个人资料
教育经历工作经历
个人简介郁昱,华东师范大学特聘教授、博导、密码学院院长,上海交通大学特聘教授、博导、计算机学院副院长。2003年获复旦大学学士学位;2006年获南洋理工大学博士学位,之后在比利时鲁汶大学从事博士后研究;2011年回国后曾分别在华东师范大学和清华大学任教;2014年至今任教于上海交通大学计算机科学与工程系和计算机学院。 主研密码基础理论、后量子密码和隐私保护计算等方向,已于国际密码学会三大密码会(美密、欧密、亚密)发表了20余篇文章。曾多次担任CRYPTO、EUROCRYPT、ASIACRYPT和CCS的程序委员会委员,并在ASIACRYPT 2021和中国密码学会年会(2016,2018,2021)和澳大利亚密码年会(ACISP 2016)担任特邀报告人。取得的成果曾被图灵奖得主、美国工程院院士、哥德尔奖得主等多位专家引用和正面评价。 更多信息详见个人主页:http://yuyu.hk 社会兼职研究领域主要研究方向:密码学理论、后量子密码和多方计算的底层理论(LPN等) 招生与培养开授课程科研项目学术成果近五年论文发表: 1. Miscellaneous [1]. Carsten Baum, Hongrui Cui, Ivan Damgard, Kevin Esvelt, Mingyu Gao, Dana Gretton, Omer Paneth, Ron Rivest, Vinod Vaikuntanathan, Daniel Wichs, Andrew Yao, Yu Yu. “Cryptographic Aspects of DNA Screening”, DNA Screening Technical Note (2020) [2]. Raphael Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven Galbraith, Jian Guo, Lucas Hui, Kwangjo Kim, Xuejia Lai, Dong Hong Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk,Huaxiong Wang, Hank Wolfe, Duncan Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou. “Advances in Security Research in the Asiacrypt Region”, Communications of the ACM (2020), Vol. 63, No. 4 2. Theory/Cryptography [1]. Fengrun Liu, Xiang Xie, Yu Yu: “Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting”, USENIX Security 2024. Accepted [2]. Cheng-Long Li, Kai-Yi Zhang, Xingjian Zhang, Kui-Xing Yang, Yu Han, Su-Yi Cheng, Hongrui Cui, Wen-Zhao Liu, Ming-Han Li, Yang Liu, Bing Bai, Hai-Hao Dong, Jun Zhang, Xiongfeng Ma, Yu Yu, Jingyun Fan, Qiang Zhang, Jian-Wei Pan: “Device-Independent-Quantum-Randomness-Enhanced Zero-Knowledge Proof.” Proc Natl Acad Sci (PNAS) USA. 2023 Nov 7;120(45):e2205463120 [3]. Kaiyi Zhang , Hongrui Cui , Yu Yu: “Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS+ and XMSS.” CRYPTO (5) 2023: 455-483 [4]. Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu: “Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks.” EUROCRYPT (2) 2023: 35-67 [5]. Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui. “Algebraic Attacks on Round-Reduced RAIN and Full AIM-III.” ASIACRYPT 2023. Accepted [6]. Chun Guo , Xiao Wang , Xiang Xie , Yu Yu: “The Multi-User Constrained Pseudorandom Function Security of eneralized GGM Trees for MPC and Hierarchical Wallets.” ACM Trans. Priv. Secur. 26(3): 37:1-37:38 (2023) [7]. Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu: “Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.” SP 2023: 534-551 [8]. Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong: “Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.” TCC (1) 2023: 238-267 [9]. Di Yan, Hanlin Liu, Shuoyao Zhao, Yu Yu: “On the Hardness of Sparsely Learning Parity with Noise.” Comput. J. 65(8): 1939-1947 (2022) [10]. Li Yao, Yilei Chen, Yu Yu: “Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.” EUROCRYPT (1) 2022: 645-669 [11]. Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert: “A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.” ASIACRYPT (4) 2022: 508-536 [12]. Hanlin Liu, Yu Yu: “A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW.” ASIACRYPT (3) 2022: 741-770 [13]. Di Yan, Yu Yu, Hanlin Liu, Shuoyao Zhao, Jiang Zhang: “An improved algorithm for learning sparse parities in the presence of noise.” Theor. Comput. Sci. 873: 76-86 (2021) [14]. Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu: “Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact.” CRYPTO (2) 2021: 365-394 [15]. Yu Yu, Jiang Zhang: “Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN.” CRYPTO (3) 2021: 473-501 [16]. Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu: “MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).” ESORICS (2) 2021: 332-351 [17]. Liujun Wang, Kai-Yi Zhang, Jia-Yong Wang, Jie Cheng, Yong-Hua Yang, Shi-Biao Tang, Di Yan, Yan-Lin Tang, Zhen Liu, Yu Yu, Qiang Zhang, Jian-Wei Pan. Experimental Authentication of Quantum Key Distribution with Post-quantum Cryptography, npj Quantum Information 7, Article number: 67 (2021) [18]. Yu Yu, Moti Yung: Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13007, Springer 2021, ISBN 978-3-030-88322-5 [19]. Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang: “Improved lattice-based CCA2-secure PKE in the standard model.” Sci. China Inf. Sci. 63(8): 1-22 (2020) [20]. Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers: “Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?” ASIACRYPT (1) 2020: 851-880 [21]. Rui Wen, Yu Yu, Xiang Xie, Yang Zhang: “LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.” CCS 2020: 1219-1232 [22]. Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu: “Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting).” CRYPTO (2) 2020: 793-822 [23]. Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu: “A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.” ESORICS (2) 2020: 357-377 [24]. Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang: “Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.” Public Key Cryptography (2) 2020: 37-65 [25]. Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu: “Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.” SP 2020: 825-841 3. Information Security [1]. Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li: “Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.” USENIX Security Symposium 2023: 4607-4624 [2]. Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu: “Efficient Private Circuits with Precomputation.” IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 286-309 (2023) [3]. Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su: “Side-Channel Masking with Common Shares.” IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 290-329 (2022) 荣誉及奖励
|