ia3p8FU0oibDlzotRqAEqIbSky6pjNMXqamBThb1Z65zVktdE19IgjApO33A
Biography

秦静,山东大学特聘教授,博士生指导教师,国家级教学名师,全国优秀教师,国家教材委员会数学学科专家委员会委员,山东省教学名师,山东省教书育人楷模,2021年获山东省教育系统优秀共产党员称号,2020年度“山东大学教学卓越奖” 。首部中等职业学校数学课程标准研制专家组组长。所在学科为基础数学,研究方向为密码学。近几年主要侧重于公钥可搜索加密、可验证外包计算、数据完整性检测、计算复杂性理论、基于属性的加密、不经意传输、安全多方计算等方面的研究。曾在美国宾夕法尼亚州立大学、英国格林威治大学、澳大利亚伍伦贡大学做访问学者。主持和完成国家自然科学基金面上项目、省自然科学基金项目、国家“十一五”理论密码基金项目、中国博士后基金项目和国家重点实验室开放课题项目十余项。现主持在研国家自然科学基金面上项目和国家重点实验室开放课题项目。研究成果发表在IEEE Transactions on Information Forensics and Security (TIFS)、IEEE Transactions on Dependable and Secure Computing (TDSC)、IEEE Internet of Things Journal(IOTJ)、Information Sciences(INS)、Journal of Network and Computer Applications(JNCA)、Future Generation Computer Systems(FGCS)、IEEE Transactions on Cloud Computing (TCC)等信息安全领域重要期刊上。

已连续从事高等学校教学工作四十余年。作为主要完成人4次获得国家教学成果二等奖。多轮次主讲过高等代数、近世代数、高等数学、线性代数、概率论与数理统计、复变函数、积分变换、数论与代数结构、解析几何、数学文化等课程及计算数论、密码学、安全多方计算等研究生课程。是国家精品在线开放课程《线性代数》负责人,山东省精品课程《线性代数》负责人,国家精品课程及国家精品资源共享课程《线性代数》负责人。


Education Background
  • 2001-09-01-2004-06-01
    山东大学
    基础数学
  • 1978-09-01-1982-07-01
    解放军洛阳外国语学院
    应用数学
Work Experience
  • 1978-10 — 1982-05
    中国人民解放军洛阳外国语学院二系
  • 2004-12 — 2007-06
    中国科学院
  • 2000-09 — Now
    山东大学
    教授
  • 1994-09 — 2000-08
    原山东工业大学
    副教授
  • 1986-03 — 1994-08
    原山东工业大学
    讲师
Publication
Research direction
Papers

(1)杨海宁. Veri?able Inner Product Computation on Outsourced Database for Authenticated Multi-user Data Sharing .Information Sciences .2020 (539)

(2)王文超. The Analysis of?Schnorr Multi-Signatures and?the?Application to?AI .1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023 .2024 ,14509 LNCS :114-130

(3)魏忠凯. 对公钥可搜索加密中内部关键词猜测攻击的研究 .信息安全学报 .2024 ,9 (04):31-46

(4)张茜. Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security .1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023 .2024 ,14509 LNCS :342-357

(5)张茜. Secure, Dynamic, and Efficient Keyword Search with Flexible Merging for Cloud Storage .IEEE Transactions on Services Computing .2024 :1-14

(6)刘晋璐. Efficient Key-Aggregate Cryptosystem with User Revocation for Selective Group Data Sharing in Cloud Storage .IEEE Transactions on Knowledge and Data Engineering .2024 :1-14

(7)张茜. SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data .COMPUTER JOURNAL .2024

(8)赵博. 无假阳性的可验证通配符可搜索加密 .密码学报-2024 .2022 ,9 (05):899-909

(9)杨海宁. Towards Efficient Verifiable Cloud Storage and Distribution for Large-Scale Data Streaming .IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS .2025 ,36 (3):487-501

(10)魏忠凯. Machine Learning Meets Encrypted Search: The Impact and Efficiency of OMKSA in Data Security .INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS .2025 ,2025 (1)

(11)张茜. 集合成员关系判定的安全多方计算协议 .山东大学学报 理学版 .2020 ,55 (04):118-126

(12)吕娇. 时间可控的指定测试者可搜索代理重加密方案 .山东大学学报 理学版 .2022 (09):1-12

(13)解大伟. Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud .《International Journal of Digital Crime and Forensics》 .2019 ,11 (4):14-27

(14)侯欣怡. 多数据所有者场景下具有访问模式和搜索模式隐私的对称可搜索加密方案 .密码学报-2024 .2023

(15)刘晋璐. Key-aggregate based access control encryption for flexible cloud data sharing .COMPUTER STANDARDS & INTERFACES .2024 ,88

(16)苏烨. Efficient and Flexible Multiauthority Attribute-Based Authentication for IoT Devices .IEEE Internet of Things Journal .2023 ,10 (15):13945

(17)刘晋璐. Verifiable Key-Aggregate Searchable Encryption With a Designated Server in Multi-Owner Setting .IEEE Transactions on Services Computing .2023 :1-14

(18)杨海宁. Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database .IEEE Transaction on Dependable and Secure Computing .2022 ,19 (2):1320-1337

(19)许力冬. Quantum Bit Commitment Without Quantum Memory .COMPUTER JOURNAL .2023

(20)程蕾晓. Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises .COMPUTER STANDARDS & INTERFACES .2024 ,87

(21)苏烨. Efficient and Flexible Multi-Authority Attribute-Based Authentication for IoT Devices .IEEE Internet of Things Journal .2023 ,10 (15):1-1

(22)赵博. 支持通配符和模糊搜索的加密方案 .山东大学学报 理学版 .2023 :1-11

(23)王文超. 一个高效率的双指数多重签名方案 .Jisuanji Xuebao/Chinese Journal of Computers .2023 ,46 (06):1213-1226

(24)刘晋璐. 复杂语义可搜索加密研究 .密码学报-2024 .2022 ,9 (01):1-22

(25)刘晋璐. Key-aggregate searchable encryption supporting conjunctive queries for flexible data sharing in the cloud .Information Sciences .2023 ,645

(26)程蕾晓. Security-enhanced public-key authenticated searchable encryption .Information Sciences .2023 ,647

(27)高嘉昕. 支持属性撤销的可追踪外包属性加密方案 .《计算机研究与发展》 .2019 ,56 (10):2160-2169

(28)郑京竺. 一个盲公开可验证的矩阵乘积外包计算方案 .山东大学学报 理学版 .2019 ,54 (11):1-11

(29)秦静. 引领中职数学学科发展的课程标准研究--《中等职业学校数学课程标准》解读 .中国职业技术教育 .2020 (20):5-8

(30)刘晋璐. On Complex Semantic Searchable Encryptions 复杂语义可搜索加密研究 .密码学报-2024 .2022 ,9 (1):1-22

(31)苏烨. Publicly Verifiable Shared Dynamic Electronic Health Record Databases With Functional Commitment Supporting Privacy-Preserving Integrity Auditing .IEEE TRANSACTIONS ON CLOUD COMPUTING .2022 ,10 (3):2050

(32)汪青. A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree .COMPUTER JOURNAL .2021

(33)杨海宁. Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database .IEEE Transactions on Dependable and Secure Computing .2022 ,19 (2):1320

(34)刘晋璐. Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing .COMPUTER JOURNAL .2021

(35)沈文婷. Data Integrity Auditing without Private Key Storage for Secure Cloud Storage .IEEE TRANSACTIONS ON CLOUD COMPUTING .2021 ,9 (4):1408

(36)张茜. Practical wildcard searchable encryption with tree-based index .INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS .2021 ,36 (12):7475

(37)孙加萌. Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT .IEEE TRANSACTIONS ON CLOUD COMPUTING .2021 ,9 (3):1195

(38)张茜. Practical wildcard searchable encryption with tree-based index .INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS .2021

(39)Huang, Ke. EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud .IEEE Internet of Things Journal .2020 ,7 (2):882

(40)张茜. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security .Security and Communication Networks .2020 ,2020

(41)杨海宁. Verifiable inner product computation on outsourced database for authenticated multi-user data sharing .Information Sciences .2020 ,539 :295

(42)Haining Yang. Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database .IEEE Transactions on Dependable and Secure Computing .2020 ,网络发表

(43)Ye Su. Publicly Verifiable Shared Dynamic Electronic Health Record Databases with Functional Commitment Supporting Privacy-Preserving Integrity Auditing .IEEE Transactions on Cloud Computing .2020 ,网络发表

(44)Haining Yang. Verifiable Inner Product Computation on Outsourced Database for Authenticated Multi-user Data Sharing .Information Sciences .2020 ,539 :295-311

(45)Xi Zhang. A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security .Security and Communication Networks .2020 ,2020 (Article ID 8893016):1-13

(46)Haining Yang. An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model .3rd International Conference on Machine Learning for Cyber Security .2020 ,LNCS 12486 :578-592

(47)Ke Huang. EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud .IEEE Internet Things Journal .2020 ,7 (2):882-892

(48)张茜. 集合成员关系判定的安全多方计算协议 .山东大学学报(理学版) .2020 ,55 (4):118-126

(49)Haining Yang. An improved scheme for outsourced computation with attribute-based encryption .Concurrency and Computation: Practice and Experience .2019 ,31 (21)

(50)Binrui Zhu. A Secure Data Sharing Scheme with Designated Server .Security and Communication Networks .2019 ,2019 :4268731:1-4268731:16

(51)Wenting Shen. Data Integrity Auditing without Private Key Storage for Secure Cloud Storage .IEEE Transactions on Cloud Computing .2019 ,网络发表

(52)Jiameng Sun. Outsourced Decentralized Multi-authority Attribute Based Signature and Its Application in IoT .IEEE Transactions on Cloud Computing .2019 ,网络发表

(53)Wenting Shen. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage .IEEE Transactions on Information Forensics and Security .2019 ,14 (2):331-346

(54)Wenting Shen. A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment .Security and Communication Networks .2019 ,2019 :8275074:1--8275074:15

(55)Wenting Shen. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage .IEEE Transactions on Information Forensics and Security .2019 ,14 (2):331

(56)Binrui Zhu. Fuzzy matching: multi-authority attribute searchable encryption without central authority .Soft Computing .2019 ,23 (2):527-536

(57)Dawei Xie. Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud .IJDCF .2019 ,11 (4):14-27

(58)郑京竺. 一个盲公开可验证的矩阵乘积外包计算方案 .山东大学学报(理学版) .2019 ,11 (54):1-11

(59)高嘉昕. 支持属性撤销的可追踪外包属性加密方案 .计算机研究与发展 .2019 ,56 (10):56(10): 2160-2169

(60)Jiameng Sun. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication .Security and Communication Networks .2018 ,2018 :5275132:1--5275132:15

(61)姚克. 云存储中可验证完整性的可搜索加密协议 .山东大学学报(理学版) .2018 ,54 (01):71-82

(62)杨海宁. 一个基于混淆电路的选择性公开可验证外包计算方案 .密码学报 .2018 ,5 (6):599-611

(63)Binrui Zhu. The Public Verifiability of Public Key Encryption with Keyword Search .MOBILE NETWORKS AND MANAGEMENT (MONAMI 2017) .2018 ,235 :299-312

(64)Jiameng Sun. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication .Security and Communication Networks .2018

(65)焦鸿儒. 可实现全部超星量子存取结构的量子秘密共享方案 .山东大学学报(理学版) .2018 ,53 (09):62-68

(66)刘文. 区块链技术及其在数字加密货币中的应用 .通信技术 .2018 ,51 (003):682-687

(67)Jiameng Sun. Confidentiality-Preserving Publicly Verifiable Computation .International Journal of Foundations of Computer Science .2017 ,28 (06):799-818

(68)韩盼盼. 云计算中可验证的外包数据库加密搜索方案 .山东大学学报(理学版) .2017 ,52 (09):41-53

(69)姚克. 基于生物信息的可验证公钥可搜索加密协议 .山东大学学报(理学版) .2017 ,52 (11):11-22

(70)Jiameng Sun. A Confidentiality Preserving Publicly Verifiable Computation for Multivariate Polynomials .2017 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA) .2017 :5-12

(71)Jiameng Sun. Securely outsourcing decentralized multi-authority attribute based signature .Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017 .2017 ,10581 :86-102

(72)Haibin Zheng. Threshold attribute-based signcryption and its application to authenticated key agreement .Security and Communication Networks .2016 ,9 (18):4914-4923

(73)朱斌瑞. 基于生物特征的可搜索加密 .山东大学学报(理学版) .2016 ,51 (5):81-89

(74)Yue Zhang. A Secure Biometric Authentication Based on PEKS .Concurrency and Computation: Practice and Experience .2016 ,28 (4):1111--1123

(75)Fei Han. Secure searches in the cloud: A survey .Future Generation Computer Systems .2016 ,62 :66-75

(76)Guoyan Zhang. Lattice-based threshold cryptography and its applications in distributed cloud computing .International Journal of High Performance Computing and Networking .2015 ,8 (2):176-185

(77)Guoyan Zhang. Multi-Authority Attribute-Based Encryption Scheme from Lattices .Journal of Universal Computer Science .2015 ,21 (3):483-501

(78)Jing Qin. A new Lagrange solution to the privacy-preserving general geometric intersection problem .Journal of Network and Computer Applications .2014 ,2014 (46):94-99

(79)Fei Han. A Function Private Attribute-Based Encryption .International Journal of Distributed Sensor Networks .2014 ,10

(80)Fei Han. A General Transformation from KP-ABE to Searchable Encryption .Future Generation Computation Systems .2014 ,30 :107-115

(81)Mingqiang Wang. A note on a provable secure encryption scheme .Journal of Shanghai Jiaotong University .2008 ,13 (6):655-658

Student Information
  • 赵博  2024-12-13 Hits:[] Times
  • 苏烨  2018-05-13 Hits:[] Times
  • 张茜  2018-09-27 Hits:[] Times
  • 刘晋璐  2019-09-08 Hits:[] Times
  • 魏忠凯  2021-09-21 Hits:[] Times
  • 刘舒鹏  2021-09-21 Hits:[] Times
  • 聂鹏  2021-09-21 Hits:[] Times
  • 武伟娜  2021-09-21 Hits:[] Times
  • 侯欣怡  2020-09-18 Hits:[] Times
  • 王文超  2020-09-18 Hits:[] Times
  • 赵扬  2018-09-27 Hits:[] Times
  • 高嘉昕  2018-05-14 Hits:[] Times
  • 郑京竺  2018-05-14 Hits:[] Times
  • 解大伟  2018-05-14 Hits:[] Times
  • 唐秀婷  2018-05-14 Hits:[] Times
  • 刘文  2019-06-30 Hits:[] Times
  • 韩斐  2018-09-29 Hits:[] Times
  • 孙加萌  2018-09-29 Hits:[] Times
  • 朱斌瑞  2018-09-27 Hits:[] Times
  • 沈文婷  2018-05-14 Hits:[] Times
  • 杨海宁  2018-05-14 Hits:[] Times
  • 焦鸿儒  2018-05-14 Hits:[] Times
  • 赵博  2019-09-08 Hits:[] Times
  • 吕娇  2019-09-08 Hits:[] Times
  • 孟麟  2019-09-08 Hits:[] Times
  • 汪青  2019-09-08 Hits:[] Times
  • 韩盼盼  2018-05-13 Hits:[] Times
  • 王亚峰  2018-05-13 Hits:[] Times
  • 李瑞  2018-05-13 Hits:[] Times
  • 杨莉  2020-12-26 Hits:[] Times
  • 崔佳奇  2018-05-13 Hits:[] Times
  • 姚克  2018-05-13 Hits:[] Times
  • 颜俊波  2018-05-13 Hits:[] Times
  • 朱斌瑞  2018-05-13 Hits:[] Times
  • 郑海彬  2018-05-13 Hits:[] Times
  • 张悦  2018-05-13 Hits:[] Times
  • 孟琦  2018-05-13 Hits:[] Times
  • 陈小龙  2018-05-13 Hits:[] Times
  • 段红伟  2018-05-13 Hits:[] Times
  • 蔡杰  2018-05-13 Hits:[] Times
  • 吴晓晓  2018-05-13 Hits:[] Times
  • 乔贝  2018-05-13 Hits:[] Times
  • 曹永超  2018-05-13 Hits:[] Times
  • 尹学勇  2018-09-27 Hits:[] Times
  • 李鹏程  2018-09-27 Hits:[] Times
  • 郭栋梁  2018-09-27 Hits:[] Times
  • 黄辉  2018-09-27 Hits:[] Times
  • 雷红  2020-12-26 Hits:[] Times
  • 李丽  2018-09-27 Hits:[] Times
  • Copyright All Rights Reserved Shandong University Address: No. 27 Shanda South Road, Jinan City, Shandong Province, China: 250100
    Information desk: (86) - 0531-88395114
    On Duty Telephone: (86) - 0531-88364731 Construction and Maintenance: Information Work Office of Shandong University