澳门24小时娛乐城



黄琼

编辑:    发布时间:2020-05-15    次点击

黄琼

教授,博导。2010年获香港城市大学博士学位,2011年至今在我校工作,现为澳门24小时娛乐城、软件学院院长,网络空间安全研究所负责人,广州市智慧农业重点实验室负责人,主要研究方向为密码学与信息安全。近年来主持10余项纵向科研项目,其中包括3项国家自然科学基金、1项省自然科学基金杰出青年基金、1项省基础与应用基础研究重大项目课题等。在国内外学术期刊和国际学术会议上发表论文110余篇,其中SCI论文50余篇,CCF A类、JCR Q1论文26篇,ESI高被引论文2篇。曾入选广东省“千百十工程”省级培养对象、广东省特支计划科技创新青年拔尖人才,获广东省自然科学基金杰出青年基金、广州市珠江科技新星专项等资助。他是中国密码学会高级会员、青年工作委员会委员,担任CCF广州分部执行委员,广东省计算机学会网络空间安全、区块链、竞赛委员会和青年工作委员会等多个专委会副主任委员,广州计算机学会副理事长。担任《密码学报》、《网络与信息安全学报》、《网络空间安全》和《Journal of Surveillance, Security and Safety》等学术期刊编委会委员、40余个国际会议的程序委员会委员以及30余个国际学术期刊的同行评审专家。任广东省“数字政府”改革建设专家委员会委员,汕头市“数字政府”改革建设专家委员会委员,广州市网络安全和信息化专家咨询委员会委员,广东省网络空间安全协会专家委员会委员,广东省网络空间安全标准化技术委员会委员。曾获教育部霍英东教育基金会第十五届高等院校青年教师奖和2017年ACM中国广州分会新星奖。

 

近几年发表的论文:

[1] Qingwen Guo, Qiong Huang*, Sha Ma, Meiyan Xiao, Guomin Yang and Willy Susilo. Functional Signatures: New Definition and Constructions. SCIENCE CHINA Information Sciences, 2020. (已录用)

[2] Sha Ma and Qiong Huang*. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. The Computer Journal. 2020. (已录用)

[3] Lei Zhang*, Hu Xiong*, Qiong Huang*, Jiguo Li*, Kim-Kwang Raymond Choo and Jiangtao Li. Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Transactions on Services Computing. IEEE 2019. (已录用)

[4] 李西明, 陶汝裕, 粟晨, 黄琼*, 黄欣沂. 一种灵活的精度可控的可搜索对称加密方案. 计算机研究与发展, 57(1): 3-16, 2020.

[5] Yuanhao Wang, Yuzhao Cui, Qiong Huang*, Hongbo Li, Jianye Huang and Guomin Yang. Ciphertext-Policy Attribute-based Encryption with Equality Test in the Standard Model. IEEE Access, 8(1): 32891-32903. IEEE, December 2020.

[6] Chuntao Wang*, Tianzheng Li, Jiangqun Ni and Qiong Huang. A New MRF-Based Lossy Compression for Encrypted Binary Images. IEEE Access, 8: 11328-11341. December 2020.

[7] Baodong Qin*, Yu Chen, Qiong Huang, Ximeng Liu and Dong Zheng*. Public-Key Authenticated Encryption with Keyword Search Revisited: Security Model and Construction. Information Sciences, 516: 515-528. Elsevier, April 2020.

[8] Yunhao Ling, Sha Ma*, Qiong Huang, Ximing Li and Yunzhi Ling. Group Public Key Encryption with Equality Test Against Offline Message Recovery Attack. Information Sciences, 510: 16-32. Elsevier, 2020.

[9] Jianye Huang and Qiong Huang* and Willy Susilo. Leakage-Resilient Group Signature: Definitions and Constructions. Information Sciences, 509: 119-132. Elsevier, January 2020. Also available at Cryptology ePrint Archive: Report 2019/002. 

[10] Xianjie Mo, Tingting Wei, Hengmin Zhang, Qiong Huang and Wei Luo. Label-smooth Learning for Fine-grained Visual Categorization. In Proceedings of the 5th Asian Conference on Pattern Recognition, ACPR 2019, volume 12046 of Lecture Notes in Computer Science, pages 17-31. Springer, Feb. 2020.

[11] Sha Ma and Qiong Huang*. Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. In Proceedings of ISPEC 2019, volume 11879 of LNCS, pages 3-19. Springer, 2019.

[12] Shuangjuan Li, Hong Shen*, Qiong Huang, Longkun Guo. Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor network. IEEE Access 7: 156301-156314. IEEE, 2019.

[13] Yuanhao Wang, Qiong Huang*, Hongbo Li, Jianye Huang, Guomin Yang and Willy Susilo. Public Key Authenticated Encryption with Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access, 7(1): 135999-136011. December, 2019. IEEE.

[14] Sha Ma, Qiong Huang, Ximing Li and Meiyan Xiao. Plaintext-Verifiably-Checkable Encryption. In Proceedings of ProvSec 2019, volume 11821 of LNCS, pages 149-166. Springer, October 2019.

[15] Xueqiao Liu, Hongbo Li, Guomin Yang, Willy Susilo, Joseph Tonien and Qiong Huang. Towards enhanced security for Certificateless Public-key Authenticated Encryption with Keyword Search. In Proceedings of ProvSec 2019, volume 11821 of LNCS, pages 113-129. Springer, October 2019.

[16] Cai Zhang, Mohsen Razavi, Zhiwei Sun, Qiong Huang and Haozhen Situ. Multi-party Quantum Summation based on Quantum Teleportation. Entropy, 21(7), 719. MDPI, 2019.

[17] Ximing Li, Weizhao Chen, Yubin Guo*, Sha Ma and Qiong Huang. Secure, Efficient and Searchable File System on Distributed Clouds. In Proceedings of International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2019: Data Science, volume 1059 of Communications in Computer and Information Science, 246-266. Springer, 2019.

[18] Yunhao Ling, Sha Ma*, Qiong Huang, Ru Xiang and Ximing Li. Group ID-based Encryption with Equality Test against Insider Attack. In Proceedings of the 24th Australasian Conference on Information Security and Privacy, ACISP 2019, volume 11547 of Lecture Notes in Computer Science, pages 39-57. Springer, July 2019.

[19] Yuanhao Wang, Meiyan Xiao, Ying Miao, Wenbo Liu and Qiong Huang*. Signature Scheme from Trapdoor Functions. Journal of Internet Services and Information Security, 9(2):31-41. 2019.

[20] Yuzhao Cui, Qiong Huang*, Jianye Huang, Hongbo Li, and Guomin Yang. Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. The Computer Journal, 62(8): 1166-1177. British Computer Society. August, 2019.

[21] Cai Zhang, Haozhen Situ, Qiong Huang, Zhiwei Sun, and Zhiming Huang. Multi-party Quantum Summation with a Single d-Level Quantum System. International Journal of Quantum Information. 1950027. May 13, 2019, World Scientific.

[22] Yuzhao Cui, Qiong Huang*, Jianye Huang, Hongbo Li, and Guomin Yang. Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. In Proceedings of Inscrypt 2018, volume 11449 of Lecture Notes in Computer Science, pages 448-467. Springer, 2019.

[23] Hongbo Li, Qiong Huang*, Sha Ma, Jian Shen and Willy Susilo. Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage. IEEE Access, 7(1):25409-25421, December, 2019. IEEE.

[24] Hongbo Li, Qiong Huang*, Jian Shen, Guomin Yang and Willy Susilo. Designated-Server Identity-Based Authenticated Encryption with Keyword Search for Encrypted Emails. Information Sciences, 481: 330-343. May 2019, Elsevier.

[25] Jianye Huang, Qiong Huang* and Willy Susilo. Leakage-Resilient Ring Signature Schemes. Theoretical Computer Science, 758: 1-13. Feb. 2019, Elsevier.

[26] Qingwen Guo, Qiong Huang*, and Guomin Yang. Authorized Function Homomorphic Signatures. The Computer Journal, 61(12): 1897-1908. Dec. 2018, British Computer Society.

[27] 王元昊, 李宏博, 崔钰钊, 郭庆文, 黄琼*. 具有密文等值测试功能的公钥加密技术综述. 网络与信息安全学报, 2018(11):13-22. 201811.

[28] Jianye Huang, Qiong Huang*, and Willy Susilo. Leakage-Resilient Dual Form Signatures. The Computer Journal, 61(8): 1216-1227. British Computer Society, August 2018.

[29] Ximing Li, Weizhao Chen, Yubin Guo* and Qiong Huang. Secure File Storage System among Distributed Public Clouds. In Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science, volume 11065, pages 277-289. Springer, June 2018.

[30] Yunhao Ling, Sha Ma*, Qiong Huang and Ximing Li. A General Two-Server Framework for Ciphertext-Checkable Encryption against Offline Message Recovery Attack. In Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science, volume 11065, pages 370-382. Springer, June 2018.

[31] Chuntao Wang, Jiangqun Ni, Xinpeng Zhang and Qiong Huang. Efficient Compression of Encrypted Binary Images Using the Markov Random Field. IEEE Transactions on Information Forensics and Security, 13(5): 1271-1285. IEEE, May, 2018.

[32] Jin Li, Xiaofeng Chen, Sherman S.M. Chow, Qiong Huang, Duncan S. Wong, and Zheli Liu. Multi-Authority Fine-Grained Access Control with Accountability and its Application in Cloud. Journal of Network and Computer Applications, 112:89-96. Elsevier, March 2018.

[33] Willy Susilo, Guomin Yang, Fuchun Guo and Qiong Huang. Constant-Size Ciphertexts in Threshold Attribute-Based Encryption without Dummy Attributes. Information Sciences, 429: 349-360. Elsevier, March 2018.

[34] Jianye Huang and Qiong Huang*. Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. Information Sciences, 423: 313-325. Elsevier, January 2018.

[35] 陈振华, 李顺东, 陈立朝, 黄琼, 张卫国. 点和区间关系的全隐私保密判定. 中国科学: 信息科学(Scientia Sinica Informationis), 48(2): 187-204. 2018.

[36] 陈振华, 李顺东, 黄琼, 董立红, 陈娓. 两个保密位置判断问题的新解法. 计算机学报, 2018, 41(2):336-348.

[37] Jianye Huang, Qiong Huang* and Chunhua Pan. A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. Special Issue “Security and Privacy in Big Data: Challenges and Formal Methods”, International Journal of Foundations of Computer Science, 28(6): 761-780. September, 2017.

[38] Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong. Privacy-Preserving Location Sharing Services for Social Networks. IEEE Transactions on Services Computing, 10(5): 811-825. IEEE Computer Society, October 2017.

[39] Qiong Huang and Hongbo Li. An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. Information Sciences 403: 1-14, Elsevier, September 2017.

[40] 陈振华, 李顺东, 黄琼, 丁勇, 刘娅茹. 非加密方法安全计算两种集合关系. 软件学报, 2017, 39(3): 1-9.

[41] 陈振华, 李顺东, 王道顺, 黄琼, 张卫国. 集合成员关系的安全多方计算及其应用. 电子学报, 2017, 45(5): 1109-1116.

[42] 陈振华, 李顺东, 王道顺, 黄琼, 董立红. 非加密方法安全计算集合包含关系. 计算机研究与发展, 2017, 54(7): 1549-1556.

[43] 陈振华, 李顺东, 黄琼, 丁勇, 孙嫚. 云外包计算中空间位置关系的保密判定. 计算机学报, 40(2): 351-363, 20172.

[44] Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Fuchun Guo, Qiong Huang. Sequence Aware Functional Encryption and Its Application in Searchable Encryption. Journal of Information Security and Applications, 35:106-118. Elsevier, August 2017.

[45] Qingwen Guo, Yuzhao Cui, Xiaomeng Zou and Qiong Huang*. Generic Construction of Privacy-Preserving Optimistic Fair Exchange Protocols. Journal of Internet Services and Information Security, 7(2): 44-56, May 2017.

[46] Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang and Yi Mu. Attribute-based Hash Proof System under Learning-with-Errors Assumption in Obfuscator-free and Leakage-resilient Environments. IEEE Systems Journal, 11(2): 1018-1026. June 2017, IEEE.

[47] Cai Zhang, Haozhen Situ, Qiong Huang and Pingle Yang. Multi-Party Quantum summation without a Trusted Third Party Based on Single Particles. International Journal of Quantum Information, 15(2), February 2017.

[48] Jianye Huang, Qiong Huang* and Chunhua Pan. A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. Proceedings of ProvSec 2016, volume 10005 of Lecture Notes in Computer Science, 320-339. Springer, Nov. 2016.

[49] 陈望, 陈河宏, 黄琼*, 张视焕, 刘雁彬, 张琪枫. 基于Android平台的一种保护隐私的即时通讯工具的设计与实现. 计算机测量与控制, 24(5): 230-233,236. 20165.

[50] Zhenhua Chen, Shundong Li, Qiong Huang, Yilei Wang, and Sufang Zhou. A Restricted Proxy re-encryption with Keyword Search for Fine-grained Data Access Control in Cloud Storage. Concurrency and Computation: Practice and Experience, 28(10): 2858-2876, June 2016.

[51] Yu Chen, Qiong Huang, Zongyang Zhang. Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More. International Journal of Information Security. Springer, 15(1): 15-33. Springer, February 2016.

[52] Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding. A Joint Random Secret Sharing Scheme with Public Verifiability. International Journal of Network Security, 18(5):917-925, September 2016.

[53] Chuntao Wang, Jiangqun Ni, Qiong Huang. A New Encryption-Then-Compression Algorithm Using the Rate-Distortion Optimization. Signal Processing: Image Communication, 39:141-150. Elsevier, November 2015.

[54] Qiong Huang, Duncan S. Wong and Willy Susilo. How to Protect Privacy in Optimistic Fair Exchange of Digital Signatures. Information Sciences, 325: 300-315. Elsevier, December 2015.

[55] Qiong Huang and Guoming Yang. A Summary on the Special Issue “Cybersecurity and Cryptography”. Special Issue “Cybersecurity and Cryptography”, Information. MDPI, 2015.

[56] Roman Schlegel, Chi-Yin Chow, Qiong Huang, Duncan S. Wong. User-Defined Privacy Grid System for Continuous Location-Based Services. IEEE Transactions on Mobile Computing, 14(10): 2158-2172. IEEE Computer Society, October 2015.

[57] Sha Ma, Qiong Huang, Mingwu Zhang and Bo Yang. Efficient Public Key Encryption with Equality Test Supporting Flexible Authorization. IEEE Transactions on Information Forensics and Security, 10(3): 458-470. IEEE Signal Processing Society, March 2015.

[58] Sha Ma, Mingwu Zhang, Qiong Huang* and Bo Yang. Public Key Encryption with Delegated Equality Test in a Multi-user Setting. The Computer Journal, 58(4): 986-1002, British Computer Society, April 2015.

[59] Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo. Ambiguous Optimistic Fair Exchange: Definition and Constructions. Theoretical Computer Science, 562: 177-193. Elsevier, January 2015.

[60] Xiao Tan, Qiong Huang, and Duncan S. Wong. Concurrent Signature without Random Oracles. Theoretical Computer Science 562: 194-212. Elsevier, January 2015.

[61] Zhenhua Chen, Shundong Li, Qianhong Wu and Qiong Huang. A Distributed Secret Share Update Scheme with Public Verifiability for Ad Hoc Network. Security and Communication Networks, 8(8): 1485-1493. Wiley, May 2015.

[62] 朱启辉, 黄琼*. 基于SaaS的软件在线授权机制研究与设计. 计算机工程与设计, 36(3): 608-612, 20153.

 


分享到:

Baidu
sogou