基本信息

薛锐 男 博导 中国科学院信息工程研究所
电子邮件: xuerui@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号B2 座
邮政编码: 100093
电子邮件: xuerui@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号B2 座
邮政编码: 100093
研究领域
密码学与安全协议, 安全协议分析的形式化方法.
招生信息
每年招收直博生1- 2 名. 只招收数学专业的学生(不要求密码学的基础) , 只招收有志于将来从事理论科学研究的学生
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术
教育背景
1996-09--1999-07 北京师范大学数学系 博士
学历
-- 研究生
学位
-- 博士
出国学习工作
1994-1995 德国 Passau 大学数学与信息系
2005-2006 美国 Purdue University 计算机系
2006-2007 美国 UIUC 计算机系
2005-2006 美国 Purdue University 计算机系
2006-2007 美国 UIUC 计算机系
工作经历
社会兼职
2019-02-01-今,信工所, 工会主席
2018-04-02-今,信息安全国家重点实验室, 副主任
2017-12-10-今,密码学会密码应用工作委员会, 副主任
2015-12-01-今,中国保密协会隐私保护专业委员会, 秘书长
2015-01-01-今,密码学会安全协议专委会, 副主任
2015-01-01-2018-12-31,软件学报, 责任编委
2014-07-01-2017-06-30,计算机研究与发展, 编委
2013-06-01-2017-12-01,信息安全国家重点实验室, 副主任
2012-01-01-2014-12-31,软件学报, 责任编委
2012-01-01-今,北京交通大学, 兼职教授
2010-05-03-今,解放军信息工程大学, 兼职教授
2018-04-02-今,信息安全国家重点实验室, 副主任
2017-12-10-今,密码学会密码应用工作委员会, 副主任
2015-12-01-今,中国保密协会隐私保护专业委员会, 秘书长
2015-01-01-今,密码学会安全协议专委会, 副主任
2015-01-01-2018-12-31,软件学报, 责任编委
2014-07-01-2017-06-30,计算机研究与发展, 编委
2013-06-01-2017-12-01,信息安全国家重点实验室, 副主任
2012-01-01-2014-12-31,软件学报, 责任编委
2012-01-01-今,北京交通大学, 兼职教授
2010-05-03-今,解放军信息工程大学, 兼职教授
教授课程
公钥密码学理论密码学算法数论与公钥密码算法数论与公钥密码习题课现代密码学科学前沿进展名家系列讲座III应用密码学
专利与奖励
1. 中国科学院大学朱李月华优秀教师(2016)
2. 全国网络空间安全优秀教师(2018)
专利成果
[1] 苏倩倩, 章睿, 薛锐, 孙优. 抗选择明文攻击的基于属性的共享数据存储、访问方法及系统. CN: CN114039737A, 2022-02-11.[2] 苏倩倩, 章睿, 薛锐, 孙优. 一种支持用户属性动态变化的匿名身份管理与验证方法. CN: CN113656826A, 2021-11-16.[3] 孙优, 章睿, 薛锐, 苏倩倩. 一种结合交易与共识的智能服务交易区块链信誉管理方法和系统. CN: CN111241114A, 2020-06-05.[4] 苏倩倩, 章睿, 薛锐, 孙优. 一种适用于联盟链的支持身份可追踪的高效匿名认证方法和系统. CN: CN110149304A, 2019-08-20.[5] 孙优, 章睿, 薛锐, 苏倩倩. 一种基于分布式属性签名的区块链医疗数据管理方法和系统. CN: CN109979550A, 2019-07-05.[6] 韩春玲, 薛锐. 基于属性加密的用于机器学习环境下的访问控制方法和系统. CN: CN109347833A, 2019-02-15.[7] 韩春玲, 薛锐. 用于完整性保护的半脆弱唯一性图像水印嵌入及提取方法. CN: CN107103577A, 2017-08-29.[8] 许涛, 武传坤, 薛锐. 一种基于扩张密文的白盒密码加解密方法. CN: CN106059752A, 2016-10-26.
出版信息
发表论文
[1] 金保隆, 薛锐. Improved Lower Bound for the Complexity of Unique Shortest Vector Problem. Journal of Cybersecurity[J]. 2023, [2] Chengjun Lin, Rui Xue, Xinyi Huang, Shaojun Yang. New tag-based signatures and their applications on linearly homomorphic signatures. COMPUTER STANDARDS & INTERFACES[J]. 2023, http://dx.doi.org/10.1016/j.csi.2023.103804.[3] 李兆轩, 陆思奇, 章睿, Zhao Ziming, Rujin Liang, 薛锐, Li Wenhao, Zhang Fan, 高盛. VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING[J]. 2023, [4] 葛江峡, 陕天澍, 薛锐. Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 2023 Cryptonull. 2023, [5] 陕天澍, 葛江峡, 薛锐. QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. PKC 2023null. 2023, [6] 曹书蛟, 薛锐. The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn’t Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. Advances in Cryptology – CRYPTO 2022.null. 2022, [7] Qianqian Su, Rui Zhang, 薛锐, You Sun, Sheng Gao. Distributed Attribute-Based Signature with Attribute Dynamic Update for Smart Grid. Ieee Transactions on Industrial Informatics[J]. 2022, [8] Ji, Yanyan, Shao, Bilin, Chang, Jinyong, Xu, Maozhi, Xue, Rui. Identity-based remote data checking with a designated verifier. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS[J]. 2022, 11(1): http://dx.doi.org/10.1186/s13677-022-00279-5.[9] Li, Shimin, Wang, Xin, Xue, Rui. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. COMPUTER JOURNAL[J]. 2022, 65(4): 1020-1028, [10] Ji, Yanyan, Chang, Jinyong, Ren, Qiaochuan, Xu, Maozhi, Xue, Rui. Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. COMPUTER NETWORKS[J]. 2022, 212: http://dx.doi.org/10.1016/j.comnet.2022.109013.[11] 李兆轩, Siqi Lu, Rui Zhang, 薛锐, 马雯秋, Rujin Liang, Ziming Zhao, Sheng Gao. SmartFast: An Accurate and Robust Formal Analysis Tool for Ethereum Smart Contracts. Empirical Software Engineering[J]. 2022, [12] Cao, Shujiao, Xue, Rui. Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives. THEORETICAL COMPUTER SCIENCE[J]. 2021, 855: 16-42, http://dx.doi.org/10.1016/j.tcs.2020.11.013.[13] Chang, Jinyong, Shao, Bilin, Ji, Yanyan, Xu, Maozhi, Xue, Rui. Secure network coding from secure proof of retrievability. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 64(12): 248-249, http://dx.doi.org/10.1007/s11432-020-2997-0.[14] Han, Chunling, Xue, Rui. Differentially private GANs by adding noise to Discriminator's loss. COMPUTERS & SECURITY[J]. 2021, 107: http://dx.doi.org/10.1016/j.cose.2021.102322.[15] Li, Shimin, Liang, Bei, Mitrokotsa, Aikaterini, Xue, Rui. Homomorphic signcryption with public plaintext-result checkability. IET INFORMATION SECURITY[J]. 2021, 15(5): 333-350, https://doaj.org/article/08d9de667e9146a4808ee07608cba1f8.[16] Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu. Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议[J]. 2020, [17] Li, Menghao, Wang, Pei, Wang, Wei, Wang, Shuai, Wu, Dinghao, Liu, Jian, Xue, Rui, Huo, Wei, Zou, Wei. Large-Scale Third-Party Library Detection in Android Markets. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING[J]. 2020, 46(9): 981-1003, [18] Liu, Muhua, Wu, Ying, Xue, Rui, Zhang, Rui. Verifiable outsourcing computation for modular exponentiation from shareable functions. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS[J]. 2020, 23(1): 43-55, https://www.webofscience.com/wos/woscc/full-record/WOS:000512937700004.[19] Su, Qianqian, Zhang, Rui, Xue, Rui, Li, Pengchao. Revocable Attribute-Based Signature for Blockchain-Based Healthcare System. IEEE ACCESS[J]. 2020, 8: 127884-127896, https://doaj.org/article/602acd6994744474b61bd5dcef13dac9.[20] Lin, ChengJun, Xue, Rui, Yang, ShaoJun, Huang, Xinyi, Li, Shimin. Linearly Homomorphic Signatures from Lattices. COMPUTER JOURNAL[J]. 2020, 63(12): 1871-1885, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100007.[21] Su, Qianqian, Zhang, Rui, Xue, Rui. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. COMPUTER JOURNAL[J]. 2020, 63(8): 1271-1284, https://www.webofscience.com/wos/woscc/full-record/WOS:000582318200012.[22] Wang Xueqing, Wang Biao, Liang Bei, Xue Rui. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版)[J]. 2019, 62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[23] Su, Qianqian, Zhang, Rui, Xue, Rui, Sun, You, Miller, J, Stroulia, E, Lee, K, Zhang, LJ. An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain. WEB SERVICES - ICWS 2019null. 2019, 11512: 110-125, [24] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. FUTURE GENERATION COMPUTER SYSTEMS. 2019, 91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.[25] Zhang, Rui, Xue, Rui, Liu, Ling. Security and Privacy on Blockchain. ACM COMPUTING SURVEYS[J]. 2019, 52(3): http://dx.doi.org/10.1145/3316481.[26] Wang, Xin, Li, Shimin, Xue, Rui, Attrapadung, N, Yagi, T. Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019null. 2019, 11689: 273-283, [27] Chang, Jinyong, Ji, Yanyan, Xu, Maozhi, Xue, Rui. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2019, 91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.[28] Xueqing WANG, Biao WANG, Bei LIANG, Rui XUE. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版). 2019, 62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[29] 薛锐, 彭长根, 田有亮. 理性密码协议专栏序言(中英文). 密码学报[J]. 2019, 83-86, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849574849484857.[30] Wang, Xueqing, Wang, Biao, Liang, Bei, Xue, Rui. A more compact multi-id identity-based FHE scheme in the standard model and its applications. SCIENCE CHINA-INFORMATION SCIENCES. 2019, 62(3): http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[31] Chang, Jinyong, Ma, Hui, Zhang, Anling, Xu, Maozhi, Xue, Rui. RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE ACCESS[J]. 2019, 7: 50858-50868, https://doaj.org/article/a64fcdb62d14468580928f33d82fd7a7.[32] 王学庆, 王彪, 薛锐. 具有短密文的多身份全同态加密构造框架. 信息安全学报[J]. 2018, 3(5): 54-63, http://lib.cqvip.com/Qikan/Article/Detail?id=676689802.[33] Wang, Biao, Wang, Xueqing, Xue, Rui, Huang, Xinyi. Matrix FHE and Its Application in Optimizing Bootstrapping. COMPUTER JOURNAL[J]. 2018, 61(12): 1845-1861, http://dx.doi.org/10.1093/comjnl/bxy088.[34] Wang Xueqing, Wang Biao, Xue Rui, Qing S, Mitchell C, Chen L, Liu D. Two Efficient Tag-Based Encryption Schemes on Lattices. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 118-131, [35] Zhang, Rui, Xue, Rui, Liu, Ling. Searchable Encryption for Healthcare Clouds: A Survey. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2018, 11(6): 978-996, http://dx.doi.org/10.1109/TSC.2017.2762296.[36] 薛锐, 彭长根, 黄欣沂, 刘吉强, 禹勇. 面向隐私保护的新型技术与密码算法专题前言. 软件学报[J]. 2018, 29(7): 1827-1829, http://lib.cqvip.com/Qikan/Article/Detail?id=675582148.[37] Chen, Xiaoquan, Xue, Rui, Wu, Chuankun. Timely address space rerandomization for resisting code reuse attacks. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 29(16): https://www.webofscience.com/wos/woscc/full-record/WOS:000406232100001.[38] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.[39] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.[40] 陈小全, 薛锐. 程序漏洞:原因、利用与缓解——以C和C++语言为例. 信息安全学报[J]. 2017, 2(4): 41-56, http://lib.cqvip.com/Qikan/Article/Detail?id=673577078.[41] 王欣, 薛锐. 对于一个新的CCA安全的密码方案的分析. 密码学报[J]. 2017, 4(2): 106-113, http://dx.doi.org/10.13868/j.cnki.jcr.000167.[42] 王贞灵, 薛锐, 陈驰, 田雪, 顾广宇. 多源异构数据的云平台安全态势评估系统. 网络新媒体技术[J]. 2017, 6(3): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=672292002.[43] 王学庆, 薛锐. 标准模型下适应性安全的BF-IBE方案. 密码学报[J]. 2017, 4(1): 38-48, http://dx.doi.org/10.13868/j.cnki.jcr.000161.[44] Wang Zhenling, Xue Rui, Chen Chi, Shen Peisong, Destech Publicat Inc. A Real-time Security Situation Assessment System Designed for Cloud Platform. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016)null. 2016, 300-308, [45] Zhang, Rui, Xue, Rui, Yu, Ting, Liu, Ling. Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. ACM TRANSACTIONS ON INTERNET TECHNOLOGY[J]. 2016, 16(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000382684800007.[46] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Separations in circular security for arbitrary length key cycles, revisited. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5392-5400, https://www.webofscience.com/wos/woscc/full-record/WOS:000398221800041.[47] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(16): 3309-3313, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100022.[48] 薛锐, 任奎, 张玉清, 李晖, 刘吉强, 赵波, 祝烈煌. 云计算安全研究专刊前言. 软件学报[J]. 2016, 1325-1327, http://lib.cqvip.com/Qikan/Article/Detail?id=669126880.[49] Xu, Jian, Zhou, Fucai, Jiang, Zhihao, Xue, Rui. Dynamic proofs of retrievability with square-root oblivious RAM. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING[J]. 2016, 7(5): 611-621, https://www.webofscience.com/wos/woscc/full-record/WOS:000383132800002.[50] Liu Muhua, Wu Ying, Xue Rui, Dunkelman O, Sanadhya SK. Verifiable Computation for Randomized Algorithm. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016null. 2016, 10095: 99-118, [51] 徐剑, 李明洁, 周福才, 薛锐. 基于用户鼠标行为的身份认证方法. 计算机科学[J]. 2016, 43(2): 148-154, http://lib.cqvip.com/Qikan/Article/Detail?id=668293762.[52] Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue. An Approach for Mitigating Potential Threats in Practical SSO Systems. Inscryptnull. 2015, [53] Chang, Jinyong, Xue, Rui. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(8): 1525-1536, https://www.webofscience.com/wos/woscc/full-record/WOS:000353887000009.[54] 章睿, 薛锐, 林东岱. 海云安全体系架构. 中国科学. 信息科学[J]. 2015, 45(6): 796-816, https://www.sciengine.com/doi/10.1360/N112014-00332.[55] Chang, Jinyong, Xue, Rui, Zhang, Anling. The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, E98A(4): 1032-1037, https://www.webofscience.com/wos/woscc/full-record/WOS:000359466100012.[56] Wang, Qiuyan, Ding, Kelan, Xue, Rui. Binary Linear Codes With Two Weights. IEEE COMMUNICATIONS LETTERS[J]. 2015, 19(7): 1097-1100, https://www.webofscience.com/wos/woscc/full-record/WOS:000357793600004.[57] 薛锐, 吴迎, 刘牧华, 张良峰, 章睿. 可验证计算研究进展. 中国科学. 信息科学[J]. 2015, 45(11): 1370-1388, http://www.corc.org.cn/handle/1471x/2239679.[58] Chang, Jinyong, Xue, Rui. On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(11): 2267-2271, https://www.webofscience.com/wos/woscc/full-record/WOS:000351567000026.[59] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.[60] Zhang, Rui, Liu, Ling, Xue, Rui. Role-based and time-bound access and management of EHR data. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 7(6): 994-1015, http://dx.doi.org/10.1002/sec.817.[61] 雷新锋, 宋书民, 刘伟兵, 薛锐. 计算可靠的密码协议形式化分析综述. 计算机学报[J]. 2014, 37(5): 993-1016, http://lib.cqvip.com/Qikan/Article/Detail?id=49658516.
发表著作
(1) 密码协议分析的逻辑分析方法, The Logical Methods to Analysis of Security Protocols, 科学出版社, 2013-03, 第 2 作者(2) 公钥加密理论, The Public-Key Encryption Theory, 科学出版社, 2016-06, 第 1 作者
软件著作权
(1) ASM-SPV AnB2IF 协议语言转换系统 V1.0. 登记号: 2013SR043545. 2013年2月26日
(2) 多中央权威的基于属性签名系统 V1.0. 登记号: 2013SR049259. 2013年2月26日
(2) 多中央权威的基于属性签名系统 V1.0. 登记号: 2013SR049259. 2013年2月26日
国际会议委员
ProvSec 2012,InTrust 2012,INTRUST 2011,AsiaPKC 2013,ISPEC 2015,AsiaCCS 2016,INTRUST 2015,ICICS 2015,ATIS 2016,PSBD 2017,ATIS2017