师资队伍

朱岩

朱岩教授

职称:教授

研究方向:信息安全、区块链与智能合约、云计算、代码法律化、代数与密码学、安全计算

Email:

  • 个人简介
  • 教育及工作经历
  • 学术成果
  • 荣誉奖励和兼职

个人简介

朱岩,男,福耀科技大学客座教授。现北京科技大学计算机与通信工程学院教授、博士生导师。就读于中国科学院信息安全国家重点实验室(2002-2005),师从冯登国院士,于2005年获得博士学位。曾在北京大学副研究员(2005-2013)、美国亚利桑那州立大学(2008-2009)、美国密西根大学(2012)就职和访学。已发表SCI/EI检索学术论文120余篇,他引超过4500次(Google学术),参与国家和北京市科研项目10余项,出版学术专著和教材4本,已申请和授权专利20余项,包括美国授权专利2项。现任IEEE/ACM/CCF/ITE资深会员、中国密码学会安全协议专委会委员、中国电子学会区块链专委会副主任、北京市通信保障和信息安全应急专家,并多次参与国家自然科学基金委会议评审、科技部重点研发计划会议评审、北京市人才计划等评审工作。


教育及工作经历

教育经历:

1)1993-1997 哈尔滨工程大学, 计算机科学与技术学院,本科; 

2)2000-2003 哈尔滨工程大学, 计算机科学与技术学院,硕士; 

3)2002-2005 哈尔滨工程大学, 计算机科学与技术学院,博士。

工作经历:

1)2013/01-至今 北京科技大学,计算机与通信工程学院,教授; 

2)2012/04-2012/11 美国密西根大学,信息科学学院,客座学者; 

3)2008/08-2009/09 美国亚利桑那州立大学,计算机科学学院,访问副教授; 

4)2007/06-2013/02 北京大学,计算机科学与技术研究所,副研究员; 

5)2005/07-2007/06 北京大学,计算机科学与技术研究所,助理研究员。


学术成果

学术专著:

1、 朱岩、陈娥,《数字认证技术》,清华大学出版社;

2、 朱岩、王迪,《智能法律合约》,清华大学出版社

3、 Dijiang Huang, Qiouxiang Dong, Yan Zhu,《Attribute-Based Encryption and Access Control》, CRC Press

4、 柴洪峰,马小峰,朱岩等,《区块链导论》,中国科学技术出版社。

论文:

[1] Hai Lu, Yan Zhu, Cecilia E Chen, et al. Toward efficient key extraction of LBC over ring: fast non-spherical G-lattice sampler and optimized perturbation generation. IEEE Transactions on Information Forensic and Security, 2024,19: 4301-4315;

[2] H. Lu, Y. Zhu, C. E Chen, R. Feng, L. Zhang, D. Ma. Efficient key generation on lattice cryptography for privacy protection in mobile IoT crowdsourcing. IEEE Internet of Things Journal, 2024, 11(2): 1893--1909

[3] Y. Fan, E Chen, Y. Zhu, X. He, S. S. Yau and K. Pandya. Automatic generation of smart contracts from real-world contracts in natural language. Proceedings of the IEEE Smart World Congress, 2023, To published

[4] G. Guo, Y. Zhu, C. E Chen, L. Zhang, R. Feng, D. Ma. Privacy-preserving queries using multisource private data counting on real numbers in IoT. IEEE Internet of Things Journal, 2024, 11(7): 11353--11367

[5] G. Guo, Y. Zhu, E Chen, S.S. Yau. Privacy-preserving collaborative queries in services computing using multisource private data counting. IEEE Transactions on Services Computing, 2024,17(1): 1--17

[6] Hongjian Yin, Yan Zhu, Guanglai Guo, William C.-C. Chu. Privacy-Preserving Smart Contracts for Confidential Transactions Using Dual-Mode Broadcast Encryption. IEEE Transactions on Reliability, 2024, 73(2): 1090-1103

[7] 陆海, 薛显斌, 朱岩, 陈娥, 韩皓庭, 孟疏桐, 林鸿杰. 可搜索加密及其驱动的SQL隐私数据库设计[J]. 工程科学学报, 2024, 46(11): 2085-2098

[8] E. Chen, Y. Zhu, K. Liang, and H. Yin. Secure remote cloud file sharing with attribute-based access control and performance optimization. IEEE Transactions on Cloud Computing, 2023, 11(1), 579--594

[9] E. Chen, S. Wang, Y. Fan, Y. Zhu, and S. Yau. SaaSC: Toward pay-as-you-go mode for software service transactions based on blockchain’s smart legal contracts. IEEE Transactions on Services Computing, 2023, 16(5): 3665--3681

[10] G. Guo, Y. Zhu, E. Chen, R. Yu, L. Zhang, K. Lv, and R. Feng. Efficient multiparty fully homomorphic encryption with computation fairness and error detection in privacy preserving multisource data mining. IEEE Transactions on Reliability, 2023,72(4):1308--1323

[11] H. J. Yin, Y. Zhu, J. Wang, G. L. Guo, and E. Chen. Design and implementation of a smart-contract voting system based on zero-knowledge proof. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2023, 45(4), 632--3681

[12] S.-D. Wang, E. Chen, Y. Zhu, Y.-C. Lin, and G.-W. Liu. A software service transaction approach based on blockchain smart contracts. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2023, 45(3), 1--14

[13] Chengxin Zhou, Xianbin Xue, Khaled Riad, Yan Zhu, William C.-C. Chu. Remotely Controllable Data Self-Destruction for Privacy-Preserving Sensitive Data Services. 2023 IEEE International Conference on High Performance Computing & Communications, 2023, to be published

[14] 范雨晴, 王迪, 林鸿杰, 陈娥, 何啸, 朱岩. 合同文本置标语言CTML:基于法律信息规范化提取的智能合约生成方法研究[J]. 工程科学学报, 2024, 46(1): 109-119

[15] E. Chen, Y. Zhu, Z. Zhou, S.-Y. Lee, W. Wong, and W.-C. Chu. Policychain: A decentralized authorization service with script-driven policy on blockchain for Internet of Things. IEEE Internet of Things Journal, 2022, 9(7): 5391--5409

[16] E. Chen, B. Qin, Y. Zhu, W. Song, S. Wang, C.-C. Chu, and S. Yau. SPESC-Translator: Towards automatically smart legal contract conversion for blockchain-based auction services. IEEE Transactions on Services Computing, 2022, 15(5): 3061--3076

[17] H. Lu, R. Yu, Y. Zhu, X. He, K. Liang, and W.-C. Chu. Policy-driven data sharing over attribute-based encryption supporting dual membership. Journal of Systems and Software, 2022, 188: 111271

[18] Q. Guo, Y. Zhu, H.-J. Yin, E. Chen, D. Wang, and G.-W. Liu. Design and implementation of conclusion procedure in smart legal contracts based on negotiation and acceptance. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2022, 44(12): 2138--2153

[19] G. Guo, Y. Zhu, E. Chen, G. Zhu, D. Ma, and W. Chu. Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols. Peer-to-Peer Networking and Applications, 2022, 15: 304--323

[20] H. Yin, E. Chen, Y. Zhu, R. Feng, and S. Yau. An efficient zero-knowledge dual membership proof supporting pos-and-neg membership decision. Mathematics, 2022, 10(17): 3217

[21] H. Yin, E. Chen, Y. Zhu, C. Zhao, R. Feng, and S. Yau. Attribute-based private data sharing with script-driven programmable ciphertext and decentralized key management in blockchain internet of things. IEEE Internet of Things Journal, 2022, 9(13): 10625--10639

[22] D. Wang, Y. Zhu, E. Chen, Q. Guo, J.-N. Li, Y.-Z. Sun, and R. Yi. Smart legal contract and its research progress. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2022, 44(1): 68--81

[23] Y. Zhu, W. Song, D. Wang, D. Ma, and W.-C. Chu. TA-SPESC: Toward asset-driven smart contract language supporting ownership transaction and rule-based generation on blockchain. IEEE Transactions on Reliability, 2021,70(3): 1255--1270

[24] Y. Zhu, Q. Guo, H. Yin, K. Liang, and S. S. Yau. Blockchain-based software architecture development for service requirements with smart contracts. Computer, 2021, 54(12): 72--80

[25] Y. Zhu, B.-H. Qin, E. Chen, and G.-W. Liu. An advanced smart contract conversion and its design and implementation for auction contract. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (3): 652--668

[26] E Chen, Y. Zhu, G. Zhu, K. Liang, and R. Feng. How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors. Computers and Security, 2021, 107: 102318

[27] Y. Jiang, Y. Li, and Y. Zhu. ACT: Auditable confidential transaction scheme. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57(10): 2232--2240

[28] E Chen, Y. Zhu, C. Lin, and K. Lv. Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature. Frontiers of Computer Science, 2020, 14(4): 1--14

[29] G. Guo, Y. Zhu, R. Yu, W.-C. Chu, and D. Ma. A privacy-preserving framework with self-governance and permission delegation in online social networks. IEEE Access, 2020, 8: 157116--157129

[30] D. Wang, Y. Zhu, Y. Zhang, and G. Liu. Security assessment of blockchain in Chinese classified protection of cybersecurity. IEEE Access, 2020, 8: 203440--203456

[31] G. Gan, E. Chen, Z. Zhou, and Y. Zhu. Token-based access control. IEEE Access, 2020, 8: 54189--54199

[32] Y. Zhu, Y. Zhang, D. Wang, B.-H. Qin, Q. Guo, R.-Q. Feng, and Z.-J.Zhao. Research on blockchain evaluation methods under the classified protection of cybersecurity. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2020, 42(10): 1267--1285

[33] Y. Jiang, Y. Li, and Y. Zhu. Auditable zerocoin scheme with user awareness. Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019: 28--32

[34] Y. Zhu, R. Yu, D. Ma, and W.-C. Chu. Cryptographic attribute-based access control (ABAC) for secure decision making of dynamic policy with multiauthority attribute tokens. IEEE Transactions on Reliability, 2019, 68(4): 1330-1346

[35] Y. Zhu, K. Riad, R. Guo, G. Gan, and R. Feng. New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain. Frontiers of Computer Science, 2019, 13: 1182--1197

[36] Y. Zhu, Q.-S. Wang, B.-H. Qin, and Z.-H. Wang. Survey of blockchain technology and its advances. Gongcheng Kexue Xuebao/Chinese Journal of Engineering, 2019, 41(11): 1361--1373

[37] Y. Zhu, H. Yin, and Q.-Y. Wang. Group VPN system and multicast key distribution protocol based on group-oriented cryptography. Ruan Jian Xue Bao/Journal of Software, 2019, 30(9): 2815--2829

[38] Y. Zhu, Y. Zhang, J. Wang, W. Song, C.-C. Chu, and G. Liu. From data-driven to intelligent-driven: Technology evolution of network security in big data era. Proceedings of 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019, 2: 103--109

[39] Y. Zhu, S. Yang, C.-C. Chu, and R. Feng. Flashghost: Data sanitization with privacy protection based on frequent colliding hash table. Proceedings of 2019 IEEE International Conference on Services Computing (SCC). IEEE, 2019: 90--99

[40] Y. Zhu, X.-X. Song, X.-B. Xue, B.-H. Qin, and G.-W. Liu. Smart contract execution system over blockchain based on secure multi-party computation. Journal of Cryptologic Research, 2019, 6(2): 246--257

[41] Y. Zhu, R. Yu, E. Chen, and D. Huang. An efficient broadcast encryption supporting designation and revocation mechanisms. Chinese Journal of Electronics/中国电子学报-英文版, 2019, 28(3): 445--456

[42] X. He, B. Qin, Y. Zhu, X. Chen, and Y. Liu. SPESC: A specification language for smart contracts. Proceedings of 2018 IEEE 42nd Annual computer software and applications conference (COMPSAC). IEEE, 2018, 1: 132--137

[43] Q. Wang, R. Feng, and Y. Zhu. Verifiable random functions with Boolean function constraints. Science China Information Sciences, 2018, 61: 1--3

[44] B. Li, D. Huang, Z. Wang, and Y. Zhu. Attribute-based access control for ICN naming scheme. IEEE Transactions on Dependable and Secure Computing, 2016, 15(2): 194--206

[45] Y. Zhu, R. Yu, E. Chen, and D. Huang. Dual-mode broadcast encryption. Science China Information Sciences, 2018, 61(11): 118101

[46] Y. Zhu, G. Gan, R. Guo, and D. Huang, PHE: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud. IEEE Transactions on Cloud Computing, 2018, 6(4): 1110--1124

[47] Y. Zhu, Y. Qin, Z. Zhou, X. Song, G. Liu, and W.-C. Chu, Digital asset management with distributed permission over blockchain and attribute-based access control. IEEE International Conference on Services Computing (SCC), 2018: 193--200

[48] Y. Zhu, R. Yu, Y. Qin, D. Ma, and W.-C. Chu. Provably secure cryptographic ABAC system to enhance reliability and privacy using real-time token and dynamic policy. IEEE International Conference on Software Quality, Reliability and Security (QRS), 2018: 277--288

[49] Y. Zhu, X. Song, S. Yang, Y. Qin, and Q. Zhou. Secure smart contract system built on SMPC over blockchain. IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2018: 1539--1544

[50] Y. Zhu, S. Yang, G. Gan, and X. He. An efficient retrograde storage for self-destructing messages on frequently colliding hash table. IEEE 42nd Annual Computer Software and Applications Conference, 2018, 1: 914--919

[51] Y. Zhu, Y. Qin, G. Gan, Y. Shuai, and W.-C. Chu. TBAC: Transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. IEEE International Conference on Computer, Software & Applications (COMPSAC), 2018: 535--544

[52] Y. Zhu, G. Gan, and K. Riad. BC-PDS: Protecting privacy and self-sovereignty through blockchains for OpenPDS. IEEE Symposium on Service-Oriented System Engineering (SOSE), 2017: 138--144

[53] K. Riad and Z. Yan. Multi-factor synthesis decision-making for trust-based access control on cloud. International Journal of Cooperative Information Systems, 2017, 26(4): 1750003

[54] F. Luo, C. Lin, and Y. Zhu. Role-based signature and its security proof. Journal of Information Science and Engineering, 2016, 32(6): 1525--1539

[55] W.-T. Tsai, R. Blower, Y. Zhu, and L. Yu. A system view of financial blockchains. IEEE Symposium on Service-Oriented System Engineering (SOSE), 2016: 450--457

[56] K. Riad, Z. Yan, H. Hu, and G.-J. Ahn. AR-ABAC: A new attribute based access control model supporting attribute-rules for cloud computing. IEEE Conference on Collaboration and Internet Computing (CIC), 2016: 28--35

[57] C. Lin, F. Luo, H. Wang, and Y. Zhu. A provable data possession scheme with data hierarchy in cloud. Information Security and Cryptology: 11th International Conference. Inscrypt, 2016: 301--321

[58] Y. Zhu, R. Guo, G. Gan, and W.-T. Tsai. Interactive incontestable signature for transactions confirmation in bitcoin blockchain. IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), 2016: 443--448

[59] B. Shrestha, D. Ma, Y. Zhu, H. Li, and N. Saxena. Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware. IEEE Transactions on Information Forensics and Security, 2015, 10(11): 2270--2283

[60] Z. Wang, D. Huang, Y. Zhu, B. Li, and C.-J. Chung. Efficient attribute-based comparable data access control. IEEE Transactions on Computers, 2015, 64(12): 3430--3443

[61] H. Wu, D. Huang, and Y. Zhu. Establishing a personal on-demand execution environment for mobile cloud applications. Mobile Networks and Applications, 2015, 20: 297--307

[62] Y. Zhu, F. Pu, G. Gan, R. Guo, and S. Zhang. Traitor tracing and revocation for secure decoders in file syncing-and-sharing service. IEEE 39th Annual Computer Software and Applications Conference, 2015, 2: 504--509

[63] Y. Zhu, L. Yang, and D. Ma. Secure snaps: A new forward secrecy cryptosystem for self-destructing messages in mobile services. IEEE International Conference on Mobile Services, 2015: 142--149

[64] Y. Zhu, D. Huang, C.-J. Hu, and X. Wang. From RBAC to ABAC: Constructing flexible data access control for cloud storage services. IEEE Transactions on Services Computing, 2015, 8(4): 601--616

[65] Y. Zhu, D. Li, and L. Yang. Traitor tracing based on partially-ordered hierarchical encryption. Trusted Systems: 6th International Conference, 2015: 278--293

[66] Y. Zhu, X. Wang, D. Ma, and R. Guo. Identity-set-based broadcast encryption supporting “cut-or-select” with short ciphertext. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15). ACM, 2015:191--202

[67] B. Li, A. P. Verleker, D. Huang, Z. Wang, and Y. Zhu. Attribute-based access control for ICN naming scheme. Proceedings of 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014: 391--399

[68] S. Wang, Y. Zhu, D. Ma, and R. Feng. Lattice-based key exchange on small integer solution problem. Science China Information Sciences, 2014, 57: 1--12

[69] Y. Zhu, S. Wang, D. Ma, and R. Feng. Identity-based encryption on RSA without pairings and key escrow. Chinese Journal of Electronics/中国电子学报-英文版, 2014, 23: 842--849

[70] Y. Zhu, D. Ma, C. Hu, G.-J. Ahn, and H. Hu. Secure and efficient random functions with variable-length output. Journal of Network and Computer Applications, 2014, 45: 121--133

[71] Y. Zhu, G.-J. Ahn, H. Hu, D. Ma, and S. Wang. Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy. IEEE Transactions on Information Forensics and Security, 2013, 8: 2138--2153

[72] Y. Zhu, D. Ma, S. Wang, and R. Feng. Efficient identity-based encryption without pairings and key escrow for mobile devices. Wireless Algorithms, Systems, and Applications, 2013, 7992:42--53

[73] Y. Zhu, D. Ma, D. Huang, and C. Hu. Enabling secure location-based services in mobile cloud computing. Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing, 2013: 27--32

[74] Y. Zhu, D. Ma, C.-J. Hu, and D. Huang. How to use attribute-based encryption to implement role-based access control in the cloud. Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013: 33--40

[75] Y. Zhu, G.-J. Ahn, H. Hu, S. Yau, H. An, and C.-J. Hu. Dynamic audit services for outsourced storages in clouds. IEEE Transactions on Services Computing, 2013, 6(2): 227--238

[76] Y. Zhu, C. Hu, D. Ma, and J. Li. Cryptographic Spatio-temporal predicates for location-based services. In 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013, 84-91

[77] H. Li, D. Ma, N. Saxena, B. Shrestha, and Y. Zhu. Tap-wave-rub: Lightweight malware prevention for smartphones using intuitive human gestures. Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013: 25--30

[78] D. Ma, Y. Zhu, and M. Yu. End-to-end aggregate authentication of time-series data. Proceedings of the First ACM Workshop on Asia Public-key Cryptography, 2013: 51--56

[79] D. Ma, N. Saxena, T. Xiang, and Y. Zhu. Location-aware and safer cards: Enhancing RFID security and privacy via location sensing. Proceedings of the fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012: 51--62

[80] Y. Zhu, S. Wang, D. Ma, H. Hu, and G.-J. Ahn. Secure and efficient constructions of hash, mac and PRF for mobile devices. Proceedings of 2012 IEEE Global Communications Conference (GLOBECOM), 2012: 949--954

[81] Y. Zhu, H. Hu, G.-J. Ahn, and M. Yu. Cooperative provable data possession for integrity verification in multi-cloud storage. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(12): 2231--2244

[82] Y. Zhu, D. Ma, and S. Wang. Secure data retrieval of outsourced data with complex query support. Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops, 2012: 481--490

[83] Y. Zhu, S. Wang, H. Hu, G.-J. Ahn, and D. Ma. Secure collaborative integrity verification for hybrid cloud environments. International Journal of Cooperative Information Systems, 2012: 21(3): 165--197

[84] Y. Zhu, M. Yu, H. Hu, G.-J. Ahn, and H. Zhao. Efficient construction of provably secure steganography under ordinary covert channels. Science China Information Sciences, 2012, 55: 1639--1649

[85] Y. Zhu, H. Hu, G.-J. Ahn, D. Huang, and S. Wang. Towards temporal access control in cloud computing. Proceedings IEEE Infocom, 2012: 2576--2580

[86] Y. Zhu, H. Hu, G.-J. Ahn, M. Yu, and H. Zhao. Comparison-based encryption for fine-grained access control in clouds. Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012: 105--116

[87] Y. Zhu, H. Hu, G.-J. Ahn, and S. Yau. Efficient audit service outsourcing for data integrity in clouds. Journal of Systems and Software, 2012, 85(5): 1083--1095

[88] Y. Zhu, H. Hu, G.-J. Ahn, Y. Han, and S. Chen. Collaborative integrity verification in hybrid clouds. Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). IEEE, 2011: 191--200

[89] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau. Dynamic audit services for integrity verification of outsourced storages in clouds. Proceedings of the 2011 ACM Symposium on Applied Computing, 2011: 1550--1557

[90] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, and H. Hu. Zero-knowledge proofs of retrievability,” Science China Information Sciences. Science China Information Sciences, 2011, 54: 1608--1617

[91] Y. Zhu, H.-X. Hu, G.-J. Ahn, H.-X. Wang, and S.-B. Wang. Provably secure role-based encryption with revocation mechanism. Journal of Computer Science and Technology, 2011, 26(4): 697--710

[92] Y. Zhu, Z. Hu, H. Wang, H. Hu, and G.-J. Ahn. A collaborative framework for privacy protection in online social networks. Proceedings of 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010). IEEE, 2010: 1--10

[93] Y. Zhu, G.-J. Ahn, H. Hu, and H. Wang. Cryptographic role-based security mechanisms based on role-key hierarchy. Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010: 314--319

[94] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau. Efficient provable data possession for hybrid clouds. Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010: 756--758

[95] D. Huang, Z. Zhou, and Z. Yan. Gradual identity exposure using attribute-based encryption. International Journal of Information Privacy, Security and Integrity, 2012, 1(2-3): 278--297

[96] H.-X. Wang, Y. Zhu, R.-Q. Feng, and S. Yau. Attribute-based signature with policy-and-endorsement mechanism. Journal of Computer Science and Technology, 2010, 25(6): 1293--1304

[97] Y. Zhu, C.-T. Li, and H.-J. Zhao. Structural digital signature and semi-fragile fingerprinting for image authentication in wavelet domain. Third International Symposium on Information Assurance and Security, 2007: 478--483

[98] X. Zhang, Y. Yang, and Y. Zhu. A secure hierarchical fragile watermarking method with tamper localization. Proceedings of First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), 2006, 2:69--74

[99] X.-H. Zhang, Y. Zhu, and Y.-T. Yang. Hybrid watermarking algorithm based on spread spectrum and quantization. Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2006, 27(2): 258--262

[100] Z. Yan, Z. Wei, and Z. Xinshan. Collusion secure convolutional fingerprinting information codes. Proceedings of the 2006 ACM Symposium on Information, computer and communications security, 2006: 266--274

[101] X. Zhu, Y. Gao, and Y. Zhu. Image-adaptive watermarking based on perceptually shaping watermark blockwise. ACM Symposium on Information, computer and communications security. 2006: 175--181

[102] Y. Zhu and Y.-T. Yang. Performance analysis of spread spectrum CDMA watermarking and applied research. Journal of Harbin Institute of Technology. 2006, 28(8): 1376--1380

[103] Y. Zhu, Y.-T. Yang, and D.-G. Feng. Convolutional fingerprinting information codes for collusion security. Journal of Software//软件学报, 2006, 17(7): 1617--1626

[104] Y. Zhu, X.-H. Han, Z.-Y. Ye, and Y.-T. Yang. Spread spectrum convolutional fingerprinting and its security analysis. Chinese Journal of Computers/中国计算机学报, 2006, 29(6): 960--968

[105] Y. Zhu, Y.-T. Yang, and D.-G. Feng. Research on hybrid watermarking based on spread spectrum and quantization in multiwavelet domain. Acta Electronica Sinica/电子学报, 2006, 34(10): 1817--1822

[106] Y. Zhu, Y.-T. Yang, Z.-Y. Ye, W. Zou, and D.-G. Feng. An Asymmetric Spread-Spectrum Fingerprinting with Buyer Transparency[J]. Acta Electronica Sinica/电子学报, 2006, 34(6): 1041-1047

[107] Y. Zhu, Y.-T. Yang, Z.-W. Sun, and D.-G. Feng. Ownership proofs of digital works based on secure multiparty computation. Journal of Software//软件学报, 2006, 17(1): 157--166

[108] Y. Zhu, D. Feng, and W. Zou. Collusion secure convolutional spread spectrum fingerprinting. Digital Watermarking: 4th International Workshop (IWDW 2005), 2005: 67--83

[109] Y. Zhu, Z.-W. Sun, Y.-T. Yang, and D.-G. Feng. Performance analysis of spread spectrum CDMA watermarking and applied research in multiwavelet domain. Chinese Journal of Computers/中国计算机学报, 2005, 28(8): 1376--1385

[110] Z.-W. Sun, Y. Zhu, D.-G. Feng. Performance Analysis of DCT-Domain Watermark Detection Based on Local Optimum Detection[J]. Acta Electronica Sinica/电子学报, 2005, 33(5): 864-867

[111] Y.Zhu, X.-Y. Li, and R.-B. Zhang, Adaptive speech enhancement based on wavelet in high noise environment. International Conference on Machine Learning and Cybernetics (ICMLC 2002), 2002, 2: 885--889

[112] 王晟典, 陈娥, 朱岩, 林映春, 刘国伟. (2023). 一种基于区块链智能合约的软件服务交易方法. 工程科学学报, 45(3), 475-488

[113] 殷红建, 朱岩, 王静, 郭光来, 陈娥. 基于零知识证明的智能合约投票系统设计与实现[J]. 工程科学学报, 2023, 45(4): 744-752

[114] 王迪, 朱岩, 陈娥, 郭倩, 李冀宁, 孙贻滋, 伊然. 智能法律合约及其研究进展[J]. 工程科学学报, 2022, 44(1): 68-81

[115] 郭倩, 朱岩, 殷红建, 陈娥, 王迪, 刘国伟. 基于要约–承诺的智能法律合约订立方法与实现[J]. 工程科学学报, 2022, 44(12): 2138-2153

[116] 朱岩,秦博涵,陈娥,刘国伟.SPESC:一种高级智能合约转化方法及竞买合约设计与实现[J].计算机学报,2021,44(3):652-668

[117] 朱岩, 张艺, 王迪, 秦博涵, 郭倩, 冯荣权, 赵章界. 网络安全等级保护下的区块链评估方法[J]. 工程科学学报, 2020, 42(10): 1267-1285

[118] 朱岩, 尹昊, 王秋艳. 群组密码的对等VPN系统及多播密钥分发协议[J]. 软件学报, 2019, 30(9): 2815-2829

[119] 朱岩, 王巧石, 秦博涵, 王中豪. 区块链技术及其研究进展[J]. 工程科学学报, 2019, 41(11): 1361-1373

[120] 朱岩, 宋晓旭, 薛显斌, 秦博涵, 刘国伟. (2019). 基于安全多方计算的区块链智能合约执行系统. 密码学报, 6(2), 246-257

[121] 朱岩,王怀习,胡泽行;Gail-Joon Ahn;胡宏新.数据可恢复性的零知识证明[J]. 中国科学: 信息科学, 2011, 41(10): 1224-1237

[122] 朱岩; 余孟扬; 胡宏新; Gail-Joon Ahn; 赵红佳. 常规隐信道下可证明安全隐写术的有效构造方法. 中国科学: 信息科学, 2013, 43(5): 657-669。

专利:

[1] Yan Zhu, Feng Pu, Ruyun Yu, Dandan Li. Method and System for Group-oriented Encryption and Decryption with Selection and Exclusion Functions. Pub.No.US20180006811A1. 美国授权专利

[2] Yan Zhu, Ruyun Yu, Hao Yin, Yao Qin. Method and System for Cryptographic Attribute Based Access Control supporting Dynamic Rules. Pub.No.US16759917. 美国专利申请

[3] 朱岩,周志远,王中豪,陈娥, 一种基于脚本的属性基访问策略表示与执行方法及系统, 201911059491.6

[4] 朱岩,王迪,秦博涵,宋伟静, 一种法律合约的智能可执行合约构造与执行方法和系统, 202010381549.5

[5] 朱岩,王静,陈娥,王迪, 基于陷门二元单向函数的广播加密方法及装置, 202010725369.4

[6] 朱岩,王中豪,王晟典,欧阳欢, 一种基于交易的去中心化访问控制方法和系统, 202011189225.8

[7] 朱岩,蒲凤, 于汝云, 李丹丹, 一种具有选择和排除功能的群组加解密方法及系统, 2017.8.11-2035.1.12, 其他国家, ZL201510012649.X

[8] 朱岩,蒲凤,于汝云, 郭瑞琦, 一种集合成员关系判定的密码学构造方法与系统, 2014.12, 中国, 20150013367.1

[9] 朱岩, 赵红佳, 冯荣权,邹维, 一种具有容错功能的密码学分布式计算与分步检验方法, 2008.10, 中国, ZL200810111190.9

[10] 朱岩,赵红佳, 王怀习, 冯荣权, , 一种具有层次关系的公钥广播加密方法2009.10, 其他国家, 200910222921.1

[11]朱岩, 赵红佳, 冯荣权, 邹维, 一种基于反馈传播的分布式计算网络构建方法及其系统, 2008.10, 中国, ZL200810172676.3

[12]朱岩,王怀习, 赵红佳, 冯荣权, 邹维, 一种分布式计算中基于密码学的除法协议构造方法, 2009.10, 其他国家, 200910222922.6

[13]朱岩, 王怀习, 赵红佳, 冯荣权, 邹维, 一种分布式计算的逻辑比较方法,2013.4.3-2029.11.13, 其他国家, CN200910222920.7

[14]廖唯棨,张建宇,彬杨,维邹,朱岩. 网络应用流量分类识别装置及其方法2008.6.18, 其他国家, 200610165296.8

[15]朱岩,张建宇,叶志远, 陈昱, 数字作品中指纹的构造和验证方法及数字产品发行系统, 2006.10, 中国, CN200610011699.7

[16]朱岩,韩心慧, 叶志远,张建宇, 流媒体监播中的数字标记构造、验证方法及监播系统2006.10 中国CN200610144813.3。

软著:

[1] 朱岩. 基于区块链交易的去中心化访问控制系统. TxBAC V1.0. 计算机软件著作权登记,2021R11S010759, 应用软件. (已发放)

[2] 朱岩. 面向法律的JuLiuSC智能合约平台. JuLiuSC V1.0. 计算机软件著作权登记,2021R11S0107598, 应用软件. (审查中)。


荣誉奖励和兼职

1. 北京市突发事件应急委员会委员;

2. 中国电子学会区块链分会委员会副主任;

3. 雄安区块链实验室技术引领委员会委员;

4. 中国密码学会安全协议专业委员会委员;

5. 中国电子学会第十届理事会编辑出版工作委员会委员;

6. 《网络空间安全》期刊编委会委员;

7. 《信息安全研究》编委会委员;

8. 《信息网络安全》编委会委员。