基本信息
薛锐  男  博导  中国科学院信息工程研究所
电子邮件: xuerui@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号B2 座
邮政编码: 100093

研究领域

密码学与安全协议, 安全协议分析的形式化方法.

招生信息

每年招收直博生1- 2 名. 只招收数学专业的学生(不要求密码学的基础)  , 只招收有志于将来从事理论科学研究的学生    

招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术

教育背景

1996-09--1999-07   北京师范大学数学系   博士
1985-09--1988-07   北京师范大学   硕士
1979-09--1983-07   北京师范大学   学士
学历
-- 研究生
学位
-- 博士
出国学习工作
1994-1995 德国 Passau 大学数学与信息系
2005-2006 美国 Purdue University 计算机系
2006-2007 美国 UIUC 计算机系

工作经历

   
社会兼职
2019-01-30-2024-03-05,信工所, 工会主席
2018-04-01-2023-10-01,信息安全国家重点实验室, 副主任
2017-12-09-2022-01-01,密码学会密码应用工作委员会, 副主任
2015-11-30-2022-05-01,中国保密协会隐私保护专业委员会, 秘书长
2014-12-31-2022-01-01,密码学会安全协议专委会, 副主任
2014-12-31-2018-12-30,软件学报, 责任编委
2014-06-30-2017-06-29,计算机研究与发展, 编委
2013-05-31-2017-11-30,信息安全国家重点实验室, 副主任
2012-01-01-2014-12-31,软件学报, 责任编委
2011-12-31-2024-03-05,北京交通大学, 兼职教授
2010-05-03-今,解放军信息工程大学, 兼职教授

教授课程

公钥密码学
理论密码学
算法数论与公钥密码习题课
算法数论与公钥密码
现代密码学
科学前沿进展名家系列讲座III
应用密码学

专利与奖励

1. 中国科学院大学朱李月华优秀教师(2016)

2. 全国网络空间安全优秀教师(2018)

专利成果
( 1 ) 抗选择明文攻击的基于属性的共享数据存储、访问方法及系统, 发明专利, 2022, 第 3 作者, 专利号: CN114039737A

( 2 ) 一种支持用户属性动态变化的匿名身份管理与验证方法, 发明专利, 2021, 第 3 作者, 专利号: CN113656826A

( 3 ) 一种结合交易与共识的智能服务交易区块链信誉管理方法和系统, 发明专利, 2020, 第 3 作者, 专利号: CN111241114A

( 4 ) 一种适用于联盟链的支持身份可追踪的高效匿名认证方法和系统, 专利授权, 2019, 第 3 作者, 专利号: CN110149304A

( 5 ) 一种基于分布式属性签名的区块链医疗数据管理方法和系统, 发明专利, 2019, 第 3 作者, 专利号: CN109979550A

( 6 ) 基于属性加密的用于机器学习环境下的访问控制方法和系统, 专利授权, 2019, 第 2 作者, 专利号: CN109347833A

( 7 ) 用于完整性保护的半脆弱唯一性图像水印嵌入及提取方法, 发明专利, 2017, 第 2 作者, 专利号: CN107103577A

( 8 ) 一种基于扩张密文的白盒密码加解密方法, 专利授权, 2016, 第 3 作者, 专利号: CN106059752A

出版信息

   
发表论文
[1] 童宇欣, 谢翔, 杨糠, 章睿, 薛锐. Efffcient Secure Multi-Party Computation for Proof of Custody in Ethereum Sharding. Designs, Codes and Cryptography[J]. 2024, 第 5 作者92(null): 2055-2083, 
[2] 李兆轩, 赵子鸣, 章睿, 卢昊洋, 李文灏, 张帆, 陆思奇, 薛锐. metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm. Computer Networks[J]. 2024, 第 8 作者250(null): 
[3] 李世敏, 王欣, 薛锐. 具有隐私保护的可验证计算研究进展. 信息安全学报[J]. 2024, 第 3 作者9(4): 180-203, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7762902&detailType=1.
[4] Tong, Yuxin, Xie, Xiang, Yang, Kang, Zhang, Rui, Xue, Rui. Efficient secure multi-party computation for proof of custody in Ethereum sharding. DESIGNS CODES AND CRYPTOGRAPHY[J]. 2024, 第 5 作者92(7): 2055-2083, http://dx.doi.org/10.1007/s10623-024-01379-w.
[5] 金保隆, 薛锐. Improved Lower Bound for the Complexity of Unique Shortest Vector Problem. Journal of Cybersecurity[J]. 2023, 第 2 作者  通讯作者  
[6] Chengjun Lin, Rui Xue, Xinyi Huang, Shaojun Yang. New tag-based signatures and their applications on linearly homomorphic signatures. COMPUTER STANDARDS & INTERFACES[J]. 2023, 第 2 作者  通讯作者  http://dx.doi.org/10.1016/j.csi.2023.103804.
[7] 李兆轩, 陆思奇, 章睿, Zhao Ziming, Rujin Liang, 薛锐, Li Wenhao, Zhang Fan, 高盛. VulHunter: Hunting Vulnerable Smart Contracts at EVM bytecode-level via Multiple Instance Learning. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING[J]. 2023, 第 6 作者
[8] 葛江峡, 陕天澍, 薛锐. Tighter QCCA-Secure Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 2023 Crypto. 2023, 第 3 作者  通讯作者  
[9] 陕天澍, 葛江峡, 薛锐. QCCA-Secure Generic Transformations in the Quantum Random Oracle Model. PKC 2023. 2023, 第 3 作者
[10] 曹书蛟, 薛锐. The Gap Is Sensitive to Size of Preimages: Collapsing Property Doesn’t Go Beyond Quantum Collision-Resistance for Preimages Bounded Hash Functions. Advances in Cryptology – CRYPTO 2022.. 2022, 第 2 作者  通讯作者  
[11] Qianqian Su, Rui Zhang, 薛锐, You Sun, Sheng Gao. Distributed Attribute-Based Signature with Attribute Dynamic Update for Smart Grid. Ieee Transactions on Industrial Informatics[J]. 2022, 第 3 作者
[12] Ji, Yanyan, Shao, Bilin, Chang, Jinyong, Xu, Maozhi, Xue, Rui. Identity-based remote data checking with a designated verifier. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS[J]. 2022, 第 5 作者11(1): http://dx.doi.org/10.1186/s13677-022-00279-5.
[13] Li, Shimin, Wang, Xin, Xue, Rui. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. COMPUTER JOURNAL[J]. 2022, 第 3 作者  通讯作者  65(4): 1020-1028, 
[14] Ji, Yanyan, Chang, Jinyong, Ren, Qiaochuan, Xu, Maozhi, Xue, Rui. Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. COMPUTER NETWORKS[J]. 2022, 第 5 作者212: http://dx.doi.org/10.1016/j.comnet.2022.109013.
[15] 李兆轩, Siqi Lu, Rui Zhang, 薛锐, 马雯秋, Rujin Liang, Ziming Zhao, Sheng Gao. SmartFast: An Accurate and Robust Formal Analysis Tool for Ethereum Smart Contracts. Empirical Software Engineering[J]. 2022, 第 4 作者
[16] Cao, Shujiao, Xue, Rui. Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives. THEORETICAL COMPUTER SCIENCE[J]. 2021, 第 2 作者  通讯作者  855: 16-42, http://dx.doi.org/10.1016/j.tcs.2020.11.013.
[17] Chang, Jinyong, Shao, Bilin, Ji, Yanyan, Xu, Maozhi, Xue, Rui. Secure network coding from secure proof of retrievability. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 第 5 作者64(12): 248-249, http://dx.doi.org/10.1007/s11432-020-2997-0.
[18] Han, Chunling, Xue, Rui. Differentially private GANs by adding noise to Discriminator's loss. COMPUTERS & SECURITY[J]. 2021, 第 2 作者  通讯作者  107: http://dx.doi.org/10.1016/j.cose.2021.102322.
[19] Li, Shimin, Liang, Bei, Mitrokotsa, Aikaterini, Xue, Rui. Homomorphic signcryption with public plaintext-result checkability. IET INFORMATION SECURITY[J]. 2021, 第 4 作者15(5): 333-350, https://doaj.org/article/08d9de667e9146a4808ee07608cba1f8.
[20] Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu. Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议[J]. 2020, 第 4 作者
[21] Li, Menghao, Wang, Pei, Wang, Wei, Wang, Shuai, Wu, Dinghao, Liu, Jian, Xue, Rui, Huo, Wei, Zou, Wei. Large-Scale Third-Party Library Detection in Android Markets. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING[J]. 2020, 第 7 作者46(9): 981-1003, 
[22] Liu, Muhua, Wu, Ying, Xue, Rui, Zhang, Rui. Verifiable outsourcing computation for modular exponentiation from shareable functions. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS[J]. 2020, 第 3 作者23(1): 43-55, https://www.webofscience.com/wos/woscc/full-record/WOS:000512937700004.
[23] Lin, ChengJun, Xue, Rui, Yang, ShaoJun, Huang, Xinyi, Li, Shimin. Linearly Homomorphic Signatures from Lattices. COMPUTER JOURNAL[J]. 2020, 第 2 作者  通讯作者  63(12): 1871-1885, http://dx.doi.org/10.1093/comjnl/bxaa034.
[24] Su, Qianqian, Zhang, Rui, Xue, Rui, Li, Pengchao. Revocable Attribute-Based Signature for Blockchain-Based Healthcare System. IEEE ACCESS[J]. 2020, 第 3 作者8: 127884-127896, https://doaj.org/article/602acd6994744474b61bd5dcef13dac9.
[25] Su, Qianqian, Zhang, Rui, Xue, Rui. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. COMPUTER JOURNAL[J]. 2020, 第 3 作者  通讯作者  63(8): 1271-1284, https://www.webofscience.com/wos/woscc/full-record/WOS:000582318200012.
[26] Wang Xueqing, Wang Biao, Liang Bei, Xue Rui. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版)[J]. 2019, 第 4 作者62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.
[27] Su, Qianqian, Zhang, Rui, Xue, Rui, Sun, You, Miller, J, Stroulia, E, Lee, K, Zhang, LJ. An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain. WEB SERVICES - ICWS 2019. 2019, 第 3 作者11512: 110-125, 
[28] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. FUTURE GENERATION COMPUTER SYSTEMS. 2019, 第 4 作者91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.
[29] Zhang, Rui, Xue, Rui, Liu, Ling. Security and Privacy on Blockchain. ACM COMPUTING SURVEYS[J]. 2019, 第 2 作者52(3): http://dx.doi.org/10.1145/3316481.
[30] Wang, Xin, Li, Shimin, Xue, Rui, Attrapadung, N, Yagi, T. Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019. 2019, 第 3 作者  通讯作者  11689: 273-283, 
[31] Xueqing WANG, Biao WANG, Bei LIANG, Rui XUE. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版). 2019, 第 4 作者62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.
[32] Chang, Jinyong, Ji, Yanyan, Xu, Maozhi, Xue, Rui. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2019, 第 4 作者91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.
[33] 薛锐, 彭长根, 田有亮. 理性密码协议专栏序言(中英文). 密码学报[J]. 2019, 第 1 作者83-86, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849574849484857.
[34] Xueqing WANG, Biao WANG, Bei LIANG, Rui XUE. A more compact multi-id identity-based FHE scheme in the standard model and its applications. SCIENCE CHINA Information Sciences[J]. 2019, 第 4 作者  通讯作者  62(3): https://www.sciengine.com/doi/10.1007/s11432-017-9412-3.
[35] Chang, Jinyong, Ma, Hui, Zhang, Anling, Xu, Maozhi, Xue, Rui. RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE ACCESS[J]. 2019, 第 5 作者7: 50858-50868, https://doaj.org/article/a64fcdb62d14468580928f33d82fd7a7.
[36] 王学庆, 王彪, 薛锐. 具有短密文的多身份全同态加密构造框架. 信息安全学报[J]. 2018, 第 3 作者3(5): 54-63, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180505&flag=1.
[37] Wang, Biao, Wang, Xueqing, Xue, Rui, Huang, Xinyi. Matrix FHE and Its Application in Optimizing Bootstrapping. COMPUTER JOURNAL[J]. 2018, 第 3 作者  通讯作者  61(12): 1845-1861, http://dx.doi.org/10.1093/comjnl/bxy088.
[38] Wang Xueqing, Wang Biao, Xue Rui, Qing S, Mitchell C, Chen L, Liu D. Two Efficient Tag-Based Encryption Schemes on Lattices. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017. 2018, 第 3 作者  通讯作者  10631: 118-131, 
[39] Zhang, Rui, Xue, Rui, Liu, Ling. Searchable Encryption for Healthcare Clouds: A Survey. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2018, 第 2 作者11(6): 978-996, http://dx.doi.org/10.1109/TSC.2017.2762296.
[40] 薛锐, 彭长根, 黄欣沂, 刘吉强, 禹勇. 面向隐私保护的新型技术与密码算法专题前言. 软件学报[J]. 2018, 第 1 作者29(7): 1827-1829, http://lib.cqvip.com/Qikan/Article/Detail?id=675582148.
[41] Chen, Xiaoquan, Xue, Rui, Wu, Chuankun. Timely address space rerandomization for resisting code reuse attacks. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 第 2 作者  通讯作者  29(16): https://www.webofscience.com/wos/woscc/full-record/WOS:000406232100001.
[42] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 第 4 作者9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.
[43] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 第 4 作者9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.
[44] 陈小全, 薛锐. 程序漏洞:原因、利用与缓解——以C和C++语言为例. 信息安全学报[J]. 2017, 第 2 作者2(4): 41-56, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20170404&flag=1.
[45] 王贞灵, 薛锐, 陈驰, 田雪, 顾广宇. 多源异构数据的云平台安全态势评估系统. 网络新媒体技术[J]. 2017, 第 2 作者6(3): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=672292002.
[46] 王欣, 薛锐. 对于一个新的CCA安全的密码方案的分析. 密码学报[J]. 2017, 第 2 作者4(2): 106-113,  http://dx.doi.org/10.13868/j.cnki.jcr.000167.
[47] 王学庆, 薛锐. 标准模型下适应性安全的BF-IBE方案. 密码学报[J]. 2017, 第 2 作者4(1): 38-48,  http://dx.doi.org/10.13868/j.cnki.jcr.000161.
[48] Wang Zhenling, Xue Rui, Chen Chi, Shen Peisong, Destech Publicat Inc. A Real-time Security Situation Assessment System Designed for Cloud Platform. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016). 2016, 第 2 作者300-308, 
[49] Zhang, Rui, Xue, Rui, Yu, Ting, Liu, Ling. Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. ACM TRANSACTIONS ON INTERNET TECHNOLOGY[J]. 2016, 第 2 作者16(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000382684800007.
[50] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Separations in circular security for arbitrary length key cycles, revisited. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 第 4 作者9(18): 5392-5400, https://www.webofscience.com/wos/woscc/full-record/WOS:000398221800041.
[51] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 第 4 作者9(16): 3309-3313, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100022.
[52] 薛锐, 任奎, 张玉清, 李晖, 刘吉强, 赵波, 祝烈煌. 云计算安全研究专刊前言. 软件学报[J]. 2016, 第 1 作者1325-1327, http://lib.cqvip.com/Qikan/Article/Detail?id=669126880.
[53] Xu, Jian, Zhou, Fucai, Jiang, Zhihao, Xue, Rui. Dynamic proofs of retrievability with square-root oblivious RAM. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING[J]. 2016, 第 4 作者7(5): 611-621, https://www.webofscience.com/wos/woscc/full-record/WOS:000383132800002.
[54] Liu Muhua, Wu Ying, Xue Rui, Dunkelman O, Sanadhya SK. Verifiable Computation for Randomized Algorithm. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016. 2016, 第 3 作者  通讯作者  10095: 99-118, 
[55] 徐剑, 李明洁, 周福才, 薛锐. 基于用户鼠标行为的身份认证方法. 计算机科学[J]. 2016, 第 4 作者43(2): 148-154, http://lib.cqvip.com/Qikan/Article/Detail?id=668293762.
[56] Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue. An Approach for Mitigating Potential Threats in Practical SSO Systems. Inscrypt. 2015, 第 5 作者null(null): 
[57] Chang, Jinyong, Xue, Rui. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 第 2 作者8(8): 1525-1536, http://dx.doi.org/10.1002/sec.1101.
[58] 章睿, 薛锐, 林东岱. 海云安全体系架构. 中国科学: 信息科学[J]. 2015, 第 2 作者45(6): 796-816, https://www.sciengine.com/doi/10.1360/N112014-00332.
[59] Chang, Jinyong, Xue, Rui, Zhang, Anling. The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, 第 2 作者E98A(4): 1032-1037, https://www.webofscience.com/wos/woscc/full-record/WOS:000359466100012.
[60] Wang, Qiuyan, Ding, Kelan, Xue, Rui. Binary Linear Codes With Two Weights. IEEE COMMUNICATIONS LETTERS[J]. 2015, 第 3 作者19(7): 1097-1100, https://www.webofscience.com/wos/woscc/full-record/WOS:000357793600004.
[61] 薛锐, 吴迎, 刘牧华, 张良峰, 章睿. 可验证计算研究进展. 中国科学: 信息科学[J]. 2015, 第 1 作者45(11): 1370-1388, https://www.sciengine.com/doi/10.1360/N112014-00336.
[62] Chang, Jinyong, Xue, Rui. On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, 第 2 作者E97A(11): 2267-2271, https://www.webofscience.com/wos/woscc/full-record/WOS:000351567000026.
[63] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 第 4 作者271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.
[64] Zhang, Rui, Liu, Ling, Xue, Rui. Role-based and time-bound access and management of EHR data. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 第 3 作者7(6): 994-1015, http://dx.doi.org/10.1002/sec.817.
[65] 雷新锋, 宋书民, 刘伟兵, 薛锐. 计算可靠的密码协议形式化分析综述. 计算机学报[J]. 2014, 第 4 作者37(5): 993-1016, http://lib.cqvip.com/Qikan/Article/Detail?id=49658516.
发表著作
(1) 密码协议分析的逻辑分析方法, The Logical Methods to Analysis of Security Protocols, 科学出版社, 2013-03, 第 2 作者
(2) 公钥加密理论, The Public-Key Encryption Theory, 科学出版社, 2016-06, 第 1 作者
软件著作权
(1)  ASM-SPV AnB2IF 协议语言转换系统 V1.0. 登记号: 2013SR043545. 2013年2月26日 
(2) 多中央权威的基于属性签名系统 V1.0. 登记号: 2013SR049259. 2013年2月26日

国际会议委员

ProvSec 2012,InTrust 2012,INTRUST 2011,AsiaPKC 2013,ISPEC 2015,AsiaCCS 2016,INTRUST 2015,ICICS 2015,ATIS 2016,PSBD 2017,ATIS2017