Beijing Institute of Mathematical Sciences and Applications Beijing Institute of Mathematical Sciences and Applications

  • About
    • President
    • Governance
    • Partner Institutions
    • Visit
  • People
    • Management
    • Faculty
    • Postdocs
    • Visiting Scholars
    • Administration
    • Academic Support
  • Research
    • Research Groups
    • Courses
    • Seminars
  • Join Us
    • Faculty
    • Postdocs
    • Students
  • Events
    • Conferences
    • Workshops
    • Forum
  • Life @ BIMSA
    • Accommodation
    • Transportation
    • Facilities
    • Tour
  • News
    • News
    • Announcement
    • Downloads
About
President
Governance
Partner Institutions
Visit
People
Management
Faculty
Postdocs
Visiting Scholars
Administration
Academic Support
Research
Research Groups
Courses
Seminars
Join Us
Faculty
Postdocs
Students
Events
Conferences
Workshops
Forum
Life @ BIMSA
Accommodation
Transportation
Facilities
Tour
News
News
Announcement
Downloads
Qiuzhen College, Tsinghua University
Yau Mathematical Sciences Center, Tsinghua University (YMSC)
Tsinghua Sanya International  Mathematics Forum (TSIMF)
Shanghai Institute for Mathematics and  Interdisciplinary Sciences (SIMIS)
BIMSA > Bei Liang

Bei Liang

     Assistant Professor    
Assistant Professor Bei Liang

Group: Artificial Intelligence and Machine Learning

Office: A3-4-202

Email: lbei@bimsa.cn

Research Field: Privacy Protection

CV

Biography


Dr. Bei Liang received Ph.D. in information security from the Institute of Information Engineering, Chinese Academy of Sciences. She was a postdoc researcher at Chalmers University of Technology, Sweden. Currently, she is an assistant researcher at the BIMSA. Her main research interest is theoretical cryptography. She has published more than 20 papers in international journals or conferences, and won the ISC2019 Best Paper Award and the ProvSec2015 Best Student Paper Award. She participated in two National Key Research and Development Programs and undertook one Beijing Natural Science Foundation.

Education Experience


  • 2012 - 2016      Institute of Information Engineering, CAS      Information Security      Doctor
  • 2007 - 2010      Xi'an University of Technology      Applied Math      Master
  • 2003 - 2007      Xi'an University of Technology      Computational Math      Bachelor

Work Experience


  • 2021 -      BIMSA      Assistant Professor
  • 2018 - 2018      Tokyo Institute of Technology      Visiting Scholar      Prof. Tanaka Keisuke
  • 2017 - 2017      Institute of Information Engineering,CAS      Visiting Scholar      Prof. Rui Xue
  • 2017 - 2017      Aarhus University      Visiting Scholar      Prof. Claudio Orlandi
  • 2016 - 2016      ETH Zurich      Visiting Scholar      Prof. Adrian Perrig
  • 2016 - 2020      Chalmers University of Technology      Postdoc

Honors and Awards


  • 2019      Best Paper, Internet Security Conference

Publication


  • [1] Z Li, J Chang, B Liang, K Ling, Y Dong, Y Ji, M Xu, Private-Set-Intersection-Based Medical Data Sharing Scheme with Integrity Auditing for IoMT Cloud Storage Systems, IEEE Transactions on Knowledge and Data Engineering (2025)
  • [2] D Wu, B Liang, Z Lu, J Ding, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications, Cryptography (2025)
  • [3] H Cai, X Wang, Z Lu, B Liang, Privately Compute the Item with Maximal Weight Sum in Set Intersection, International Conference on Applied Cryptography and Network Security, 195-223 (2025)
  • [4] S Meng, X Wang, Z Lu, B Liang, Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol, IEEE 23rd International Conference on Trust, Security and Privacy (2024)
  • [5] D Wu, B Liang, Z Lu, J Ding, Efficient secure multi-party computation for multi-dimensional arithmetics and its application in privacy-preserving biometric identification, International Conference on Cryptology and Network Security, 3-25 (2024)
  • [6] Shengzhe Meng, Chengrui Dang, Bei Liang* and Jintai Ding, Two-round Post-quantum Private Equality Test and OT from RLWE-encryption, accepted by ICICS 2024 (2024)
  • [7] 昝瑶, 李红达, 梁蓓, & 孟宪宁, 受限伪随机函数: 定义的讨论和可验证性构造, accepted by 信息安全学报 (2024)
  • [8] Dongyu Wu, Bei Liang, Zijie Lu and Jintai Ding*, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification, accepted by CANS2024 (2024)
  • [9] 胡希,向宏,丁津泰,梁蓓,夏鲁宁,向涛, 后量子密码迁移趋势下应用于区块链的公钥密码安全, 密码学报, 10(2), 219-245 (2023)
  • [10] Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas and Aikaterini Mitrokotsa., Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning, ACISP 2021, 13083(), 510-528, 2021 (2021)
  • [11] Carlo Brunett, Mario Larangeira, Bei Liang and Aikaterini Mitrokotsa, Keisuke Tanaka. , Turn-Based Communication Channels, ProvSec2021, 13059(), 376-392, 2021 (2021)
  • [12] Li, S., Liang, B. Mitrokotsa, A. Xue R., Homomorphic signcryption with public plaintext-result checkability, IET Inf. Secur., 15(5), 333-350, 2021(2021)
  • [13] Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa, DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, ISC(2021), 296-319
  • [14] C Dang, X Zhou, B Liang, Efficient Fuzzy PSI Based on Prefix Representation, Cryptology ePrint Archive (2025)
  • [15] X Wang, Z Lu, B Liang, S Meng, Unbalanced PSI from Client-Independent Relaxed Oblivious PRF, Proceedings on Privacy Enhancing Technologies (2025)
  • [16] G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa, $DEVA$ : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, International Conference on Information Security, 296-319 (2021)
  • [17] S Li, B Liang, A Mitrokotsa, R Xue, Homomorphic signcryption with public plaintext‐result checkability, IET Information Security, 15(5), 333-350 (2021)
  • [18] B Liang, G Banegas, A Mitrokotsa, Statically aggregate verifiable random functions and application to e-lottery, Cryptography, 4(4), 37 (2020)
  • [19] H Xue, MH Au, R Yang, B Liang, H Jiang, Compact authenticated key exchange in the quantum random oracle model, Cryptology ePrint Archive (2020)
  • [20] D Pan, B Liang, H Li, P Ni, Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications, Australasian Conference on Information Security and Privacy, 609-619 (2019)
  • [21] D Pan, B Liang, H Li, P Ni, Hierarchical functional signcryption: notion and construction, International Conference on Provable Security, 167-185 (2019)
  • [22] B Liang, A Mitrokotsa, Robust Distributed Pseudorandom Functions for mNP Access Structures, International Conference on Information Security, 107-126 (2019)
  • [23] D Pan, B Liang, H Li, P Ni, Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications, International Conference on Cryptology in India, 297-317 (2019)
  • [24] B Liang, A Mitrokotsa, Decentralised functional signatures, Mobile Networks and Applications, 24(3), 934-946 (2019)
  • [25] C Brunetta, B Liang, A Mitrokotsa, Code-based zero knowledge PRF arguments, International Conference on Information Security, 171-189 (2019)
  • [26] X Wang, B Wang, B Liang, R Xue, A more compact multi-id identity-based FHE scheme in the standard model and its applications, Science China. Information Sciences, 62(3), 39101 (2019)
  • [27] G Tsaloli, B Liang, A Mitrokotsa, Verifiable homomorphic secret sharing, International Conference on Provable Security, 40-55 (2018)
  • [28] S Li, B Liang, R Xue, Private functional signatures: definition and construction, Australasian Conference on Information Security and Privacy, 284-303 (2018)
  • [29] X Xu, H Xue, K Wang, S Tian, B Liang, W Yu, Strongly Secure Authenticated Key Exchange from Supersingular Isogeny., IACR Cryptol. ePrint Arch., 2018, 760 (2018)
  • [30] C Brunetta, B Liang, A Mitrokotsa, Lattice-based simulatable vrfs: Challenges and future directions, Journal of Internet Services and Information Security (JISIS), 8(4), 57-69 (2018)
  • [31] X Wang, B Liang, S Li, R Xue, On Constructing Pairing-Free Identity-Based Encryptions, International Conference on Information Security, 308-327 (2018)
  • [32] C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa, A differentially private encryption scheme, International Conference on Information Security, 309-326 (2017)
  • [33] B Liang, A Mitrokotsa, Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation, Cryptology ePrint Archive (2017)
  • [34] B Liang, A Mitrokotsa, Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper), International Conference on Information Security Practice and Experience … (2017)
  • [35] B Liang, A Mitrokotsa, Distributed pseudorandom functions for general access structures in NP, International Conference on Information and Communications Security, 81-87 (2017)
  • [36] D Zhang, F Fang, B Li, H Xue, B Liang, Compact hierarchical IBE from lattices in the standard model, International Conference on Information and Communications Security, 210-221 (2017)
  • [37] B Liang, H Li, J Chang, Verifiable random functions from (leveled) multilinear maps, International Conference on Cryptology and Network Security, 129-143 (2015)
  • [38] F Tang, H Li, Q Niu, B Liang, Secure Mobile Agent from Leakage‐Resilient Proxy Signatures, Mobile Information Systems, 2015(1), 901418 (2015)
  • [39] B Liang, H Li, J Chang, Constrained verifiable random functions from indistinguishability obfuscation, International Conference on Provable Security, 43-60 (2015)
  • [40] Q Niu, H Li, G Huang, B Liang, F Tang, One-round witness indistinguishability from indistinguishability obfuscation, International Conference on Information Security Practice and Experience … (2015)
  • [41] B Liang, H Li, J Chang, The generic transformation from standard signatures to identity-based aggregate signatures, International Conference on Information Security, 21-41 (2015)
  • [42] B Liang, R Zhang, H Li, Simpler cca-secure public key encryption from lossy trapdoor functions, International Conference on Information Security and Cryptology, 193-206 (2014)
  • [43] F Tang, H Li, Q Niu, B Liang, Efficient leakage-resilient signature schemes in the generic bilinear group model, International Conference on Information Security Practice and Experience … (2014)
  • [44] F Tang, H Li, B Liang, Attribute-based signatures for circuits from multilinear maps, International Conference on Information Security, 54-71 (2014)
  • [45] F Tang, H Li, Q Niu, B Liang, Leakage-resilient proxy signatures, International Conference on Intelligent Networking, 5 (2013)
  • [46] H Li, Q Niu, B Liang, Leakage-resilient zero-knowledge proofs of knowledge for NP, International Conference on Network and System Security, 365-380 (2013)
  • [47] B Liang, A Mitrokotsa, G Tsaloli, C Dimitrakakis, Homomorphic Signcryption with Public Verification and its Application to Verifiable Differential Privacy

 

Update Time: 2025-11-26 09:00:07


Beijing Institute of Mathematical Sciences and Applications
CONTACT

No. 544, Hefangkou Village Huaibei Town, Huairou District Beijing 101408

北京市怀柔区 河防口村544号
北京雁栖湖应用数学研究院 101408

Tel. 010-60661855 Tel. 010-60661855
Email. administration@bimsa.cn

Copyright © Beijing Institute of Mathematical Sciences and Applications

京ICP备2022029550号-1

京公网安备11011602001060 京公网安备11011602001060