随着量子计算机技术的迅猛发展,传统公钥密码算法面临巨大安全威胁。后量子密码是抵抗量子计算机攻击的有效加密手段,将会逐渐代替现行的公钥密码算法。实验室着重研究基于格、同源等代数结构的后量子密码,在后量子密码算法/协议的设计、分析、实现等方面开展研究工作。实验室与浙江大学、中国电子科技集团公司第三十研究所、中国船舶重工集团公司第七二二研究所等高校和研究机构有着长期的合作关系,共同设计了多种后量子密码算法/协议并进行了软/硬件实现。实验室承担国家重点研发计划课题、国家自然科学基金面上项目、山东省重点研发计划课题10余项科研项目,在ACM Transactions on Reconfigurable Technology and Systems、 ACM Transactions on Embedded Computing Systems、IEEE Transactions on Dependable and Secure Computing、密码学报等国内外著名期刊/会议上发表学术论文20余篇,申请发表专利10余项。主要工作如下所示:
Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu, On the security of a lattice-based multi-stage secret sharing scheme, IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2022.3209011, 2022.
Quanrun Li, Debiao He, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo, A lattice-based conditional privacy-preserving authentication protocol for the vehicular ad hoc network, IEEE Transactions on Vehicular Technology, vol. 71, no. 4, pp. 4336-4347, 2022.
Zhen Zhou, Debiao He, Zhe Liu, Min Luo, Kim-Kwang Raymond Choo, A software/hardware co-design of Crystals-Dilithium signature scheme, ACM Transactions on Reconfigurable Technology and Systems, vol. 14, no. 2, Article ID: 11, 21 pages, 2021.
Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang, Isoga: An isogeny-based quantum-resist searchable encryption scheme against keyword guessing attacks, IEEE Systems Journal, DOI: 10.1109/JSYST.2022.3182788, 2022.
Quanrun Li, Min Luo, Chingfang Hsu, Lianhai Wang, Debiao He, A quantum secure and non-interactive identity-based aggregate signature from lattices, IEEE Systems Journal, DOI: 10.1109/JSYST.2021.3112555, 2021.
Cong Peng , Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He, CsiIBS: A post-quantum identity-based signature scheme based on isogenies, Journal of Information Security and Applications, vol. 54, Article ID: 102504, 13 pages, 2020.
Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang, Ideal lattice-based anonymous authentication protocol for mobile devices, IEEE Systems Journal, vol. 13, no. 3, pp. 2775-2785, 2019.
Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He, Isogeny-based cryptography: a promising post-quantum technique, IEEE IT Professional, vol. 21, no. 6, pp. 27-32, 2019.
Debiao He, Jianhua Chen, Jin Hu. An authentication key agreement protocol using isogenies between elliptic curves, International Journal of Computers Communications & Control, 6(2): 251-258, 2011.
贾小英,何德彪,许芷岩,刘芹,格上高效的基于身份的环签名体制,密码学报,vol. 4, no. 4, pp. 392-404, 2017.