基本信息
陈克非  男  博导  其他
电子邮件: kfchen@hznu.edu.cn
通信地址: 杭州市仓前余杭塘路2318号杭州师范大学理学院
邮政编码: 311121

研究领域

网络空间安全,密码理论与应用,云计算与数据安全

招生信息

   
招生专业
083900-网络空间安全
招生方向
密码协议理论与技术,云计算安全理论与技术

教育背景

1991-04--1994-09   德国吉森大学(Justus-Liebig-University Giessen)   博士
1990-10--1991-03   曼海姆歌德学院   德语培训
1982-09--1985-04   西北电讯工程学院   应用数学硕士
1978-03--1982-01   西北电讯工程学院   应用数学学士

工作经历

   
工作简历
2013-02~现在, 杭州师范大学, 教授
1998-12~2013-01,上海交通大学, 教授
1996-07~1998-11,上海交通大学, 副教授
1982-01~1990-09,西北电讯工程学院/西安电子科技大学, 助教、讲师
社会兼职
2016-05-07-今,中国密码学会, 副理事长
2014-01-01-今,密码学报, 领域编委
2010-03-01-今,计算机学报, 编委
2006-06-01-今,软件学报, 领域编委

专利与奖励

   

出版信息

   
发表论文
(1) Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings, IEEE Access, 2021, 第 4 作者
(2) On the Security of a Key Agreement and Key Protection Scheme, IEEE Trans. Information Forensics and Security, 2020, 第 4 作者
(3) Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks, IEEE Trans. Dependable Secur. Comput., 2020, 第 3 作者
(4) Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions, Peer Peer Netw. Appl., 2020, 第 2 作者
(5) Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation, Int. J. Inf. Sec., 2020, 第 4 作者
(6) Reusable Fuzzy Extractor Based on the LPN Assumption, Comput. J., 2020, 第 4 作者
(7) Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes, IEEE Access, 2019, 第 3 作者
(8) A new VRSA-based pairing-free certificateless signature scheme for fog computing, Concurr. Comput. Pract. Exp., 2019, 第 3 作者
(9) Fully homomorphic encryption based on the ring learning with rounding problem, IET Information Security, 2019, 第 4 作者
(10) A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, Information Sciences, 2019, 第 4 作者
(11) Functional broadcast encryption with applications to data sharing for cloud storage, Information Sciences, 2019, 第 3 作者
(12) Access control encryption with efficient verifiable sanitized decryption, Information Sciences, 2018, 第 2 作者
(13) Connected Vehicles' Security from the Perspective of the In-Vehicle Network, IEEE Network, 2018, 通讯作者
(14) A new randomized message-locked encryption in the standard model, Peer Peer Netw. Appl., 2018, 第 2 作者
(15) Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks, IEEE Transactions on Dependable and Secure Computing, 2018, 第 3 作者
(16) Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model, IEEE Trans. Information Forensics and Security, 2017, 第 5 作者
(17) Characterizing the Semantics of Passwords: The Role of Pinyin for Chinese Netizens, Computer Standard and Interface, Vol. 54, Part 1, 20-28,, 2017, 第 4 作者
(18) An efficient pairing-free certificateless signature scheme for resource-limited systems, SCIENCE CHINA Information Sciences, 60(11): 119102, 2017, 通讯作者
(19) A New Construction on Randomized Message-Locked Encryption in the Standard Model via UCEs, SCIENCE CHINA Information Sciences, 60(5): 52101, 2017, 通讯作者
(20) A new randomized message-locked encryption in the standard model, Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-016-0488-6, 2016, 通讯作者
(21) Generic and Efficient Constructions of Attribute-Based Encryption with Verifiabe Outsourced Decryption, IEEE Transactions on Dependable and Secure Computing, 13(5): 533-546, 2016, 通讯作者
(22) Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited, The Computer Journal, 58(10), pp. 2747-2757, 2015, 第 4 作者
(23) Efficient Chosen-Ciphertext Secure Public-Key Encryption Scheme with High Leakage-Resilience, IET Information Security, 9(1), 32-42, 2015, 第 3 作者
(24) n-Evasive All-But-Many Lossy Trapdoor Function and its Constructions, Security and Communication Networks, 8(4), 550-564, 2015, 第 3 作者
(25) Sender-Equivocable Encryption Scheme Secure against Chosen-Ciphertext Attacks Revisited, International Journal of Applied Mathematics and Computer Science, 25(2), 415-430, 2015, 第 4 作者
(26) Optimal assignment schemes for general access structures based on linear programming, Design, Codes and Cryptography, 74(3), 623-644, 2015, 第 4 作者
(27) Efficient Revocable Identity-based Encryption from Multilinear Maps, Security and Communication Networks, 8(18), 3511-3522, 2015, 第 3 作者
(28) Sequential Aggregate Signatures and Multi-signatures in the Plain Public Key Model, Chinese Journal of Electronics, 24(2), 338-342, 2015, 第 4 作者
(29) Attribute-based key-insulated signature and its applications, Information Sciences, Vol. 275, pp.57-67, 2014, 第 3 作者
(30) Accountable authority key policy attribute-based encryption,  SCIENCE CHINA (Information Sciences), Vol. 55, No. 7, pp.1631–1638, 2012, 第 2 作者
(31) Self-generated-certificate public key encryption without pairing and its application, Information Sciences, Vol. 181, issue. 11, pp.2422-2435, 2011, 第 3 作者
(32) Key Updating Technique in Identity-based Encryption, Information Sciences, Vol.181, issue. 11, pp. 2436-2440, 2011, 第 3 作者
(33) Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards, IEEE Trans on Industrial Electronics, Vol.57, No.2, pp.793-800, 2010, 第 4 作者
(34) Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Information Sciences Vol.180, pp.1167–1181, 2010, 第 2 作者
(35) Chosen-Ciphertext Secure Bidirectional Proxy Re-Encryption Schemes without Pairings, Information Sciences, Vol.180, pp.5077-5089, 2010, 第 4 作者
发表著作
(1) 密码协议:基于可信新鲜性的安全性分析, Cryptographic Protocol: Security analysis based on trusted freshness, 高等教育出版社,Springer-Verlag, 2012-01, 第 2 作者
(2) 密码学的基本理论与技术, 国防工业出版社, 2015-10, 第 2 作者
(3) Information Security and Cryptology, Springer-Verlag, ISBN: 978-3-319-54704-6, 2017-03, 第 1 作者

科研活动

   
科研项目
( 1 ) 非线性移位寄存器与序列的频谱分析, 主持, 国家级, 2015-01--2018-12
( 2 ) 数据安全密码理论及在云计算安全中的应用研究, 主持, 国家级, 2018-01--2021-12
( 3 ) 非可信受限环境下数据安全存储关键密码算法, 主持, 国家级, 2017-07--2021-06
( 4 ) 基于深度学习的高通量网络攻击智能检测与场景构建研究, 主持, 国家级, 2020-01--2023-12