Yu Chen (陈宇)
Research Interests
Theory and applications of cryptography in general,
with emphasis on fundamental primitives and their applications to the design of highly efficient,
secure and functional cryptosystems. Please click here for an overview.
- Advanced Security: chosen-ciphertext security, key-dependent message security, leakage/tampering resilience
- Zero-Knowledge Protocols
- Secure Multiparty Computation
Recently, I am working on zero-knowledge proofs and secure multiparty computation.
I am always looking for motivated students, please send me an email with your CV if you are interested in working with me!
(中文版课题组简介与招生信息)
Working Experience
- 2019.12 - Present: Shandong University
- 2019.06 - 2019.12: Ant Financial
- 2011.07 - 2019.06: SKLOIS, IIE, CAS
- 2015.08 - 2016.01: Postdoc at CUHK,
hosted by Sherman S. M. Chow
- 2008.02 - 2008.08: Research Intern at IBM CRL (The Next Generation Group)
Education
Teaching
Professional Activities
- General PC Chair: Inscrypt 2021
- Program Committee: Inscrypt 2014, Provsec (2016, 2024), CANS 2017, Inscrypt (2018, 2019, 2022, 2024), ESORICS (2020, 2021, 2022)
- Reviewer: Asiacrypt (2012, 2013, 2016, 2017), PKC (2018, 2019)
Selected Funded Projects
- 中组部万人计划青年拔尖人才 (2023.01-2025.12, 140万)
- 泰山学者青年专家项目 (2022.07.01-2025.06.30, 75万)
- 中国科学院青年创新促进会会员 (2017.01-2020.12)
- NSFC面上项目: 隐私计算中的关键密码技术研究 (No.62272269, 2023.01-2026.12, 55万)
- NSFC面上项目: 身份加密体制的消息依赖密钥安全研究 (No.61772522, 2018.01-2021.12, 58万)
- NSFC青年项目: 抗泄漏的函数加密体制研究 (No.61303257, 2014.01-2016.12, 25万)
- NSFC重点项目: 量子计算环境下的公钥密码及复杂性理论研究 (No.61932019, 2020.01-2024.12, 297万, 排序2/10)
- 国家重点研发计划: 自主可控的区块链高延展共识机制设计-区块链系统的关键密码理论及系统设计 (2021YFA1000603, 2021.12-2026.11, 389万, 排序2/8)
- 密码科学技术国家实验室开放课题重点项目: 非交互式零知识证明及其在密码货币中的应用 (2021.07-2024.06, 30万)
- 密码科学技术国家实验室开放课题面上项目: 抗泄漏密码体制的若干关键问题研究 (2018.06-2020.06, 10万)
Awards
Talks and Tutorials
- Private Set Operations from mqRPMT
2022.12.10: 中国密码学会2022年会密码学前沿交叉论坛(线上)
2022.12.31: 山东计算机学会2022年网络空间安全学术会议(线上)
2023.11.02-11.11: 北航人大联合讨论班(线上)
2023.12.15: 之江实验室(线上)
2024.08.03: 中国密码学会2024年安全协议进展国际会议
- Sigma Protocols from Verifiable Secret Sharing
2023.11.04: 杭州师范大学-2023前沿密码青年论坛
2023.11.10: 蚂蚁集团-ZK Virtual Machine研讨会(线上)
2023.11.18: 浙江工商大学-2023密码与安全前瞻性论坛
2023.11.25: 国家区块链技术创新中心-零知识证明关键理论与技术发展学术研讨会(线上)
- Cryptographic Tools for Privacy
2017.11.25: Oracle Chain-Technique Salon
2022.06.17: 合肥工业大学
- Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
2017.12.04: 摩石实验室
2019.01.17: 陕西师范大学
- Introduction to Zero-Knowledge Proof Systems
2019.01.16: 西安邮电大学
2017.06.23: 合肥工业大学
2018.12.18: 区块链数学会议
- Generic Constructions of Public-Key Encryptions
High-level Training Class on Public-Key Cryptography, organized by CACR, Dec. 2015
Patents
- 基于身份基加密的层级签名加密系统与构建方法, 2021-1-0430499.X, 2022.03.25, 排序(1/1)
[授权书]
- 一种通用的层级签名加密系统与构建方法, 2021-1-0431894.X, 2022.03.25, 排序(1/1)
[授权书]
- 一种基于非交互式零知识证明的可托管公钥加密系统及方法, 2021-1-0430319.8, 2022.04.26, 排序(1/1)
[授权书]
- 一种可监管的分布式机密交易系统及方法, 2020-1-1465650.5, 2022.11.25, 排序(1/1)
[授权书]
- 基于非交互式密钥协商的可托管公钥加密系统及方法, 2021-1-0431893.5, 2022.09.09, 排序(1/1)
[授权书]
- 基于可交换弱伪随机函数的隐私集合求并方法及系统, 2021-1-1501707.7, 2021.12.10, 排序(2/2)
[授权书]
Publications
2024
- Unbalanced Private Set Union with Reduced Computation and Communication
Cong Zhang, Yu Chen, Weiran Liu, Liqiang Peng, Meng Hao, Anyu Wang, Xiaoyun Wang
ACM CCS 2024
[eprint]
- Private Set Operations from Multi-Query Reverse Private Membership Test
Yu Chen, Min Zhang, Cong Zhang, Minlang Dong, Weiran Liu
PKC 2024, LNCS, vol 14603, pp.387-416.
[eprint]
[slide]
[code]
- Lattice-Based Programmable Hash Functions and Applications
Jiang Zhang, Yu Chen, Zhenfeng Zhang
Journal of Cryptology, 2024, vol 37(4)(extended version of CRYPTO 2016)
[eprint]
- 公钥加密综述 (A Survey on Public-Key Encryption)
陈宇, 易红旭, 王煜宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(1), pp.191-226. [link]
- 可认证数据结构综述 (A Survey on Authenticated Data Structures)
孔祥玉, 陈宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(3), pp.545-574. [link]
- 隐私集合运算中的关键数据结构研究 (A Survey on Key Data Structures in Private Set Operation)
张响鸰, 张聪, 刘巍然, 陈宇
密码学报 (Journal of Cryptologic Research), 2024, vol 11(2), pp.263-281. [link]
- Fast Two-Party Signature for Upgrading ECDSA to Two-Party Scenario Easily
Binbin Tu, Yu Chen, Hongrui Cui, Xianfang Wang
Theoretical Computer Science, 2024, vol 986, pp.1-12.
[link]
2023
- Fine-Grained Secure Attribute-Based Encryption
Yuyu Wang, Jiaxin Pan, Yu Chen
JJournal of Cryptology, 2023, vol 36(4) (extended version of CRYPTO 2021) [eprint]
- A Simple and Efficient Framework of Proof Systems for NP
Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen
ASIACRYPT 2023, LNCS, vol 14439, pp.174-207.
[eprint]
- Sigma Protocols from Verifiable Secret Sharing and Their Applications
Min Zhang, Yu Chen, Chuanzhou Yao, Zhicao Wang
ASIACRYPT 2023, LNCS, vol 14439, pp.208–242.
[eprint]
[slide]
- Fast Unbalanced Private Set Union from Fully Homomorphic Encryption
Binbin Tu, Yu Chen, Qi Liu, Cong Zhang
ACM CCS, 2023, pp.2959-2973.
[eprint]
- Linear Private Set Union from Multi-Query Reverse Private Membership Test
Cong Zhang, Yu Chen, Weiran Liu, Min Zhang, Dongdai Lin
USENIX Security, 2023, pp. 337-354.
[eprint]
[slide]
- 支持批量证明的SM2适配器签名及其分布式扩展 (SM2-based Adaptor Signature with Batch Proofs and Its Distributed Extension)
涂彬彬, 陈宇
软件学报 (Journal of Software), 2024, vol 35(5), pp.2566-2582. [link]
2022
- You Can Sign but Not Decrypt: Hierarchical Integrated Encryption and Signature
Min Zhang, Binbin Tu, Yu Chen
INSCRYPT 2022, LNCS, vol 13837, pp.67-86.
[eprint]
[slide]
- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps
Binbin Tu, Min Zhang, Yu Chen
ISC 2022, LNCS, vol 13640, pp.175-193.
[springer]
- Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
Jounral of Cryptology, 2022, vol 35(2) (extended version of PKC 2016)[pdf]
2021
- Hierarchical Integrated Signature and Encryption
(or Key Separation vs. Key Reuse: Enjoy the Best of Both Worlds)
Yu Chen, Qiang Tang, Yuyu Wang
ASIACRYPT 2021, LNCS, vol 13091, pp.514-543.
[eprint]
[slide]
[code]
[video]
[springer]
- Fine-grained Secure Attribute-based Encryption
Yuyu Wang, Jiaxin Pan, Yu Chen
CRYPTO 2021, LNCS 12828, pp.179-207.
[video]
[springer]
- MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK)
Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu
ESORICS 2021, LNCS, vol 12973, pp.332-351.
[video]
[springer]
2020
- PGC: Decentralized Confidential Payment System with Auditability
Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au
ESORICS 2020, LNCS 12308, pp.591-610. [eprint]
[slide]
[extended_slide]
[code]
[video]
[springer]
- Public-Key Authenticated Encryption with Keyword Search Revisited: Security Model and Constructions
Baodong Qin, Yu Chen, Qiong Huang, Ximeng Liu, Dong Zheng
Information Sciences, Vol.516, 2019, pp.515-528.
- Threshold Trapdoor Functions and Their Applications
Binbin Tu, Yu Chen, Xueli Wang
IET Information Security, 2020, Vol.14(2), pp.220-231.
[arxiv]
- A Survey of Threshold Cryptosystems
Binbin Tu, Yu Chen
Journal of Cryptologic Research (密码学报), 2020, Vol.7(1), pp.1-14.
[link]
2019
- Adding Linkability to Ring Signatures with One-Time Signatures
Xueli Wang, Yu Chen, Xuecheng Ma
ISC 2019, LNCS 11723, pp.445-464. [eprint]
- KDM Security for Identity-Based Encryption: Constructions and Separations
Yu Chen, Jiang Zhang, Yi Deng, Jinyong Chang
Information Sciences, Vol.486, 2019, pp.450-473
[eprint]
2018
- Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation
Yu Chen, Yuyu Wang, Hong-Sheng Zhou
ASIACRYPT 2018, LNCS 11273, pp.575-606 [eprint]
[slides]
- Regular Lossy Functions and Their Applications in Leakage-Resilient Cryptography
Yu Chen, Baodong Qin, Haiyang Xue
CT-RSA 2018, LNCS 10808, pp.491-511 [eprint]
[slides] (Extended version appears at Theoretical Computer Science 2018)
- Two Message Key Exchange with Strong Security from Ideal Lattices
Zheng Yang, Yu Chen, Song Luo
CT-RSA 2018, LNCS 10808, pp.98-115 [eprint]
[slides]
- On the Security of Classic Protocols for Unique Witness Relations
Yi Deng, Xuyang Song, Jingyue Yu, Yu Chen
PKC 2018, LNCS 10770, pp.589-615 [eprint]
2017
- From Attack on Feige-Shamir to Construction of Oblivious Transfer
Jingyue Yu, Yi Deng, Yu Chen
Inscrypt 2017
2016
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei
Inscrypt 2016
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Jiang Zhang, Yu Chen, Zhenfeng Zhang
CRYPTO 2016 [eprint]
- Non-Malleable Functions and Their Applications
Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow
PKC 2016 [eprint]
[slides]
- Generalized (Identity-Based) Hash Proof System and Its Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Security and Communication Networks, 2016, Vol.9(12), pp.1698-1716.
[eprint]
- Generic Constructions of Integrated PKE and PEKS
Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang
Designs, Codes and Cryptography, 2016, Vol.78(2), pp.493-526.
[eprint]
- Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More
Yu Chen, Qiong Huang, Zongyang Zhang
International Journal of Information Security, 2016, Vol.15(1), pp.15-33.
[eprint]
- Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
Journal of Computer Security, 2016, Vol.24(2), pp.289-320.
[eprint]
2015
- Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model
Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao and Yunlei Zhao
Provsec 2015
2014
- Black-Box Separations for One-More (Static) CDH and Its Generalization
Jiang Zhang, Zhenfeng Zhang, Yu Chen, Yanfei Guo, Zongyang Zhang
ASIACRYPT 2014
[iacr archive]
- PRE: Stronger Security Notions and Efficient Construction with Non-Interactive Opening
Jiang Zhang, Zhenfeng Zhang, Yu Chen
Theoretical Computer Science, Vol. 542, 2014, pp. 1-16.
[eprint]
- Publicly Evaluable Pseudorandom Functions and Their Applications
Yu Chen, Zongyang Zhang
SCN 2014
- Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited
Yu Chen, Qiong Huang, Zongyang Zhang
ACISP 2014
- All-But-One Dual Projective Hashing and Its Applications
Zongyang Zhang, Yu Chen, Sherman S.M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao
ACNS 2014
- CCA-secure IB-KEM from Identity-Based Extractable Hash Proof System
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
The Computer Journal, Vol.57(10), 2014, pp. 1537-1556
[eprint]
2013
- Reflections on the Security Proofs of Boneh-Franklin Identity-Based Encryption Scheme
Yu Chen, Liqun Chen, Dongdai Lin
Science China Mathematics (中国科学:数学), Vol.56 (7), 2013, pp. 1385-1401
2012
- Anonymous Identity-Based Hash Proof Systems and Their Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
Provsec 2012
- Identity-Based Extractable Hash Proof Systems and Their Applications
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
ACNS 2012
- CCA-secure IB-KEM Based on the Computational Bilinear Diffie-Hellman Assumption
Yu Chen, Liqun Chen, Zongyang Zhang
ICISC 2012 [eprint]
- The n-Diffie-Hellman Problem and Multiple-Key Encryption
Liqun Chen, Yu Chen
International Journal of Information Security, Vol.11(5), 2012, pp. 305-320.
[eprint]
2011
- The n-Diffie-Hellman Problem and Its Applications
Liqun Chen, Yu Chen
ISC 2011 [pdf]
- A New Leakage-Resilient IBE Scheme in the Relative Leakage Model
Yu Chen, Song Luo, Zhong Chen
DBSec 2011 [pdf]
- A Novel Commutative Blinding Identity-Based Encryption Scheme
Yu Chen, Song Luo, Jianbin Hu, Zhong Chen
FPS 2011 [pdf]
- Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes
Yu Chen, Liqun Chen, Zhong Chen
ISPEC 2011 [eprint]
2010
- Twin Bilinear Diffie-Hellman Inversion Problem and Its Application
Yu Chen, Liqun Chen
ICISC 2011
- When ABE Meets RSS
Yu Chen, Hyun Sung Kim, Jianbin Hu, Zhong Chen
DBSec 2010
- Identity-Based Encryption Based on DHIES
Yu Chen, Manuel Charlemagne, Zhi Guan, Jianbin Hu, Zhong Chen
ASIACCS 2010
Personal
I have many hobbies that convey incredible beauty, including Table-Tennis, Guitar, Chess, Chinese Martial Arts.
Useful Links
Books and Essays
Post Address
- Room 0324, Ganchang Building, Shandong University (Qingdao), Binghai Road No.72, Jimo, Qingdao, Shandong
- 山东大学青岛市即墨区滨海路72号K4-324, 山东大学网络空间安全学院, 淦昌苑D座0324, 邮编: 266237