基本信息

马晖  男    中国科学院信息工程研究所
电子邮件: mahui@iie.ac.cn
通信地址: 北京市海淀区杏石口65号益园文创基地C2东段
邮政编码: 100195

研究领域

应用密码学、密码工程学

招生信息

招收2021级硕士生1名

招生专业
083900-网络空间安全
招生方向
应用密码学

教育背景

   
学历
研究生

学位
博士

经历

2008.9-2012.6 南京航空航天大学,信息安全,学士;

2012.9-2017.7 中国科学院信息工程研究所,信息安全,博士

工作经历

   
工作简历
2019-10~2020-06,中国科学院信息工程研究所, 副研究员
2017-07~2019-10,中国科学院信息工程研究所, 助理研究员

专利与奖励

   
专利成果
[1] 张锐, 王加贝, 马晖. 一种基于属性加密的区块链数据监管方法及系统. CN: CN111859444B, 2022-03-01.
[2] 周永彬, 王提, 马晖, 张锐. 一种支持双重访问控制的数据共享方法及系统. CN: CN113810368A, 2021-12-17.
[3] 周永彬, 王提, 马晖, 张锐. 一种云计算环境下的安全可控高效的数据共享方法及系统. CN: CN109831430A, 2019-05-31.
[4] 张锐, 肖禹亭, 马晖. 基于云存储的区块链可靠数据存储方法、终端及系统. CN: CN107770154A, 2018-03-06.
[5] 张锐, 肖禹亭, 马晖. 一种可监管的区块链系统及方法. CN: CN107483198A, 2017-12-15.

出版信息

   
发表论文
[1] 徐文翰, 马晖, 宋子帅, 李建豪, 张锐. Gringotts: An Encrypted Version Control System With Less Trust on Servers. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2024, [2] Song, Zishuai, Ma, Hui, Zhang, Rui, Xu, Wenhan, Li, Jianhao. Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 2234-2249, http://dx.doi.org/10.1109/TIFS.2023.3266164.
[3] 宋子帅, 马晖, 孙书洲, 辛衍森, 张锐. Rainbow: reliable personally identifiable information retrieval across multi-cloud. Cybersecurity[J]. 2023, 6(19): https://cybersecurity.springeropen.com/articles/10.1186/s42400-023-00146-z.
[4] Wang, Ti, Zhou, Yongbin, Ma, Hui, Zhang, Rui. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. COMPUTER JOURNAL[J]. 2023, 66(6): 1507-1524, http://dx.doi.org/10.1093/comjnl/bxac024.
[5] Li, Jianhao, Ma, Hui, Wang, Jiabei, Song, Zishuai, Xu, Wenhan, Zhang, Rui. Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2023, 18: 1653-1666, http://dx.doi.org/10.1109/TIFS.2023.3245406.
[6] Wang, Ti, Zhou, Yongbin, Ma, Hui, Zhang, Rui. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud. COMPUTER JOURNAL. 2022, http://dx.doi.org/10.1093/comjnl/bxac024.
[7] Wang, Ti, Zhou, Yongbin, Ma, Hui, Zhang, Rui. Enhanced Dual-Policy Attribute-Based Encryption for Secure Data Sharing in the Cloud. SECURITY AND COMMUNICATION NETWORKS[J]. 2022, 2022: [8] Ma Hui, Sun Shuzhou, Song Zishuai, Zhang Rui. WebCloud: Web-Based Cloud Storage for Secure Data Sharing across Platforms. IEEE Transactions on Dependable and Secure Computing[J]. 2022, 19(3): 1871-1884, [9] Ma, Hui, Zhang, Rui, Sun, Shuzhou, Song, Zishuai, Tan, Gaosheng. Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2022, 15(1): 164-173, http://dx.doi.org/10.1109/TSC.2019.2925028.
[10] Wang, Ti, Ma, Hui, Zhou, Yongbin, Zhang, Rui, Song, Zishuai. Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2021, 18(4): 2005-2016, http://dx.doi.org/10.1109/TDSC.2019.2947579.
[11] Shuzhou SUN, Rui ZHANG, Hui MA. Hashing multiple messages with SM3 on GPU platforms. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 64(9): 237-239, http://dx.doi.org/10.1007/s11432-018-9648-x.
[12] Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu. Server-aided immediate and robust user revocation mechanism for SM9. CYBERSECURITY[J]. 2020, 3(1): 1-13, [13] Sun, Shuzhou, Zhang, Rui, Ma, Hui. Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2020, 31(11): 2542-2555, https://www.webofscience.com/wos/woscc/full-record/WOS:000543007900002.
[14] Ma Hui. Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model. CT-RSA 2020. 2020, [15] Ma, Hui, Zhang, Rui, Yang, Guomin, Song, Zishuai, He, Kai, Xiao, Yuting. Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2020, 17(5): 1026-1038, http://dx.doi.org/10.1109/TDSC.2018.2844814.
[16] Ma Hui. Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. IEEE TRANSACTIONS ON SERVICES COMPUTING. 2019, [17] Chang, Jinyong, Ma, Hui, Zhang, Anling, Xu, Maozhi, Xue, Rui. RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE ACCESS[J]. 2019, 7: 50858-50868, https://doaj.org/article/a64fcdb62d14468580928f33d82fd7a7.
[18] Ma Hui. Certifying Variant of RSA with Generalized Moduli. ICICS 2018. 2018, [19] Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Liang, Kaitai, Ma, Hui, Wei, Lifei. Auditable sigma-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2018, 13(1): 94-105, https://www.webofscience.com/wos/woscc/full-record/WOS:000417725500007.
[20] Ma Hui, Zhang Rui, Yang Guomin, Song Zishuai, Sun Shuzhou, Xiao Yuting, Lopez J, Zhou J, Soriano M. Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls Secure and Efficient Fine-Grained Access Control on Corrupted Machines. COMPUTER SECURITY (ESORICS 2018), PT IInull. 2018, 11099: 507-526, [21] Zhang, Rui, Ma, Hui, Lu, Yao. Fine-grained access control system based on fully outsourced attribute-based encryption. JOURNAL OF SYSTEMS AND SOFTWARE[J]. 2017, 125: 344-353, http://dx.doi.org/10.1016/j.jss.2016.12.018.
[22] Zhang Rui, Ma Hui, Lu Yao. Fine-grained access control system based on fully outsourced attribute-based encryption. THE JOURNAL OF SYSTEMS & SOFTWARE[J]. 2017, 125: 344-353, http://dx.doi.org/10.1016/j.jss.2016.12.018.
[23] 张锐, 谭高升, 马晖, 陶杨. 支持全同态密文计算的访问控制加密方案. 南京信息工程大学学报(自然科学版)[J]. 2017, 9(5): 516-520, http://lib.cqvip.com/Qikan/Article/Detail?id=673331106.
[24] Xiong, Hu, Sun, Jianfei. Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing". IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTINGnull. 2017, 14(4): 461-462, https://www.webofscience.com/wos/woscc/full-record/WOS:000405370300009.
[25] Ma, Hui, Zhang, Rui, Wan, Zhiguo, Lu, Yao, Lin, Suqing. Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2017, 14(6): 679-692, https://www.webofscience.com/wos/woscc/full-record/WOS:000415714300009.
[26] Zhang, Rui, Ma, Hui, Lu, Yao, Li, Yang. Provably secure cloud storage for mobile networks with less computation and smaller overhead. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(12): 175-187, http://lib.cqvip.com/Qikan/Article/Detail?id=673840363.
[27] Zhang, Rui, Ma, Hui, Lu, Yao, Li, Yang. Provably secure cloud storage for mobile networks with less computation and smaller overhead. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2017, 60(12): 175-187, http://lib.cqvip.com/Qikan/Article/Detail?id=673840363.
[28] Rui ZHANG, Hui MA, Yao LU, Yang LI. Provably secure cloud storage for mobile networks with less computation and smaller overhead. 中国科学:信息科学(英文版)[J]. 2017, 60(12): 122104-1, http://lib.cqvip.com/Qikan/Article/Detail?id=673840363.
[29] Ma, Hui, Zhang, Rui, Yuan, Wei. Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption" (vol 10, pg 190, 2015). IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITYnull. 2016, 11(4): 866-867, https://www.webofscience.com/wos/woscc/full-record/WOS:000370734700016.
[30] Lin, Suqing, Zhang, Rui, Ma, Hui, Wang, Mingsheng. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2015, 10(10): 2119-2130, https://www.webofscience.com/wos/woscc/full-record/WOS:000360891300008.

科研活动

   
科研项目
( 1 ) 行业大数据安全受控共享 核心系统研, 主持, 省级, 2019-05--2020-12
( 2 ) 支持快速撤销及外包计算 的服务器辅助属性加密研 究, 主持, 国家级, 2019-01--2021-12
( 3 ) 云环境下安全数据共享与访问控制机制研究, 参与, 国家级, 2020-01--2023-12
( 4 ) 引进优秀青年人才马晖, 主持, 市地级, 2018-01--2020-12