个人信息
常金勇
|
系所:计算机系 |
职称:教授 |
职务:院长助理、计算机系主任 |
学科:计算机科学与技术 |
电话: |
电子邮箱: |
changjinyong@xauat.edu.cn |
办公地点: |
|
研究方向: |
信息安全 |
教育背景
2016.4-2018.3,北京大学,数学科学学院,博士后
2012.9-2016.1,中国科学院信息工程研究所,信息安全国家重点实验室,博士
2006.9-2009.7,首都师范大学,数学科学学院,硕士
2000.9-2004.7,山西大学,数学科学学院,学士
工作经历
2024.12-至今,西安建筑科技大学,信息与控制工程学院,教授、硕导
2018.3-2024.12,西安建筑科技大学,信息与控制工程学院,副教授、硕导
主讲课程
网络与信息安全,数据结构(Data Structures),计算机新技术等
项目经历
(1)国家自然科学基金委员会, 面上项目,62476212,面向建筑物联网的智能传感节点可信协同机制研究,2025-01至2028-12,50万元,在研,主持;
(2)西电ISN全国重点实验室,开放课题,ISN-25-02,云-雾-终端架构下数据安全传输与存储技术研究,2024-04至2026-03,6万元,在研,主持;
(3)陕西省科技厅, 面上项目, 2022JM-365, 云雾一体化环境下物联网数据安全若干关键问题研究, 2022-01 至 2023-12, 5万元,已结题,主持;
(4)信息安全国家重点实验室, 面上项目, 2021MS-04, 云数据完整性审计若干关键问题研究, 2021-05 至 2023-05, 3万元,已结题,主持;
(5)国家自然科学基金委员会, 面上项目, 62072363, 面向不确定因素的天然气负荷预测及用户行为检测方法研究, 2021-01至2024-12, 56万元,已结题, 参与;
(6)陕西省科技厅, 面上项目, 2020JM-486, 基于动力学传播行为的网络瓶颈与关键节点辨识, 2020-01 至 2021-12, 4万元, 结题, 参与;
(7)陕西省科技厅, 面上项目, 2019JM18, 具有强安全性的同态认证机制研究, 2019-01 至 2020-12, 3万元, 结题, 主持;
(8)国家自然科学基金委员会, 青年科学基金项目, 61602061, 相关密钥安全性若干关键问题研究, 2017- 01-01 至 2019-12-31, 20万元, 结题, 主持;
(9)中国博士后基金委, 面上项目(一等资助), 2017M610021, 公钥加密算法的明文依赖密钥及相关密钥 安全性研究, 2017-01至 2018-04, 8万元, 结题, 主持;
(10)国家自然科学基金委员会,面上项目,61402414, 对依赖密钥的明文进行安全加密的性质研究,2015-01至2018-12,81万元,结题,参与;
(11)国家自然科学基金委员会,青年项目,61402471,可证明安全的高效可搜索加密构造方法研究, 2015-01至2017-12,24万元,结题,参与;
(12)国家自然科学基金委员会,青年项目,61402468,具有用户部分属性撤销功能的基于属性加密算法研究,2015-01至2017-12,25万元,结题,参与。
学术成果
[1] Xinran, Hu, Jinyong Chang, T. Ahmad, et.al. Identity-Based Integrity Auditing Scheme with Sensitive Information Hiding for Proxy-Server-Assisted Cloud Storage Applications. IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2024.3491315, accepted.
[2] Jing Song, Jinyong Chang, General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme, Clust. Comput, 27(5): 5663-5675 (2024).
[3] Songrun Yang, Jinyong Chang, Identity-based remote data integrity auditing from lattices for secure cloud storage, Clust. Comput, 27(5): 5833-5844 (2024).
[4] Zhong Wang, Funing Zhang, Anling Zhang, Jinyong Chang, LFTDA: A lightweight and fault-tolerant data aggregation scheme with privacy-enhanced property in fog-assisted smart grid, Computer Commun,220: 35-42 (2024).
[5] Xuening Guan, Jinyong Chang, Wei Zhang, Secure data sharing scheme with privacy-preserving and certificateless integrity auditing in cloud storage, Computer Commun, 224: 285-301 (2024).
[6] Jinyong Chang, Xinyu Hao, Certificateless Dynamic Data Sharing Scheme with File Recommendation and Integrity Auditing Functions in Cloud-Fog Environment, IEEE Internet Things J,11(6): 9630-9644 (2024).
[7]Tongda Liu, Zekun Li, Yanyan Ji, Jinyong Chang, Efficient Key-Escrow-Free and Vehicle-Revocable Data Sharing Protocol for Vehicular Ad Hoc Network, IEEE Internet Things J., 11(7): 11540-11553 (2024).
[8] Yufeng Yao, Jinyong Chang, Anling Zhang, Efficient Data Sharing Scheme with Fine-Grained Access Control and Integrity Auditing in Terminal-Edge-Cloud Network, IEEE Internet Things J. 11(16): 26944-26954 (2024).
[9] Yuan Tian, Genqing Bian, Jinyong Chang,Ying Tang, Jian Li, Chong-Qiang Ye, A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity, Entropy 25(5): 742 (2023).
[10] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property, Clust. Comput, 25(1): 337-349 (2022).
[11]Yixin Chen, Jinyong Chang, Identity-based proof of retrievability meets with identity-based network coding, Clust. Comput, 25(5): 3067-3083 (2022).
[12] Jinyong Chang, Qiaochuan Ren, Yanyan Ji, Maozhi Xu, Rui Xue, Secure medical data management with privacy-preservation and authentication properties in smart healthcare system, Computer Networks 212: 109013 (2022).
[13] Yubo Zhao, Jinyong Chang, Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage, Computer Networks 216: 109270 (2022).
[14] Haiyan Xiao, Lifang Wang, Jinyong Chang, The differential fault analysis on block cipher FeW, Cybersecurity, 5(1): 28 (2022).
[15] Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue, Identity-based remote data checking with a designated verifier, J.Cloud Comput.11: 7 (2022).
[16] Jinyong Chang, Maozhi Xu, Rui Xue, Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications, Peer-to-Peer Netw. Appl. 15(4): 2021-2036 (2022).
[17] Jinyong Chang, Bilin Shao,Yanyan Ji,Genqing Bian,Comment on A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage, IEEE Trans.Serv.Comput. 15(5): 2633-2634 (2022).
[18] Jinyong Chang, Bilin Shao, Yanyan Ji, Maozhi Xu, Rui Xue, Secure network coding from secure proof of retrievability, Sci.China Inf. Sci., 64(12) (2021).
[19] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access 8:17833-17841(2020).
[20] Genqing Bian, Jinyong Chang, Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case, IEEE Access 8: 102958-102970 (2020).
[21] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl, Math. Comput. 386: 125478 (2020).
[22] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Commun. Lett. 24(12): 2723-2727 (2020).
[23] Jinyong Chang, Yanyan Ji, Bilin Shao, Maozhi Xu, Rui Xue, Certificateless Homomorphic Signature Scheme for Network Coding, IEEE/ACM Trans. Netw. 28(6): 2615-2628 (2020).
[24] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Comment on A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding, IEEE Trans. Parallel Distributed Syst. 31(11): 2618-2619 (2020).
[25] Jinyong Chang, Bilin Shao, Yanyan Ji, Genqing Bian, Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited, IEEE Communications Letters, vol. 24(12), pp. 2723-2727, Dec., 2020.
[26] Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian, Privacy-Preserving Certificateless Provable Data Possession Scheme for Big Data Storage on Cloud, Revisited, Applied Mathematics and Computation, vol. 386, ID: 125478, 2020.
[27] Jinyong Chang, Huiqun Wang, Fei Wang, Anling Zhang, Yanyan Ji, RKA Security for Identity-Based Signature Scheme, IEEE Access, vol. 8, pp. 17833-17841, 2020.
[28] Jinyong Chang, Hui Ma, Anling Zhang, Maozhi Xu, Rui Xue, RKA Security of Identity-Based Homomorphic Signature Scheme, IEEE Access, 2019, 7: 50858-50868.
[29] Jinyong Chang, Genqing Bian, Yanyan Ji, Maozhi Xu, On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model, The Computer Journal, vol. 62(8), pp. 1232-1245, 2019.
[30] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue, General Transformations from Single-Generation to Multi-Generation for Homomorphic Message Authentication Schemes in Network Coding, Future Generation Computer Systems, vol. 91, pp. 416-425, 2019.
[31] Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations, Information Sciences, vol. 486, pp. 450-473, 2019.
[32] Honglong Dai, Ding Wang, Jinyong Chang, and Mazhi Xu, On the RCCA Security of Hybrid Signcryption for Internet of Things. Wireless Communications and Mobile Computing, 2018.
[33] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, Relaxing Enhanced Chosen-Ciphertext Security, IEICE Trans. Fund. Vol. E101-A, 2018.
[34] Yanyan Ji, Jinyong Chang, Honglong Dai, and Maozhi Xu, On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme, IEICE Trans. Fund. Vol. E101-A, 2018.
[35] Honglong Dai, Luxuan, Zhang, Yanyan Ji, Jinyong Chang, and Maozhi Xu, On the Key Dependent Message Security of DHIES, ICAIT 2017, pp. 322-328.
[36] Honglong Dai, Jinyong Chang, Zhenduo Hou, and Maozhi Xu, The ECCA Security of Hybrid Encryptions, SocialSec 2017, pp. 847-859.
[37] Ying Wu, Jinyong Chang, Rui Xue, Rui Zhang, Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size, The Computer Journal, Vol. 60(12), pp. 1785-1800, 2017.
[38] Jinyong Chang, Honglong Dai, and Maozhi Xu, The KDM-CCA Security of REACT, ISPEC’2017, LNCS 10701, pp. 85-101, 2017.
[39] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Homomorphic Network Coding Signature Schemes against Related-Key Attack in the Random Oracle. The 19th Annual International Conference on Information Security and Cryptology (ICISC-2016), LNCS 10157, pp. 239-253, 2017.
[40] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Separations in Circular Security for Arbitrary Length Key Cycles-the CCA Case. Security and Communication Networks. Vol. 9(18), 2016.
[41] Jinyong Chang, Honglong Dai, Maozhi Xu and Rui Xue, Security Analysis of a TESLA-Based Homomorphic MAC Schemes for Authentication in P2P Live Streaming System. Security and Communication Networks, Vol. 9(16), pp. 3309-3313, Nov. 2016.
[42] Yu Chen, Jiang Zhang, Yi Deng, and Jinyong Chang, KDM Security for Identity-Based Encryption: Constructions and Separations. IACR Cryptology ePrint Archive 2016: 1020.
[43] Jinyong Chang and Rui Xue, Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions. Security and Communication Networks, Vol. 8(8), pp. 1525-1536, May, 2015.
[44] Jinyong Chang and Rui Xue, The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.4, pp. 1032-1037, April, 2015.
[45] Jinyong Chang and Rui Xue, A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding. Journal of Communications. Vol. 10(1), pp. 43-47, January, 2015.
[46] Bei Liang, Hongda Li and Jinyong Chang, Constrained Verfiable Random Functions from Indistinguishability Obfuscation. ProvSec 2015.
[47] Bei Liang, Hongda Li and Jinyong Chang, The Generic Construction of Adaptively Secure Identity-Based Aggregate Signatures in the Random Oracle Model from Standard Signatures. CANS 2015.
[48] Bei Liang, Hongda Li and Jinyong Chang, The Generic Transformation from Standard Signatures to Identity-Based Aggregate Signatures. ISC 2015.
[49] Haidong Liu, Zhaoli Liu and Jinyong Chang, Existence and Uniqueness of Positive Solutions of Nonlinear Schrodinger Systems. Proceedings of the Royal Society of Edinburgh, 145A, 365-390, 2015.
[50] Fei Tang, Hongda Li and Jinyong Chang, Multi-Use Unidirectional Proxy Re-Signatures of Constant Size Without Random Oracles. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.3, pp. 898-905, 2015.
[51] Fei Tang, Hongda Li and Jinyong Chang, Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E98-A, No.2, pp. 762-766, 2015.
[52] Jinyong Chang and Rui Xue, KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. In 11th International Conference on Security and Cryptography, SECRYPT 2014, pp. 299-306, Vienna, Austria.
[53] Jinyong Chang and Rui Xue, On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E97-A, No.11, pp. 2267-2271, November, 2014.
[54] Meihua Wei, Jinyong Chang and Lan Qi, Existence and Statility of Positive Steady-State Solutions for a Lotka-Volterra System with Intraspecific Competition. Advances in Difference Equations. May 30, 2014.
[55] Jinyong Chang and Rui Xue, General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications. Journal of Software. Vol. 9(10), pp. 2557-2563, October, 2014.
[56] 常金勇,薛锐,史涛,ElGamal加密方案的KDM安全性. 密码学报,1(3): 235-243, 2014.
[57] Jinyong Chang, Note on Ground States of a Nonlinear Schrodinger System. Journal of Mathematical Analysis and Applications. 381(2), pp. 957-962, September, 2011.
[58] Jinyong Chang and Zhaoli Liu, Ground States of Nonlinear Schrodinger Systems. Proceedings of the American Mathematics Society. 138(2), pp. 687-693, Feb. 2010.
学术专著:
常金勇著,公钥加密体制下的 KDM 加密方案和安全性研究,哈尔滨工业大学出版社,2020.4.
发明专利:
[1] 常金勇; 邵必林; 边根庆; 籍艳艳; 段东立; 任乔川; 陈怡心; 管学宁; 赵宇博; 一种应用于智慧医疗系统的高效数据管理方法, 2021-11-16, 中国, 202111146688.0
[2] 常金勇; 邵必林; 边根庆; 籍艳艳; 贾雷刚; 张维琪; 张翔; 叶娜 ; 一种适用于多副本-多云情形下的无证书云审计方法, 2020-8-31, 中国, 202010366211.2
[3] 常金勇; 边根庆; 邵必林; 籍艳艳; 贾雷刚; 段东立; 张维琪; 张翔; 胡珍; 胡晓丽; 一种适用于第三方审计的高效云数据完整性验证方法, 2019-10-19, 中国, 201910996223.0
[4] 张芙宁; 常金勇; 籍艳艳; 田源; 适用于雾-云物联网应用场景下的重签名公共审计方法, 2024-4-30, 中国,2024105406782
[5] 张芙宁; 常金勇; 籍艳艳; 田源; 一种能高效容错并抵抗串通攻击的轻量化数据聚合方法, 2024-4-30, 中国,2024105406763
科研奖励:
常金勇(3/4); 多机理耦合的复杂系统临界相变分析及抗毁性评估, 陕西省教育厅, 陕西省高等学校科学技术研究优秀成果奖, 省部二等奖, 2022
社会兼职
(1)自2015年11月起担任中国保密协会隐私保护专委会委员。
(2)自2020年11月起成为中国密码学会会员。
(3)担任MobiSec’2019, ICCEAI’2022等国际会议的Program Committee。 担任IEEE/ACM Trans. Netw., IEEE Trans. on Circuits and Systems I, Computer Networks, Applied Math. Comp., Information Sciences, Computer Journal, TETT, IEICE Trans. on Fund., 西电学报,密码学报,信息安全学报,计算机研究与发展等诸多期刊的审稿人。