头像

钱海峰

博士生导师华东师大—海法大学转化科学与技术联合研究院常务副院长

软件工程学院      

个人资料

  • 部门: 软件工程学院
  • 毕业院校:
  • 学位:
  • 学历:
  • 邮编:
  • 联系电话:
  • 传真:
  • 电子邮箱: hfqian@admin.ecnu.edu.cn
  • 办公地址: 华东师大(中北校区)理科大楼B607
  • 通讯地址: 上海市中山北路3663号理科大楼B404室

教育经历

工作经历

个人简介

社会兼职

 

钱海峰,华东师范大学计算机系研究员,博士生导师。现任华东师大—海法大学转化科学与技术联合研究院常务副院长。2006年上海交大获博士学位(导师曹珍富),同年被华东师范大学破格引进副教授。2012年华东师范大学首批副教授博导、2013年破格晋升研究员。2008年访问俄克拉荷马大学计算机学院(程岐)、2009年和2011年两度访问得克萨斯大学网络空间安全学院(Ravi Sandhu、徐寿怀)。2016年获得上海市人才发展基金和“曙光学者”称号。

研究领域涉及应用密码学、移动网络安全等。至今已在密码学与网络安全领域著名CCFIACR会议ACM CCSTCCACNSICICSACM IMCCT-RSAISCAsiaCCS等发表论文20余篇;同时在《中国科学》、IEEE TIFSDCCIEEE CLInformation SciencesInformaticaIPLSCICCF期刊发表论文30余篇。多年担任美国数学协会“数学评论”评论员,FCS的青年副编辑;IEEE TWCIEEE TDSCTCSEurocryptAsiacryptPKCCT-RSAFC等国内外期刊和学术会议的审稿人。

曾主持和参与上海市、教育部和国家各类科研项目10多项,其中:主持国家自然科学基金项目3项(1项在研),参与国家自然科学基金委重大国际合作项目、重点项目(在研)等多项。曾主持教育部博士点项目和上海市科委基础研究项目等。拥有“中华人民共和国通信行业标准”2项,发明专利5项。

研究方向

信息安全与密码学

招生与培养

开授课程

科研项目

学术成果

 

主持或参加科研项目及人才计划项目情况(按时间倒序排序):

1.      上海市2016年度“曙光计划”项目,16SG21,新型网络环境下访问控制的关键技术研究,2016.9.1-2019.8.3115万,主持

2.      国家自然科学基金面上项目,61571191, 基于访问控制环境的加密系统和认证技术研究,2016.01-2019.1273.6万,主持

3.      上海市科委科技项目,13JC1403502,新型网络中特殊加密方案的设计与应用, 2013.09-2016.0820万,主持

4.      国家自然科学基金面上项目,61172085,现代网络中多方认证方案的设计方法与理论研究,2012.01-2015.1260万元、结题、主持。

5.      国家自然科学基金青年项目,60703004,可实施的最优数字签名的设计和应用研究,2008.01-2010.1218万元、结题、主持

6.      教育部博士点基金项目,紧安全数字签名的理论问题研究(2008-2010)结题,主持

7.      国家自然科学基金国际项目(中丹项目),11061130539,代数几何在编码理论和密码学中的应用,2011.01-2013.12150万元、已结题、参与。

8.      国家自然科学基金面上项目,60873217,密钥授权机制与新型密码原语的应用研究,2009.01-2011.1227万元、已结题、参与。


中华人民共和国通信行业标准:

1.    IPv6接入地址编址编码技术要求,中华人民共和国通信行业标准, YD/T 2682-2014,中华人民共和国工业和信息化部发布,2014.

2.   IPv6地址管理与编码技术要求--总体技术要求,中华人民共和国通信行业标准,中华人民共和国工业和信息化部发布,2014.

 

部分发表论文

1.Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian: Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study. Peer-to-Peer Networking and Applications 10(2): 357-367 (2017) SCI

2.Jieqiong Hou, Haifeng Qian: Collaboratively filtering malware infections: a tensor decomposition approach. ACM TUR-C 2017: 28:1-28:7

3.Kai Zhang, Lifei Wei, Xiangxue Li, Haifeng Qian: Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks. WASA 2017: 210-219

4.Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian: Thwarting location privacy protection in location-based social discovery services. Security and Communication Networks 9(11): 1496-1508 (2016) SCI

5.Kai Zhang, Wen Chen, Xiangxue Li, Jie Chen, Haifeng Qian: New application of partitioning methodology: identity-based dual receiver encryption. Security and Communication Networks 9(18): 5789-5802 (2016) SCI

6.Jiangtao Li, Lei Zhang, Joseph K. Liu, Haifeng Qian, Zheming Dong: Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud. IEEE Trans. Information Forensics and Security 11(11): 2572-2583 (2016) SCI

7.Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam for Massive MIMO Systems. IEEE Trans. Signal Processing 64(9): 2365-2374 (2016) SCI

8.Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou: Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309

9.Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao: Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation. AsiaCCS 2016: 269-279

10.Deli Qiao, Haifeng Qian, Geoffrey Ye Li: On the design of broadbeam for massive MIMO systems. ICNC 2016: 1-5

11.Minhui Xue, Cameron L. Ballard, Kelvin Liu, Carson L. Nemelka, Yanqiu Wu, Keith W. Ross, Haifeng Qian: You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users. Internet Measurement Conference 2016: 25-31

12.Haifeng Qian, Hui Wan, Mark N. Wegman, Luis A. Lastras, Ruchir Puri: A Proximity Measure using Blink Model. CoRR abs/1612.07365 (2016)

13.Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou: Signcryption KEM/tag-KEM, revisited. Security and Communication Networks 8(17): 3067-3082 (2015) SCI

14.Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam design for massive MIMO systems with uniform rectangular array. GlobalSIP 2015: 878-882

15.Minhui Xue, Yong Liu, Keith W. Ross, Haifeng Qian: I know where you are: Thwarting privacy protection in location-based social discovery services. INFOCOM Workshops 2015: 179-184

16.Rongrong Wang, Minhui Xue, Kelvin Liu, Haifeng Qian: Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks. WASA 2015: 561-570

17.Deli Qiao, Haifeng Qian, Geoffrey Ye Li: Broadbeam for Massive MIMO Systems. CoRR abs/1503.06882 (2015)

18.Xiangxue Li, Qingji Zheng, Haifeng Qian, Dong Zheng, Kefei Chen: PWG: Progressive Weight-Growth Algorithm for LDPC Codes. IEICE Transactions 97-A(2): 685-689 (2014) SCI

19.Xiangxue Li, Haifeng Qian, Yuan Zhou: Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 276: 290-294 (2014) SCI

20.Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang: Robust password changing and DoS resilience for human-centric password authentication. Security and Communication Networks 7(10): 1552-1559 (2014) SCI

21.Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng: POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. ACM Conference on Computer and Communications Security 2014: 1457-1459 EI

22.Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng: POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. ACM Conference on Computer and Communications Security 2014: 1460-1462 EI

23.Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu: Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling 57(3-4): 503-511 (2013) SCI

24.Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng: Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201

25.Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou: Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184

26.Xiangxue Li, Haifeng Qian, Yuan Zhou: Pitfalls in identity based encryption using an elliptic curve combined public key. Appl. Math. Lett. 25(8): 1111-1113 (2012) SCI

27.Haifeng Qian, Xiangxue Li, Xinli Huang: Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model. Informatica, Lith. Acad. Sci. 23(3): 443-460 (2012) SCI

28.Yuan Zhou, Haifeng Qian: Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs. Security and Communication Networks 5(7): 764-775 (2012) SCI

29.Haifeng Qian, Junqing Gong, Yuan Zhou: Anonymous password-based key exchange with low resources consumption and better user-friendliness. Security and Communication Networks 5(12): 1379-1393 (2012) SCI

30.Zongyang Zhang, Zhenfu Cao, Haifeng Qian: Chosen-ciphertext attack secure public key encryption with auxiliary inputs. Security and Communication Networks 5(12): 1404-1411 (2012) SCI

31.Yu Yu, Xiangxue Li, Haifeng Qian: Two-source extractors for leaky sources. ITW 2012: 452-456

32.Haifeng Qian, Shouhuai Xu,Non-interactive multisignatures in the plain public-key model with efficient verification, Inf. Process. Lett., 111(2), 82-89, 2010 SCI

33.Jun He, Haifeng Qian*, Yuan Zhou, and Zhibin Li, Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems, Mathematical Problems in Engineering, vol. 2010, 14 pages, 2010 SCI

34.Yuan Zhou, Haifeng Qian*, Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model. ADHOC-NOW 2011Berlin, 2011.10. 164-176

35.Haifeng Qian, Shouhuai Xu: Non-interactive editable signatures for assured data provenance.     CODASPY 2011, San Antonio, 2011.02. 145-156

36.Yuan Zhou, Haifeng Qian*, Xiangxue Li: Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ISC 2011, Xi’an, 2011.10. 341-354

37.Junqing Gong, Haifeng Qian*, Yuan Zhou: Fully-Secure and Practical Sanitizable Signatures. Inscrypt 2010, Shanghai, 2010.09. 300-317

38.Shouhuai Xu, Haifeng Qian, Fengying Wang, Zhenxin Zhan, Elisa Bertino, Ravi S. Sandhu: Trustworthy Information: Concepts and Mechanisms. WAIM 2010, Jiuzaigou, 2010.07. 398-404

39.Li X. X., Zheng Q. J., Qian H. F., Zheng D., Li J. H., Toward Optimizing Cauchy Matrix for Cauchy Reed-Solomon Code, IEEE COMMUNICATIONS LETTERS, 13 (8): 603-605. (2009) , SCI

40.Xiaolei Dong, Haifeng Qian, Zhenfu Cao: Provably secure RSA-type signature based on conic curve. Wireless Communications and Mobile Computing 9(2): 217-225 (2009) SCI

41.Zecheng Wang, Haifeng Qian, Zhibin Li: Adaptively Secure Threshold Signature Scheme in the Standard Model. Informatica, Lith. Acad. Sci. 20(4): 591-612 (2009) SCI

42.Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang: Efficient public key encryption with smallest ciphertext expansion from factoring. Des. Codes Cryptography 49(1-3): 233-249 (2008) SCI

43.Haifeng Qian, Zhibin Li, Zhijie Chen and Shiman Yang, A Practical Optimal Padding for Signature Schemes, M.Abe (Ed.): CT-RSA 2007, LNCS 4377, pp. 112-128, 2007. EI

44.Zecheng Wang, Haifeng Qian, Zhibin Li. Hybrid Proxy Multisignature: A New Type Multiparty SignatureInformation Sciences, 2007.12, Vol 177(24): 5638-5650 (2007). SCI

45.Licheng Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Simulatability and security of certificateless threshold signatures. Information Sciences, Volume 177, Issue 6, Pages 1382-1394 (2007). SCI

46.Haifeng Qian, Zhenfu Cao, Qingshui Xue. A new threshold proxy signature scheme from bilinear pairings, Science in China Ser. E, 34(6):711-720, 2004; Science in China Ser. F, 47(5):612-622, 2004. SCI.

47.Haifeng Qian, ZhenFu Cao and Haiyong Bao. Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms, Applied Mathematics and Computation, Volume 166, Issue 3, 26 July 2005, Pages 501-505. SCI

48.Haifeng Qian, ZhenFu Cao and Haiyong Bao. Security of Pon-Lu-Jeng's Meta-He digital signature schemes, Applied Mathematics and Computation, Volume 170, Issue 1, 1 November 2005, Pages 724-730. SCI

49.Qian Haifeng, Cao Zhenfu and Xue Qingshui. Efficient Pairing-Based Threshold proxy Signature Scheme with Known Signers, Informatica, 2005, Vol.16, No. 2, 261-274. SCI

50.Haifeng Qian and Zhenfu Cao, A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme, International Workshop on Information Assurance in Distributed Systems (IADS 2005), LNCS, Publisher: Springer-Verlag GmbH, Volume 3759, 2005, pages 323-331. SCI

51.Qingshui Xue, Zhenfu Cao and Haifeng Qian, A generalized proxy signature scheme based on the RSA cryptosystem, PDCAT'04, LNCS 3320, 8-10 December, 2004, Singapore, pp. 662-665. SCI

52.Hai-Yong Bao, Zhen-Fu Cao and Hai-Feng Qian. On the security of a group signcryption scheme from distributed signcryption scheme, CANS'2005, LNCS volume 3810, Springer-Verlag Berlin Heidelberg, pages 26-34. 2005. SCI

53.Lichen Wang, Zhenfu Cao, Xiangxue Li and Haifeng Qian. Certificateless Threshold Signature Schemes, CIS'2005, Part II, LNAI 3802, Springer-Verlag, pages 104-109. 2005. SCI



荣誉及奖励

10 访问

相关教师