上海大学计算机学院 教授名录,教授名录

个人简介:

毕业于上海交通大学计算机系,获工学博士学位。主要研究方向为信息安全、公钥密码学、安全云计算等领域,近期主要关注区块链中的隐私保护问题。发表学术论文50余篇,其中第一作者32篇,SCI检索16篇,EI检索31篇。代表性工作发表于信息安全重要国际期刊IEEE Trans. Cloud Computing、Trans. Multimedia、Trans. IFS、IPL、JSS、CMA、COMPUTER JOURNAL、SCIENCE

CHINA及密码学知名国际会议ASIACCS、INDOCRYPT、ICICS。主持国家自然科学基金面上项目、青年项目及上海市自然科学基金等多项科研项目。

【研究领域】

信息安全、公钥密码学、安全外包计算、区块链

【授课情况】

有趣的反问题(本科生通识课)

概率论与随机过程(本科生)

信息网络与安全(本科生)

随机信号导论(研究生)

【研究生培养】

目前已指导研究生11人,包括学术硕士7人,专业硕士4人。研究生发表SCI/EI学术论文15篇,曾荣获研究生国家奖学金、上海大学研究生创新奖学金、上海大学优秀毕业生等。

【科研项目】

2018~2020,面向数字图像的安全外包隐写分析,NSFC-通用技术基础研究联合基金,主持

2017~2018,安全外包计算的理论和方法研究,上海市可扩展计算与系统重点实验室开放课题,主持

2017~2018,定向数据处理技术,上海通用识别技术研究所横向课题,主持

2016~2019,隐私保护的可验证外包计算方案研究,国家自然科学基金面上项目,主持

2014~2016,轻量级可证安全的基于身份密码体制研究,上海市教委创新基金,主持

2013~2015,标准模型中匿名的基于身份加密研究,国家自然科学基金青年项目,主持

2012~2014,面向广播通信的新型身份基加密方案研究,上海市自然科学基金,主持

2010~2011,变异身份基密码体制的优化与可证安全性,中国博士后基金,主持

2010~2011,基于身份加密方案的设计和安全性分析,上海市博士后基金,主持

【近期代表性论文】

1.Y. Ren, M. Dong, Z. Qian, X. Zhang, G.

Feng. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation

with Single Server, IEEE Transactions

on Cloud Computing, doi:10.1109/TCC.2018.2851245

2.Y. Ren, X. Zhang, G. Feng, Z. Qian, F.

Li, How to Extract Image Features based on Co-occurrence Matrix Securely and

Efficiently in Cloud Computing, IEEE

Transactions on Cloud Computing, doi:

10.1109/TCC.2017.2737980

3.T. Xue, Y. Ren, G. Feng, An IBE Scheme with Verifiable Outsourced Key

Generation Based on a Single Server, IETE

Technical Review, doi:

10.1080/02564602.2018.1515674

4.Y. Ren, T. Jiang, Verifiable

Outsourced Attribute-Based Signature Scheme,Multimedia Tools and Applications, 77, pp. 18105-18115, 2018.

5.M. Dong, Y. Ren, Efficient

and Secure Outsourcing of Bilinear Pairings with Single Server, Science

China-Information Sciences, 61(3), pp. 039104: 1-3, 2018.

6.M. Dong, Y. Ren, G. Feng,

Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations

with Single Cloud Server, IEICE Trans.

on Fundamentals of Electronics, Communications and Computer Sciences,

E-101.A(3), pp. 608-611, 2018.

7.Y. Ren, M. Dong, Z. Niu, X. Du, Non-interactive Verifiable Outsourcing

Algorithm for Bilinear Pairing with Improved Checkability, Security and Communication Networks,

4892814: 1-9, 2017.

8.M. Dong, Y. Ren, X. Zhang,

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in

Cloud Computing, KSII Trans. on

Internet and Information Systems, 11(7), pp. 3648-3663, 2017.

9.J. Fu, G. Feng, Y. Ren,

JPEG Image Steganalysis from Imbalanced Data, IEICE Trans. on Fundamentals of

Electronics, Communications and Computer Sciences, E-100.A(11), pp.

2518-2521, 2017.

10.J. Cai, Y. Ren, C. Huang, Verifiable Outsourcing Computation of Modular

Exponentiations with Single Server, International

Journal of Network Security, 19(3), pp. 449-457, 2017.

11.Y. Ren,

N. Ding, X. Zhang, H. Lu, D. Gu, Identity-Based Encryption with Verifiable

Outsourcing Revocation, The Computer

Journal, 59(11), pp. 1659-1668,

2016.

12.Y. Ren,

N. Ding, T. Wang, H. Lu, D. Gu, New Algorithms for Verifiable Outsourcing of

Bilinear Pairings, Science

China-Information Sciences, 59(9),

pp. 099103: 1-3, 2016.

13.Z.

Qian, X. Zhang, Y. Ren, and G. Feng,Block Cipher Based Separable Reversible

Data Hiding in Encrypted Images,Multimedia Tools and Applications,75(21), pp. 13749-13763, 2016.

14.L. Fan, G. Feng, Y.

Ren, J. Wang, Color demosaicking via fully

directional estimation, SpringerPlus, 5: 1-13, 2016.

15.Y. Ren, N. Ding, X. Zhang, H. Lu, D. Gu, Verifiable Outsourcing Algorithms

for Modular Exponentiations with Improved Checkability,Proceedings

of the 11th ACM Asia Conference on Computer and Communications Security

(ASIACCS 2016), Xi’an, Shaanxi, China, May 30-June

03, 2016, pp. 293-303.

16.Y. Ren,

S. Wang, X. Zhang, and M.S. Hwang, An Efficient Batch Verifying Scheme for

Detecting Illegal Signatures, International

Journal of Network Security, 17(4), pp. 463-470, 2015.

17.Z. Qian, X. Zhang, and Y. Ren, JPEG

Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation,26(1), pp. 9-13, 2015.

18.T. Wang, X. Cai, Y. Ren, R. Zhang,

Security of Quantum Digital Signatures for Classical Messages, Scientific Reports, Vol. 5, pp. 1-4,

2015.

19.Y. Ren,

Z. Niu, and X. Zhang, Fully Anonymous

Identity-based Broadcast Encryption, International

Journal of Network Security, 16(4), pp. 256-264, 2014.

21.任艳丽,蔡建兴,黄春水,谷大武,基于身份加密中可验证的私钥生成外包算法,通信学报, 36(11), pp. 61-66, 2015.

22.任艳丽,谷大武,蔡建兴,黄春水,隐私保护的可验证多元多项式外包计算方案,通信学报, 36(8), pp. 23-30, 2015.

【发明专利】

1.任艳丽,毛震,张新鹏.基于单台云服务器的双线性对安全外包方法.申请号: 201710167706.0

2.张嘉良,任艳丽,张新鹏,基于DCTR特征的图像卷积外包方法.申请号:201810088763.4

3.张嘉良,任艳丽,张新鹏,一种基于安卓平台的视频加密方法.申请号:201810351588.3

4.任艳丽,李佩怡,张新鹏,一种基于秘密共享的区块链分布式存储方法.申请号:201810767888.X

【获奖情况】

网络环境下的公钥密码算法设计与证明,2018年密码科技进步奖三等奖(省部级)

【学术兼职】

国家自然科学基金委员会(NSFC)信息学部函评专家;中国计算机学会区块链专委会委员、中国密码学会会员;IEEE TCC、TSC、TDSC、TIFS等国际期刊,以及中国科学、通信学报、计算机学报等国内期刊审稿人。