苗付友,1973年5月生,博士,副教授,中国计算机学会高级会员,ACM合肥分会秘书长(2015-2019)。2005年获中国科学技术大学计算机系统结构博士学位。作为项目负责人,承担了10多项科研项目,其中包括国家自然科学基金项目、国家863重点项目、“十一五”国家密码发展基金理论课题、安徽省自然科学基金、华为基金项目等。已在包括信息安全类国际一流期刊IEEE TRANSACTION ON INFORMATION FORENSICS AND SECURITY,ASIACRYPT 等在内的相关期刊或会议上发表学术论文50余篇。2012.9—2013.8 在美国 UMKC大学做访问学者,从事应用密码特别是秘密共享及其应用方面的研究工作。
先后提出了一系列面向群组的(紧耦合)秘密共享及其应用方案,通过模拟随机信道噪声构造安全的秘密共享,抵御恶意参与者攻击。利用中国剩余定理构造真正理想的秘密共享方案,为基于中国剩余定理的秘密共享方案实用化奠定了核心算法基础;同时揭示了最经典的Shamir秘密共享方案与基于中国剩余定理类秘密共享方案的内在联系,证明了前者是我们方案的特例。
研究生招生:
欢迎对信息安全感兴趣的数学专业优秀本科生、具有良好数学基础的信息安全专业本科生积极申请本实验室硕士研究生。
研究方向:
信息安全,秘密共享,编码与应用密码,物联网安全,量子密码
-随机噪声信道在紧耦合秘密共享中的应用研究, 61572454, 2016⁄01-2019⁄12, 国家自然科学基金面上项目
-网络可信传输技术, 2011⁄07–2016⁄06, 国家863计划
-基于可信硬件的分布式自治公钥管理研究,2011011012, 2011⁄01–2012⁄12, 教育部基本科研业务费青年创新基金
-基于认证核的按需自治公钥管理技术研究, 60970128, 2010⁄01–2012⁄12, 国家自然科学基金面上项目
-分布式可重构秘钥管理技术研究, 2008⁄01–2010⁄12, 十一五国家密码基金理论课题
1.物联网与智慧城市安全保障关键技术研究, 2018⁄07 – ,国家重点研发计划
2.自组织网络协议和仿真,2009⁄01-2010⁄12,中科院知识创新工程重大方向性课题
3.移动自组网可信路由模型和有效性验证 2009⁄01-—2010/12,863项目,科技部
4.移动自组网中无需可信第三方的公平量子非抵赖协议研究, 2006⁄01-2008⁄12,国家自然科学基金
5.移动自组网中基于动态蜂窝的QoS路由协议 ,2002-2004, 863项目,科技部
6.可信移动计算平台的安全评估模型研究, 2009⁄01- 2011⁄12, 国家自然科学基金重大专项
0. Meng K, Miao F*, et.al, Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem, Accepted by Discrete Applied Mathematics, 2019.Full Text
1. Ning Y, Miao F*, Huang W, et al. Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem. Proceedings of the 24th Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT2018),2018.12, LNCS 310-331. Full Text
2. Meng K, Miao F*, Yu Y. A secure and efficient on-line/off-line group key distribution protocol[J]. Designs, Codes and Cryptography, 2018: 1-20. Full Text
3. Lu C, Miao F*, Meng K, et al. Threshold quantum secret sharing based on single qubit[J]. Quantum Information Processing, 2018, 17(3): 64. Full Text
4. Lu C, Miao F*, Hou J, et al. Verifiable threshold quantum secret sharing with sequential communication[J]. Quantum Information Processing, 2018, 17(11): 310. Full Text
5. Meng K, Miao F*, Yu Y, et al. A Universal Secret Sharing Scheme with General Access Structure Based on CRT[C]//2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2018: 142-148. Full Text
6. Miao F, Wang L, Ji Y, et al. GOMSS: A Simple Group Oriented (t, m, n) Multi-secret Sharing Scheme[J]. Chinese Journal of Electronics, 2017, 26(3): 557-563. Full Text
7. Miao F, Jiang H, Ji Y, et al. Asynchronous Group Authentication[J]. Chinese Journal of Electronics, 2017, 26(4): 820-826. Full Text
8. Xie Yang, Miao Fuyou* , et al., Realize General Access Structure Based On Single Share、2 017.12、2017 3rd International Conference on Soft Computing in Information Communication Technology (SCICT 2017). Full Text
9. Miao F, Fan Y, Wang X, et al. A (t, m, n)-Group Oriented Secret Sharing Scheme[J]. Chinese Journal of Electronics, 2016, 25(1): 174-178. Full Text
10. Miao Fuyou, Xiong Yan, Wang Xingfu, Badawy Moamen, Randomized Component and Its Application to (t,m,n)-Group Oriented Secret Sharing, IEEE Transaction on Information Forensics and Security(TIFS), 10(5), p889-899,2015. Full Text
11. Harn L, Fuyou M, Chang C. Verifiable secret sharing based on the Chinese remainder theorem [J]. Security and Communication Networks, 2014, 7(6): 950-957. Full Text
12. Harn L, Fuyou M. Multilevel threshold secret sharing based on the Chinese Remainder Theorem[J]. Information processing letters, 2014, 114(9): 504-509. Full Text
13. Harn L, Miao F. Weighted Secret Sharing Based on the Chinese Remainder Theorem[J]. International Journal of Network Security, 2014, 16(6): 420-425. Full Text
14. Miao F, Du X, Ruan W, et al. A Strong PVSS Scheme [M]//Computer Networks & Communications (NetCom). Springer New York, 2013: 521-528. Full Text
15. Huang W, Xiong Y, Wang X, Fuyou M et al. Fine-grained refinement on tpm-based protocol applications[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 1013-1026. Full Text
16. Miao F, Ruan W, Du X, et al. Fully Self-organized Key Management Scheme in MANET and Its Applications[M]//Computer Networks & Communications (NetCom). Springer New York, 2013: 381-391. Full Text
17. Huang Jian, Miao Fuyou*, Lv Jianlin,et al. Mobile Phone Based Portable Key Management[J]. Chinese Journal of Electronics, 2013, 22(1). Full Text
18. Miao Fuyou, Xiong Yan, Yang Shoubao, Wang Xingfu, A Provable Encrypted Ring Signature from Bilinear Pairings,Chinese Journal of Electronics,Chinese Journal of Electronics, v 15, n 2, April, 2006, p 204-208. Full Text
19. Miao Fuyou, Yang Shoubao, Xiong Yan, Hua Bei, Wang Xingfu, A unidirectional split-key based signature protocol with encrypted function in mobile code environment,Chinese Journal of Electronics, vol.14, no.3, July 2005,p463-466. Full Text
20. Miao Fuyou, Xiong Yan, Yang Shoubao, Wang Xingfu,PKIM: A Public Key Infrastructure for Mobile Ad hoc Network,Chinese Journal of Electronics, vol. 14, no. 4, p594-598, October 2005. Full Text
1.中国专利, 第一发明人, 自安全的紧耦合秘密共享方法,申请, 201811159860.4
2.中国专利, 第一发明人, 安全高效的线上线下组密钥分发方法,申请, 201811138913.4
3.中国专利, 第一发明人, 顺序通信的可验证门限量子秘密共享方法,申请,201811131607.8
4.中国专利, 第一发明人, 一种特殊形式二进制编码映射方法,申请, 201811639091.8
5.中国专利, 第一发明人, 一种基于门限秘密共享的组认证方法,授权,01510416888.1
6.中国专利, 第一发明人,自治公钥证书管理方法、系统及设备,授权,ZL200810146969.4
7.中国专利, 第一发明人,一种公钥证书的管理方法和设备,授权,ZL200810212915.3
8.中国专利, 第一发明人,密钥管理、密钥验证的方法及装置,授权,ZL200810226006.5
9.中国专利, 第一发明人,一种测试移动可信平台安全性的方法,授权,ZL201010591253.2