Computer Science & Engineering

  • Name:Liu Shengli
  • Title:Professor
  • Office:3-429
  • Office Phone:34204405
  • Email:slliu@sjtu.edu.cn
  • Website:http://www.cs.sjtu.edu.cn/people_detail.action?id=

Research Field

Cryptography and information security

Education

Mar.2000-Feb.2002, Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, Ph.D degree.
Mar.1997-Jan.2000, School of Communication Engineering, Xidian University, Ph.D. degree, majoring in Cryptology;
Sep.1995-Feb.1998, School of Computer Science, Xidian University, Master degree, majoring in Computer Application;
Sep.1991-Jul.1995, School of Economic Management, Xidian University, Bachelor degree, majoring in Scientific Information;

Work experience

Apr.2002-up to now, Department of Computer Science and Engineering, Shanghai Jiao Tong University

Research

National Natural Science Foundation of China (Grant 61373153): 不同环境下的公钥加密算法设计与可证安全研究(2014.1-2017.12)

National Natural Science Foundation of China (Grant 61170229): 有损陷门函数与标准模型下CCA2安全的公钥密码体制 (2012.1-2015.12)

Specialized Research Fund for the Doctoral Program of Higher Education(SRFDP 20110073110016) 2011年度高等学校博士学科点专项科研基金(博导类):同态认证技术和云存储中“存储证明”的研究 (2012.1-2014.12)

Scientific innovation projects of Shanghai Education Committee (Grant 12ZZ021)2011年度上海市教委科研创新项目(Grant 12ZZ021):可证明安全的公钥加密算法研究 (2012.1-2014.12)

National Natural Science Foundation of China (Grant 60873229): 无证书公钥密码体制的研究 (2009.1-2011.12)
National Natural Science Foundation of China (Grant 60673077): 信息论安全的密钥协商的研究 (2007.1-2009.12)
National Natural Science Foundation of China (Grant 60303026): 基于身份的公钥体系架构的研究 (2004.1-2006.12)
Shanghai Rising-Star Program A (Grant 09QA1403000): 模糊保密数据中的密钥提取和保护 (2009.7-2011.7)

Awards and Honors

Shanghai Rising-Star Program (A);
SMC program of Shanghai Jiao Tong University(B).

Teaching

Discrete Mathematics (undergraduates, fall, 2006-2012)
Applied Algebra (graduates, spring, in english, 2005-now)
Fundamental Algebra (graduates, fall, 2008-2012)
Algebraic Structure(ACM undergraduates, fall, 2013-now)

Publications

Shuai Han, Shengli Liu, Kefei Chen, and Dawu Gu, "Proofs of Retrievability Based on MRD Codes", The 10th International Conference on Information Security Practice and Experience (ISPEC 2014), LNCS, Springer, Fuzhou, China, May 5-8, 2014. (Full version in IACR Cryptology ePrint Archive 2013: 789)

Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, and Yunlei Zhao, "Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack", the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2014), LNCS, Copenhagen, Denmark, May 11-15, 2014.

Baodong Qin, Shengli Liu, "Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing", The 17th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2014), LNCS 8383, p.19-36, Buenos Aires, Argentina, March 26-28, 2014.

[1] Baodong Qin, Shengli Liu, "Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter", the 19th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT2013), LNCS 8270, pp.381-400, Bangalore, India, Dec 1-5, 2013. (EI) (Full version in IACR Cryptology ePrint Archive 2013: 654)

[2] Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang and Yunlei Zhao, "Security Model and Analysis of FHMQV, Revisited", the 9th China International Conference on Information Security and Cryptology (Inscrypt 2013), Guangzhou, China, Nov. 27 - Nov. 30, 2013. (EI)

[3] Shi-Feng Sun, Dawu Gu, and Shengli Liu, "Efficient Leakage-Resilient Identity-Based Encryption with CCA Security", the 6th International Conference on Pairing-Based Cryptography (Pairing 2013), LNCS, Beijing, China, November 22-24, 2013. (EI)

[4] Zhengan Huang, Shengli Liu, Baodong Qin, Kefei Chen: "Fixing the Sender-Equivocable Encryption Scheme in Eurocrypt 2010", 2013 Fifth International Conference on Intelligent Networking and Collaborative Systems (INCoS 2013), pp.366-372, Xian, China, Sep.9-11 2013. (EI)

[5] Baodong Qin, Shengli Liu, Zhengan Huang: "Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem". 18th Australasian Conference on Information Security and Privacy (ACISP 2013), LNCS 7959, pp: 136-151, Springer, Brisbane, Australia, July 1-3,2013. (EI)

[6] Shengli Liu, Fangguo Zhang, Kefei Chen, "Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie–Hellman assumption", CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE, 2013, Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/cpe.3021

[7] Baodong Qin, Shengli Liu, Kefei Chen and Manuel Charlemagne, "Leakage-Resilient Lossy Trapdoor Functions and Public-Key Encryption", 2013 ACM Asia Public-Key Cryptography Workshop (AsiaPKC 2013), pp. 3-11, May 7, 2013, Hangzhou, China.

[8] Zhengan Huang, Shengli Liu, Baodong Qin, "Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited", The 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC 2013), K. Kurosawa and G. Hanaoka (Eds.): PKC 2013, LNCS 7778, pp. 369–385, Springer, Nara, Japan, Feb. 26 - Mar. 1, 2013.

[9] Baodong Qin, Shengli Liu: "Efficient chosen ciphertext secure public-key encryption under factoring assumption". Security and Communication Networks 6(3): 351-360, 2013. (SCI/EI)

[10] Zhou Dehua, Chen Kefei, Liu Shengli, Zheng Dong, "Identity-Based Conditional Proxy Re-Encryption", CHINESE JOURNAL OF ELECTRONICS, 22(1), pp 61-66, 2013. (SCI)

[11] Shengli Liu, Jian Weng, Yulei Zhao, "Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks", CT-RSA 2013, LNCS 7779, pp. 84--100, Springer, Heidelberg, San Francisco, Feb 25 - Mar. 1, 2013.

[12] Shengli Liu, Fangguo Zhang, Kefei Chen, "Selective Opening Chosen Ciphertext Security Directly from the DDH Assumption", NSS 2012, LNCS 7645, Springer, pp. 100-112, Wu Yi Shan, China, November 21-23, 2012. (EI)

[13] Shengli Liu, Kefei Chen, "Homomorphic Linear Authentication Schemes from epsilon-ASU2 Functions for Proofs of Retrievability", Control & Cybernetics Journal, Vol. 42, No. 2, pp. 900-916. 2012. (SCI/EI)

[14] Fangguo Zhang, Qiping Lin, Shengli Liu, "Zero-Value Point Attacks on Kummer-Based Cryptosystem" , ACNS 2012, LNCS 2846, Springer, Singapore, pp. 293-310, June 2012. (EI)

[15] Shengli Liu, Kefei Chen, "Homomorphic Linear Authentication Schemes for Proofs of Retrievability", 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS 2011), pp. 258-262, Nov.30-Dec.2 2011, Fukuoka, Japan. (EI)

[16] Shengli Liu, Junzuo Lai and Robert Deng, "General Construction of Chameleon All-But-One Trapdoor Functions", Journal of Internet Services and Information Security, volume: 1, number: 2/3, pp. 74-88, August 2011. (EI)

[17] Shengli Liu, Junzuo Lai and Robert Deng, "General Construction of Chameleon All-But-One Trapdoor Functions", ProvSec 2011,LNCS 6890, Springer, Oct.16-18, Xi'an. (EI)

[18] Shengli Liu, Yu Long, Kefei Chen, "Key Updating Technique in Identity-based Encryption", Information Sciences, vol. 181, issue. 11, pp. 2436-2440, 2011. (SCI/EI)

[19] Junzuo Lai, Robert H. Deng and Shengli Liu, "Chameleon All-But-One TDFs and Their Application to Chosen-Ciphertext Security", The 14th IACR International Conference on Practice and Theory in Public Key Cryptography (PKC 2011), LNCS 6571, Springer, pp. 228-245, March 6-9, 2011, Taormina, Italy. (EI)

[20] Zhong-Mei Wan, Jian Weng, Xue-Jia Lai, Shengli Liu, Jiguo Li: "On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption". J. Inf. Sci. Eng. 27(1): 243-259, 2011. (SCI/EI)

[21] Junzuo Lai, Robert H. Deng, Shengli Liu, and Weidong Kou, "Efficient CCA-Secure PKE from Identity-Based Techniques", Topics in Cryptology - CT-RSA 2010, Lecture Notes in Computer Science 5985, Springer Berlin / Heidelberg, pp. 132-147, 2010. (EI)

[22] Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen: "Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings". Information Science 180(24): 5077-5089, 2010. (SCI/EI)

[23] Junzuo Lai, Wen-Tao Zhu, Robert H. Deng, Shengli Liu, Weidong Kou: "New Constructions for Identity-Based Unidirectional Proxy Re-Encryption". J. Comput. Sci. Technol. 25(4): 793-806, 2010. (SCI/EI)

[24] Gao Wei; Liu Shengli; Gao Peng; Zheng Fuzhong, "Finding coding opportunities in the air", NSWCTC 2010 - The 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, v 2, p 270-273, 2010.(EI)

[25] Wan Zhong-Mei, Lai Xue-Jia, Weng Jian, Liu Sheng-Li, Long Yu, Hong Xuan, "Strong key-insulated signature in the standard model", Journal of Shanghai Jiaotong University (Science), 15(6), pp 657-661, 2010. (EI)

[26] Sheng-Li Liu, Jian Weng, Ke-Fei Chen, Xiang-Xue Li, "A Fully Collusion Resistant Public Key Trace and Revoke Scheme with Dynamic Registration and Revocation", Chinese Journal of Electronics. Vol.50, no.2, pp.347-354, 2009.(SCI/EI)

[27] Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou: "RSA-Based Certificateless Public Key Encryption", ISPEC 2009, lncs 5451, pp. 24-34, 2009 (EI)

[28] Yu Long, Zheng Gong, Kefei Chen, Shengli Liu: "Provably Secure Identity-based Threshold Key Escrow from Pairing", I. J. Network Security 8(3): 227-234 (2009)

[29] Zhong-mai Wan, Xue-jian Lai, Jian Weng, Sheng-li Liu, Yu Long, Xuan Hong, “Certificateless key-insulated signature without random oracles”, Journal of Zhejiang University, 10(12): 1790-1800, 2009. (SCI/EI)

[30] Wan Zhongmai, Lai Xuejia, Weng Jian, Liu Shengli, Hong Xuan, “identity-based key-insulated proxy signature”, Journal of Electronics, 26(6), pp 853-858, 2009.

[31] Shengli Liu, Xiaofeng Chen, Fangguo Zhang. “Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme”, Journal of Computer Science and Technology, 23(2), pp.265-269 Mar. 2008 (SCI/EI).

[32] Shengli Liu, Baoan Guo, Qingsheng Zhang ,“An Identity-Based Encryption Scheme with Compact Ciphertexts”, Journal of Shanghai JiaoTong University (Science), vol.14, no.1, p 86-89, February 2009. (EI)

[33] Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li, “AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes”, 2009 Fifth International Joint Conference on INC, IMS and IDC, pp 479-483, 2009/8/25.(EI)

[34] Xian Wu, Shengli Liu, “New mDBL Based Evaluation Scheme for Efficient Scalar Multiplication in ECC”, 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009), pp. 3171-3197. (EI)

[35] Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu, “Identity-Based Threshold Key-Insulated Encryption without Random Oracles”, CT-RSA 2008, LNCS 4964, pp. 203-220.(EI)

[36] Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li, “Identity-Based Parallel Key-Insulated Signature: Framework and Construction”, Journal of Research and Practice in Information Technology, vol 40, no. 1, 2008, pp. 55-68. (SCI/EI)

[37] Jian Weng, Xiang-Xue Li, Ke-Fei Chen, Sheng-Li Liu, “Identity-Based Parallel Key-Insulated Signature without Random Oracles”, Journal of Information Science and Engineering,No. 24, pp.1143-1157, 2008. (SCI/EI)

[38] Jian Weng, Kefei Chen, Shengli Liu, Xiangxue Li, “Identity-Based Strong Key-Insulated Signature Scheme Without Random Oracles”, 软件学报, 19(6): 1555-1564, 2008.

[39] Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen, “Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings”, CANS2008, Springer, LNCS 5339, pp.1-17, Hong-Kong, China 2008, December 2–4, 2008.(EI)

[40] Shengli Liu, Kefei Chen, Weidong Qiu, “Identity-based threshold decryption”, ISPEC 2007, HongKong, LNCS 4464, pp. 329-343. Springer-Verlag, 2007. (EI)

Others