![]() |
|||
刘振华 | |||
性 别: | 男 | 职 称: | 教育,高等学校教师,副教授 |
籍 贯: | 陕西省 西安市 | 现 居 地: | |
毕业院校: | 西安电子科技大学 | 专 业: | 密码学 |
查看更多个人信息 | |||
出生年月: | 1978-11 | 工作单位: | 西安电子科技大学数学与统计学院 |
邮 箱: | zh_liu@mail.xidian.edu.cn | 联系电话: | |
学 历: | 博士 |
【人物简介】
刘振华,博士,副教授、硕士生导师。 1978年11月生,河南潢川人。2000年6月获得河南师范大学计算数学专业理学学士学位,2003年3月获得西安电子科技大学应用数学专业理学硕士学位,2009年12月获得西安电子科技大学密码学专业博士学位。
【研究方向】
公钥密码学。
【研究成果】
【科研项目】
目前研究团队承担的科研项目: 1. 主持国家自然科学青年科学基金项目:后量子理想格上密码方案的新型设计与可证明安全性(No.61100229),2012.01-2014.12, 23万。 2. 主持信息安全国家重点实验室开放基金一项,2012.01-2013.12,5万。 3. 主持广西信息科学实验中心开放基金一项,2011.01-2014.12,10万。 4. 主持网络与数据安全四川省重点实验室开放课题一项(已结题)。 5. 主持中央高校基本科研业务费项目:格公钥密码设计中的关键数学问题研究(K50510700005),2010.9-2012.9,5万(已结题)。 6. 参与国家自然科学青年科学基金项目一项。
【论文著作】
21. Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li, Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model, Security and communication networks, 2013, 6(1): 69-77. (SCI) 20. Xiangsong Zhang, Zhenhua Liu, Sanyang Liu, A trust region SQP-filter method for nonlinear second-order cone programming, Computers & Mathematics with Applications, Elsevier, 2012, 63(12): 1569-1576. (SCI) 19. Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma, Certificateless signcryption in the standard model, Information Sciences, 2010, 180(3): 452-464. (SCI, 57 citations in Google scholar currently) 18. Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Hua Ma, Provably secure multi-proxy signature scheme with revocation in the standard model, Computer Communications, 2011, 34(3): 494-501. (SCI, 6 citations in Google scholar currently) 17. Zhenhua Liu, Yupu Hu, Hua Ma, Secure proxy multi-signature scheme in the standard model, Proc. Of the 2nd International Conference on Provable Security (ProvSec 2008), LNCS 5324, Springer-Verlag, Berlin-Heidelberg, 2008, pp. 127-140. 16. Zhenhua Liu, Yupu Hu, et al., Secure proxy signature scheme with fast revocation in the standard model, The Journal of China Universities of Posts and Telecommunications, 2009, 16(4): 116-124. (EI, 12 citations in Google scholar currently) 15. Zhenhua Liu, Yupu Hu, et al., New two-party identity-based authen- ticated key agreement protocol without random oracles, Proceedings of the 4th International Conference on Information Security and Cryptology (Inscrypt 2008), Short paper, SCIENCE PRESS, Beijing, 2009, pp. 78-91. 14. Zhenhua Liu, Yupu Hu, et al., New identity-based ring signature in the standard model, 2009, 31(7): 1727-1731. (In Chinese) 13. Zhenhua Liu, Yupu Hu, et al., Analysis and improvement of identity-based authenticated key agreement, Journal of Harbin Engineering University, 2009, 30(10): 1184-1189. (In Chinese) 12. Zhenhua Liu, Yupu Hu, et al., Identity-based signature scheme with partial message recovery in the standard model, Journal of Beijing University of Technology, 2010, 36(5): 654-658. (In Chinese) 11. Zhenhua Liu, Yupu Hu, et al., Chosen ciphertext secure identity-based encryption in the standard model, Computer Science, 2009, 36(10): 64-67. (In Chinese) 10. Fenghe Wang, Yupu HU, Zhenhua LIU, Lattice-based oblivious transfer protocol, Journal on Communications, 2011, 32(3): 125-130. (In Chinese) 9. Yang Yang, Yupu Hu, Leyou Zhang, Zhenhua Liu, Hierarchical identity-based signature scheme with short public parameters, Journal of South China University of Technology(Natural Science Edition), 2010, 38(12): 84-89. (In Chinese) 8. Leyou Zhang, Yupu Hu, Zhenhua Liu, Provable secure ID-based threshold signature scheme without random oracles, Journal of Xidian University, 2008, 35(1): 81-86. (In Chinese) 7. Zhenhua Liu, Sanyang Liu, Jue Wang, An attribute reduction algorithm based on the information quantity, Journal of Xidian University, 2003, 30(6): 835-838. (In Chinese) 6. Zhenhua Liu, Sanyang Liu, Mining way distinguishing based on rough set, Computer and Modernization, 2002, 9: 1-3. (In Chinese) 5. Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A regularization smoothing method for second-order cone complementarity problem, Nonlinear Analysis: Real World Applications, 2011, 12(1): 731-740. (SCI) 4. Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A predictor-corrector smoothing method for second-order cone programming. Journal of Applied Mathematics and Computing, 2010, 32(2): 369-381. 3. Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A non-interior-point smooth- ing method for variational inequality problem. Journal of Computational and Applied Mathematics, 2010, 234(3): 713-721. (SCI) 2. Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, Analysis of a smoothing Newton method for second-order cone complementarity problem. Journal of Applied Mathematics and Computing, 2009, 31(1-2): 459-473. 1. Xiangsong Zhang, Sanyang Liu, Zhenhua Liu, A smoothing method for second order cone complementarity problem. Journal of Computational and Applied Mathematics, 2009, 228(1): 83-91. (SCI)