代数与密码学研究所

作者:研究生工作办公室 时间:2018-01-12 点击数:

一、研究所简介

代数与密码学研究所是在代数学科研团队与密码学科研团队的基础上整合而成。主要研究有限群结构、代数表示理论、非经典逻辑代数以及密码协议。针对共轭类长对有限群结构的影响、基于量子逻辑门的操作产生的量子计算逻辑及其代数结构、基于多因子的远程身份认证协议及其安全性理论进行研究,取得一系列科研成果。

研究所现有成员9人,其中教授3人,副教授3人,博士7人。目前在《Journal of Algebra》,《Computers & Electrical Engineering》,《Soft Computing》以及《中国科学:数学(英文版)》等期刊发表SCI/EI收录论文96篇。主持国家自然科学基金6项,山东省自然科学基金4项,山东省优秀中青年科学家奖励基金1项。获山东省高校优秀科研成果奖二等奖1项,三等奖3项,山东省高等学校科学技术奖三等奖1项。

二、研究所负责人简介

温凤桐,男,1970年出生,博士、教授、硕士生导师,获济南大学优秀教师、济南大学优秀班主任等荣誉称号。1994年毕业于曲阜师范大学,获理学学土学位;1997年毕业于曲阜师范大学数学系,获理学硕士学位;2006年毕业于北京邮电大学,获军事学博士学位。2009-2011在山东大学计算机科学技术博士后流动站学习;2012.7-2012.12到澳大利亚Wollongong大学计算机科学与软件工程学院访学,中国密码学会会员,山东省计算机学会网络空间安全专委会委员。

主要从事对称密码、密码协议理论方面的研究,主持山东省自然科学基金三项,获山东省高等学校优秀科研成果奖三等奖两项,在《Computers and Electrical Engineering》,《Wireless Personal Communications》,《Security and Communication Networks》,《Multimedia Tools and Applications》,《Soft Computing》,《通信学报》等国内外期刊发表高水平学术论文40余篇,SCI论文引用超过210次。

三、主要研究成员

姓名

学位

专业技术职务

研究方向

张苏梅

学士

教授

代数图论

黄治琴

硕士

教授

概率论与数理统计

陈文娟

博士

教授

非经典逻辑代数,模糊代数

  刘红军

博士

副教授

混沌密码学和后量子密码学
  邵长国

博士

副教授

有限群及表示

吕洪波

博士

副教授

表示论

蒋琴会

博士

副教授

有限群论研究

王秀云

博士

副教授

代数图论

徐承波

博士

讲师

密码协议


四、研究方向介绍

1.有限群及代数表示论

2.非经典逻辑代数,模糊代数

3.密码协议

4.分组密码

5.代数图论

五、承担科研项目与获奖

项目、获奖名称

类别

获得时间

承担人

经费、等级

共轭类长的数量性质与群结构的研究

国家自然科学基金

201401-201612

蒋琴会

23

遗传代数的高维推广和高维丛倾斜

国家自然科学基金

201401-201612

吕洪波

22

基于量子逻辑门的代数系统的结构研究

国家自然科学基金

201601-201812

陈文娟

18

半弧传递图与半边传递图的研究

国家自然科学基金

2013.01-2015.12

王秀云

22

直觉模糊子双代数集合的代数结构研究

国家自然科学基金

201201-201212

陈文娟

3

复代数的倾斜理论及其在丛倾斜理论中的应用

国家自然科学基金

201201-201212

吕洪波

3

多因子远程认证协议的设计与分析

山东省自然科学基金

201310-201610

温凤桐

8

重复代数的同调性质和高维丛范畴

山东省自然科学基金

201112-201412

吕洪波

3

部分元素的共轭类长对有限群及其正规子群结构的影响

山东省自然科学基金

201407-201707

邵长国

13

Atanassov直觉模糊集的对偶及其应用

山东省优秀中青年科学家奖励基金

201107-201407

陈文娟

5

图的对称性

山东省自然科学基金

2012.7-2015.7

王秀云

4

多因子远程认证协议的研究

山东省高等学校科学技术奖

2016

温凤桐

三等

部分元素的共轭类长的数量性质对群结构的影响

山东高等学校优秀科研成果奖

2015

邵长国

三等

直觉模糊子双代数集合的结构研究

山东高等学校优秀科研成果奖

2013

陈文娟

三等

信息传输中的若干安全问题研究

山东高等学校优秀科研成果奖

2011

温凤桐

三等

图的距离标号及边覆盖染色的系列研究

山东高等学校优秀科研成果奖

2008

张苏梅

二等

六、代表性科研论文

1. Antonio Beltran, Changguo shao, On the number of invariant Sylow subgroups under coprime action, Journal of algebra, 2017, doi:dx.doi.org/10.1016/j.jalgebra.2017.07.005

2. Cahngguo Shao and Qinhui Jiang, On normal subgroups with consecutive G-class size,Journal of Algebra and Its Applications, 2016, 15(8), page 8.

3. Changguo Shao, A.Beltran,Coprime action and arithmetical conditions on invariant conjugacy classes, SCIENCE CHINA Mathematics,2015, 58(12): 2499-2504.

4. A.Beltrán,M.J.Felipe andChangguo Shao, Class sizes of prime-power order p’-elements and normal subgroups, Annali di Matematica, (4) 194 (2015), no. 5, 1527–1533.

5. Changguo Shao and Qinhui Jiang(*), An extension of a theorem of Alan Camina's on conjugacy class sizes, Israel Journal of Mathematics, 2014,204(1):145-153.

6. Changguo Shao and Qinhui Jiang(*), On conjugacy class sizes of primary and biprimary elements of a finite group, Sci. China Math., 57(3), pp 491-498,2014.

7. Changguo Shao and Q. H Jiang(*), A new characterization of some linear groups by nse, J. Algebra Appl. 13(2), 1350094, 2014.

8. Changguo Shao and Q.H. Jiang(*), A new characterization of PSL2(p) by NSE, J. Algebra Appl. 13(4), 1350123, 2014.

9. Changguo Shao and Qinhui Jiang(*), Finite groups with two conjugacy class sizes of π-elements of primary and biprimary orders, Monatsh. Math., 169(1), pp 105-112, 2013.

10. Qinhui Jiang and Changguo Shao*, Recognition of L2(q) by its group order and largest irreducible character degree, Monatsh Math, 2015,176:413-422.

11. Qinhui Jiang andChangguo Shao*, Solvability of finite groups with four class sizes of certain elements, Bulletin of the Australian Mathematical Society,2014,90: 250-256.

12. Wenjuan Chen*,Yanyong Guan, The dual of generalized fuzzy subspaces , Journal of Applied Mathematics, 9pages, 2012

13. Wenjuan Chen*,Yanyong Guan, The set of fuzzy points of coalgebras, Utilitas Mathematica, 89: 367-371, 2012.

14. Hongbo Lv, Global dimensions of endomorphism algebras of generator-cogenerators over m-replicated algebras, Communications in Algebra, 39(2): 560-571, 2011.

15. Hongbo Lv, Tilting mutation for m-replicated algebras, Journal of Algebra and Its Applications, 10(4), 6 pages,2011.

16.Fengtong Wen, xuelei Li. An improved dynamic ID-based remote user authentication with key agreement scheme. Computers and Electrical Engineering.38(2): 381-387 , 2011. (SCI,IF=0.928)

17.Fengtong Wen, Willy Susilo and Guomin Yang. A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks. Wireless Personal Communications,73( 3): 993-1004, 2013 (SCI,IF=0.428)

18.Fengtong Wen, Willy Susilo and Guomin Yang. A Robust Smart Card Based Anonymous User Authentication Protocol for Wireless Communications. Security and Communication Networks,7:987-993, 2014 .(SCI,IF=0.311)

19.Fengtong Wen.A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems, 37(6):9980,2013. (SCI,IF=1.783)

20.Fengtong Wen, Dianli Guo, xuelei Li.Cryptanalysis of”a new dynamic ID-based user

authentication scheme to resist smart-card-theft attack. Applied mathematics and information sciences. 8(4):1855-1858,2014.(SCI)

21.Fengtong Wen. A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System,Journal of Medical Systems, 38(5):42,2014. (SCI,IF=1.783)

22.Fengtong Wen, Dianli Guo. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems,Journal of Medical Systems, 38(5):26,2014. (SCI.IF=1.783)

23.Dianli Guo,FengtongWen. Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture,Wireless Personal Communications,DOI 10.1007/s11277-014-1762-7,2014.(SCI,IF=0.428)

24.Fengtong Wen,Wenling Wu,Qiaoyan Wen. Error Oracle Attacks on Several Modes of Operation. LNAI, 3802, 2005. (SCI)

25.Xu elei Li,Fengtong Wen. A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices. Applied mathematics and information sciences. 2012.6 (2). (SCI,IF=0.731)

26.Fengtong Wen, xuelei Li. Cross-realm client-to-client password-based authenticated key agreement protocol for mobile devices on elliptic curve cryptosystem, Journal of Convergence Information Technology. 2011.6(5).23 ~ 31. (EI)

27.Fengtong Wen, Shenjun Cui. An ID-based Proxy Signature Scheme Secure Against Proxy Key Exposure.International Journal of Advancements in Computing Technology.3(5).2011.108~116. (EI)

28 Fengtong Wen, Shenjun Cui. A New Proxy Signature Scheme with Efficient Multiple Delegations to the Same Proxy Signer. Journal of Computational Information Systems.2011.7(10).3623-3629. (EI)

29.Fengtong Wen, Xuelei Li.An Improved DoS-resistant ID-based Password Authentication Scheme without Using Smart Card, Journal of electronics (china), 28(4-6), 2011.

30.温凤桐.基于MISTY结构的可调分组密码的设计与分析.通信学报,31(7), 76-80, 2010. (EI)

31. Fengtong Wen. On Super-Psudorandomness of MISTY-Type Tweakable Block ciphers. Proceedings of ICCSN 2010(EI)

32.Fengtong Wen,Willy Susilo,Guomin Yang,Analysis and Improvement on a Biometric-Based Remote User Authentication Scheme Using Smart Cards,Wireless Personal Communications,80(4):1747-1760(SCI).

33 Wenjuan Chen*, Bijan Davvaz, Some classes of quasi-pseudo-MV algebras, Logic Jnl IGPL, 24(5), 655-672 (2016).(SCI)

34 Wenjuan Chen*, Wieslaw A. Dudek,Quantum computational algebra with a non-commutative generalization, Mathematica Slovaca, 66(1), 19-34 (2016).(SCI)

35 Wenjuan Chen*, Wieslaw A. Dudek,The representation of square root quasi-pseudo-MV algebras, Soft Computing, 19(2), 269-282 (2015). (SCI)

36 Wenjuan Chen*, Bijan Davvaz, Intuitionistic fuzzy subbialgebras and duality, Journal of Applied Mathematics, no.523245, 7 pages (2014).(SCI)

37 Muhammad Akram,Wenjuan Chen, Bijan Davvaz,On N-hypergraphs, Journal of Intelligent & Fuzzy Systems, 26(6), 2937-2944 (2014).(SCI)

38 Wenjuan Chen*, Wenxu Ge, Fuzzy subbialgebras and duality, Utilitas Mathematica, 87, 13-20 (2012).(SCI)

39 Muhammad Akram, Wenjuan Chen*, Generalized anti fuzzy Lie algebras, Utilitas Mathematica, 87, 111-122 (2012).(SCI)

40 Wenjuan Chen*, Muhammad Akram, Yanyong Guan, Intuitionistic fuzzy subcoalgebras of coalgebras, Ars Combinatoria, 106, 423-434 (2012).(SCI)

41 Wenjuan Chen*, Intuitionistic fuzzy quotient Lie superalgebras, International Journal of Fuzzy Systems, 12(4), 330-339 (2010).(SCI)

42Wenjuan Chen*, Fuzzy subcoalgebras and duality,Bulletin of the Malaysian Mathematical Sciences Society, 32(3), 283-294 (2009). (SCI)

43Wenjuan Chen*, Shunhua Zhang, Intuitionistic fuzzy Lie sub-superalgebras and intuitionistic fuzzy ideals,Computers & Mathematics with Applications, 58(8), 1645-1661 (2009). (SCI)

44.Xiuyun Wang, Yanquan Feng.Tetravalent half-edge-transitive graphs and non-normal Cayley graphs, Journal of Graph Theory, 2012, 70(2): 197-213.

45.Xiuyun Wang,Yanquan Feng,Jinxin Zhou,Jihui Wang,Qiaoling Ma.Tetravalent half-arc-transitive graphs of order a product of three primes.Discrete Mathematics, 2016, 339(5): 1566-1573.

46.Chengbo Xu*, Zhongtian Jia, Yan Ma, A Secure and Efficient Dynamic Identity Based Authentication Scheme for Multi-Server Environment Using Smart Cards, International Journal of Future Generation Communication and Networking, 6(3), 25-40, 2013 (EI)

47.Chengbo Xu*, Zhongtian Jia, Yan Ma, A Novel Dynamic Identity Based Authentication Scheme for Multi-Server Environment Using Smart Cards, International Journal of Security and Its Applications, 7(4), 105-118, 2013 (EI)

48 Chengbo Xu*, Zhongtian Jia, Yan Ma, Cryptanalysis and Improvement of A Dynamic ID Based Remote UserAuthentication Scheme Using Smart Cards, Journal of Computational Information Systems, 9(14), 5513-5520, 2013 (EI)

Copyright 济南大学数学科学学院. All rights reserved.

地址:济南市市中区南辛庄西路336号济南大学西校区第七教学楼   邮编:250022   电话(传真):0531-82767313