个人简介:
毕业于上海交通大学计算机系,获工学博士学位。主要研究方向为信息安全、公钥密码学、安全云计算等领域,近期主要关注区块链中的隐私保护问题。发表学术论文50余篇,其中第一作者32篇,SCI检索16篇,EI检索31篇。代表性工作发表于信息安全重要国际期刊IEEE Trans. Cloud Computing、Trans. Multimedia、Trans. IFS、IPL、JSS、CMA、COMPUTER JOURNAL、SCIENCE
CHINA及密码学知名国际会议ASIACCS、INDOCRYPT、ICICS。主持国家自然科学基金面上项目、青年项目及上海市自然科学基金等多项科研项目。
【研究领域】
信息安全、公钥密码学、安全外包计算、区块链
【授课情况】
有趣的反问题(本科生通识课)
概率论与随机过程(本科生)
信息网络与安全(本科生)
随机信号导论(研究生)
【研究生培养】
目前已指导研究生11人,包括学术硕士7人,专业硕士4人。研究生发表SCI/EI学术论文15篇,曾荣获研究生国家奖学金、上海大学研究生创新奖学金、上海大学优秀毕业生等。
【科研项目】
2018~2020,面向数字图像的安全外包隐写分析,NSFC-通用技术基础研究联合基金,主持
2017~2018,安全外包计算的理论和方法研究,上海市可扩展计算与系统重点实验室开放课题,主持
2017~2018,定向数据处理技术,上海通用识别技术研究所横向课题,主持
2016~2019,隐私保护的可验证外包计算方案研究,国家自然科学基金面上项目,主持
2014~2016,轻量级可证安全的基于身份密码体制研究,上海市教委创新基金,主持
2013~2015,标准模型中匿名的基于身份加密研究,国家自然科学基金青年项目,主持
2012~2014,面向广播通信的新型身份基加密方案研究,上海市自然科学基金,主持
2010~2011,变异身份基密码体制的优化与可证安全性,中国博士后基金,主持
2010~2011,基于身份加密方案的设计和安全性分析,上海市博士后基金,主持
【近期代表性论文】
1.Y. Ren, M. Dong, Z. Qian, X. Zhang, G.
Feng. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation
with Single Server, IEEE Transactions
on Cloud Computing, doi:10.1109/TCC.2018.2851245
2.Y. Ren, X. Zhang, G. Feng, Z. Qian, F.
Li, How to Extract Image Features based on Co-occurrence Matrix Securely and
Efficiently in Cloud Computing, IEEE
Transactions on Cloud Computing, doi:
10.1109/TCC.2017.2737980
3.T. Xue, Y. Ren, G. Feng, An IBE Scheme with Verifiable Outsourced Key
Generation Based on a Single Server, IETE
Technical Review, doi:
10.1080/02564602.2018.1515674
4.Y. Ren, T. Jiang, Verifiable
Outsourced Attribute-Based Signature Scheme,Multimedia Tools and Applications, 77, pp. 18105-18115, 2018.
5.M. Dong, Y. Ren, Efficient
and Secure Outsourcing of Bilinear Pairings with Single Server, Science
China-Information Sciences, 61(3), pp. 039104: 1-3, 2018.
6.M. Dong, Y. Ren, G. Feng,
Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations
with Single Cloud Server, IEICE Trans.
on Fundamentals of Electronics, Communications and Computer Sciences,
E-101.A(3), pp. 608-611, 2018.
7.Y. Ren, M. Dong, Z. Niu, X. Du, Non-interactive Verifiable Outsourcing
Algorithm for Bilinear Pairing with Improved Checkability, Security and Communication Networks,
4892814: 1-9, 2017.
8.M. Dong, Y. Ren, X. Zhang,
Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in
Cloud Computing, KSII Trans. on
Internet and Information Systems, 11(7), pp. 3648-3663, 2017.
9.J. Fu, G. Feng, Y. Ren,
JPEG Image Steganalysis from Imbalanced Data, IEICE Trans. on Fundamentals of
Electronics, Communications and Computer Sciences, E-100.A(11), pp.
2518-2521, 2017.
10.J. Cai, Y. Ren, C. Huang, Verifiable Outsourcing Computation of Modular
Exponentiations with Single Server, International
Journal of Network Security, 19(3), pp. 449-457, 2017.
11.Y. Ren,
N. Ding, X. Zhang, H. Lu, D. Gu, Identity-Based Encryption with Verifiable
Outsourcing Revocation, The Computer
Journal, 59(11), pp. 1659-1668,
2016.
12.Y. Ren,
N. Ding, T. Wang, H. Lu, D. Gu, New Algorithms for Verifiable Outsourcing of
Bilinear Pairings, Science
China-Information Sciences, 59(9),
pp. 099103: 1-3, 2016.
13.Z.
Qian, X. Zhang, Y. Ren, and G. Feng,Block Cipher Based Separable Reversible
Data Hiding in Encrypted Images,Multimedia Tools and Applications,75(21), pp. 13749-13763, 2016.
14.L. Fan, G. Feng, Y.
Ren, J. Wang, Color demosaicking via fully
directional estimation, SpringerPlus, 5: 1-13, 2016.
15.Y. Ren, N. Ding, X. Zhang, H. Lu, D. Gu, Verifiable Outsourcing Algorithms
for Modular Exponentiations with Improved Checkability,Proceedings
of the 11th ACM Asia Conference on Computer and Communications Security
(ASIACCS 2016), Xi’an, Shaanxi, China, May 30-June
03, 2016, pp. 293-303.
16.Y. Ren,
S. Wang, X. Zhang, and M.S. Hwang, An Efficient Batch Verifying Scheme for
Detecting Illegal Signatures, International
Journal of Network Security, 17(4), pp. 463-470, 2015.
17.Z. Qian, X. Zhang, and Y. Ren, JPEG
Encryption for Image Rescaling in the Encrypted Domain, Journal of Visual Communication and Image Representation,26(1), pp. 9-13, 2015.
18.T. Wang, X. Cai, Y. Ren, R. Zhang,
Security of Quantum Digital Signatures for Classical Messages, Scientific Reports, Vol. 5, pp. 1-4,
2015.
19.Y. Ren,
Z. Niu, and X. Zhang, Fully Anonymous
Identity-based Broadcast Encryption, International
Journal of Network Security, 16(4), pp. 256-264, 2014.
21.任艳丽,蔡建兴,黄春水,谷大武,基于身份加密中可验证的私钥生成外包算法,通信学报, 36(11), pp. 61-66, 2015.
22.任艳丽,谷大武,蔡建兴,黄春水,隐私保护的可验证多元多项式外包计算方案,通信学报, 36(8), pp. 23-30, 2015.
【发明专利】
1.任艳丽,毛震,张新鹏.基于单台云服务器的双线性对安全外包方法.申请号: 201710167706.0
2.张嘉良,任艳丽,张新鹏,基于DCTR特征的图像卷积外包方法.申请号:201810088763.4
3.张嘉良,任艳丽,张新鹏,一种基于安卓平台的视频加密方法.申请号:201810351588.3
4.任艳丽,李佩怡,张新鹏,一种基于秘密共享的区块链分布式存储方法.申请号:201810767888.X
【获奖情况】
网络环境下的公钥密码算法设计与证明,2018年密码科技进步奖三等奖(省部级)
【学术兼职】
国家自然科学基金委员会(NSFC)信息学部函评专家;中国计算机学会区块链专委会委员、中国密码学会会员;IEEE TCC、TSC、TDSC、TIFS等国际期刊,以及中国科学、通信学报、计算机学报等国内期刊审稿人。