Bei Liang
Assistant ProfessorGroup: Artificial Intelligence and Machine Learning
Office: A3-4-202
Email: lbei@bimsa.cn
Research Field: Privacy Protection
Biography
Dr. Bei Liang received Ph.D. in information security from the Institute of Information Engineering, Chinese Academy of Sciences. She was a postdoc researcher at Chalmers University of Technology, Sweden. Currently, she is an assistant researcher at the BIMSA. Her main research interest is theoretical cryptography. She has published more than 20 papers in international journals or conferences, and won the ISC2019 Best Paper Award and the ProvSec2015 Best Student Paper Award. She participated in two National Key Research and Development Programs and undertook one Beijing Natural Science Foundation.
Education Experience
- 2012 - 2016 Institute of Information Engineering, CAS Information Security Doctor
- 2007 - 2010 Xi'an University of Technology Applied Math Master
- 2003 - 2007 Xi'an University of Technology Computational Math Bachelor
Work Experience
- 2021 - BIMSA Assistant Professor
- 2018 - 2018 Tokyo Institute of Technology Visiting Scholar Prof. Tanaka Keisuke
- 2017 - 2017 Institute of Information Engineering,CAS Visiting Scholar Prof. Rui Xue
- 2017 - 2017 Aarhus University Visiting Scholar Prof. Claudio Orlandi
- 2016 - 2016 ETH Zurich Visiting Scholar Prof. Adrian Perrig
- 2016 - 2020 Chalmers University of Technology Postdoc
Honors and Awards
- 2019 Best Paper, Internet Security Conference
Publication
- [1] Z Li, J Chang, B Liang, K Ling, Y Dong, Y Ji, M Xu, Private-Set-Intersection-Based Medical Data Sharing Scheme with Integrity Auditing for IoMT Cloud Storage Systems, IEEE Transactions on Knowledge and Data Engineering (2025)
- [2] D Wu, B Liang, Z Lu, J Ding, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications, Cryptography (2025)
- [3] H Cai, X Wang, Z Lu, B Liang, Privately Compute the Item with Maximal Weight Sum in Set Intersection, International Conference on Applied Cryptography and Network Security, 195-223 (2025)
- [4] S Meng, X Wang, Z Lu, B Liang, Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol, IEEE 23rd International Conference on Trust, Security and Privacy (2024)
- [5] D Wu, B Liang, Z Lu, J Ding, Efficient secure multi-party computation for multi-dimensional arithmetics and its application in privacy-preserving biometric identification, International Conference on Cryptology and Network Security, 3-25 (2024)
- [6] Shengzhe Meng, Chengrui Dang, Bei Liang* and Jintai Ding, Two-round Post-quantum Private Equality Test and OT from RLWE-encryption, accepted by ICICS 2024 (2024)
- [7] 昝瑶, 李红达, 梁蓓, & 孟宪宁, 受限伪随机函数: 定义的讨论和可验证性构造, accepted by 信息安全学报 (2024)
- [8] Dongyu Wu, Bei Liang, Zijie Lu and Jintai Ding*, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification, accepted by CANS2024 (2024)
- [9] 胡希,向宏,丁津泰,梁蓓,夏鲁宁,向涛, 后量子密码迁移趋势下应用于区块链的公钥密码安全, 密码学报, 10(2), 219-245 (2023)
- [10] Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas and Aikaterini Mitrokotsa., Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning, ACISP 2021, 13083(), 510-528, 2021 (2021)
- [11] Carlo Brunett, Mario Larangeira, Bei Liang and Aikaterini Mitrokotsa, Keisuke Tanaka. , Turn-Based Communication Channels, ProvSec2021, 13059(), 376-392, 2021 (2021)
- [12] Li, S., Liang, B. Mitrokotsa, A. Xue R., Homomorphic signcryption with public plaintext-result checkability, IET Inf. Secur., 15(5), 333-350, 2021(2021)
- [13] Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa, DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, ISC(2021), 296-319
- [14] C Dang, X Zhou, B Liang, Efficient Fuzzy PSI Based on Prefix Representation, Cryptology ePrint Archive (2025)
- [15] X Wang, Z Lu, B Liang, S Meng, Unbalanced PSI from Client-Independent Relaxed Oblivious PRF, Proceedings on Privacy Enhancing Technologies (2025)
- [16] G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa, $DEVA$ : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, International Conference on Information Security, 296-319 (2021)
- [17] S Li, B Liang, A Mitrokotsa, R Xue, Homomorphic signcryption with public plaintext‐result checkability, IET Information Security, 15(5), 333-350 (2021)
- [18] B Liang, G Banegas, A Mitrokotsa, Statically aggregate verifiable random functions and application to e-lottery, Cryptography, 4(4), 37 (2020)
- [19] H Xue, MH Au, R Yang, B Liang, H Jiang, Compact authenticated key exchange in the quantum random oracle model, Cryptology ePrint Archive (2020)
- [20] D Pan, B Liang, H Li, P Ni, Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications, Australasian Conference on Information Security and Privacy, 609-619 (2019)
- [21] D Pan, B Liang, H Li, P Ni, Hierarchical functional signcryption: notion and construction, International Conference on Provable Security, 167-185 (2019)
- [22] B Liang, A Mitrokotsa, Robust Distributed Pseudorandom Functions for mNP Access Structures, International Conference on Information Security, 107-126 (2019)
- [23] D Pan, B Liang, H Li, P Ni, Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications, International Conference on Cryptology in India, 297-317 (2019)
- [24] B Liang, A Mitrokotsa, Decentralised functional signatures, Mobile Networks and Applications, 24(3), 934-946 (2019)
- [25] C Brunetta, B Liang, A Mitrokotsa, Code-based zero knowledge PRF arguments, International Conference on Information Security, 171-189 (2019)
- [26] X Wang, B Wang, B Liang, R Xue, A more compact multi-id identity-based FHE scheme in the standard model and its applications, Science China. Information Sciences, 62(3), 39101 (2019)
- [27] G Tsaloli, B Liang, A Mitrokotsa, Verifiable homomorphic secret sharing, International Conference on Provable Security, 40-55 (2018)
- [28] S Li, B Liang, R Xue, Private functional signatures: definition and construction, Australasian Conference on Information Security and Privacy, 284-303 (2018)
- [29] X Xu, H Xue, K Wang, S Tian, B Liang, W Yu, Strongly Secure Authenticated Key Exchange from Supersingular Isogeny., IACR Cryptol. ePrint Arch., 2018, 760 (2018)
- [30] C Brunetta, B Liang, A Mitrokotsa, Lattice-based simulatable vrfs: Challenges and future directions, Journal of Internet Services and Information Security (JISIS), 8(4), 57-69 (2018)
- [31] X Wang, B Liang, S Li, R Xue, On Constructing Pairing-Free Identity-Based Encryptions, International Conference on Information Security, 308-327 (2018)
- [32] C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa, A differentially private encryption scheme, International Conference on Information Security, 309-326 (2017)
- [33] B Liang, A Mitrokotsa, Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation, Cryptology ePrint Archive (2017)
- [34] B Liang, A Mitrokotsa, Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper), International Conference on Information Security Practice and Experience … (2017)
- [35] B Liang, A Mitrokotsa, Distributed pseudorandom functions for general access structures in NP, International Conference on Information and Communications Security, 81-87 (2017)
- [36] D Zhang, F Fang, B Li, H Xue, B Liang, Compact hierarchical IBE from lattices in the standard model, International Conference on Information and Communications Security, 210-221 (2017)
- [37] B Liang, H Li, J Chang, Verifiable random functions from (leveled) multilinear maps, International Conference on Cryptology and Network Security, 129-143 (2015)
- [38] F Tang, H Li, Q Niu, B Liang, Secure Mobile Agent from Leakage‐Resilient Proxy Signatures, Mobile Information Systems, 2015(1), 901418 (2015)
- [39] B Liang, H Li, J Chang, Constrained verifiable random functions from indistinguishability obfuscation, International Conference on Provable Security, 43-60 (2015)
- [40] Q Niu, H Li, G Huang, B Liang, F Tang, One-round witness indistinguishability from indistinguishability obfuscation, International Conference on Information Security Practice and Experience … (2015)
- [41] B Liang, H Li, J Chang, The generic transformation from standard signatures to identity-based aggregate signatures, International Conference on Information Security, 21-41 (2015)
- [42] B Liang, R Zhang, H Li, Simpler cca-secure public key encryption from lossy trapdoor functions, International Conference on Information Security and Cryptology, 193-206 (2014)
- [43] F Tang, H Li, Q Niu, B Liang, Efficient leakage-resilient signature schemes in the generic bilinear group model, International Conference on Information Security Practice and Experience … (2014)
- [44] F Tang, H Li, B Liang, Attribute-based signatures for circuits from multilinear maps, International Conference on Information Security, 54-71 (2014)
- [45] F Tang, H Li, Q Niu, B Liang, Leakage-resilient proxy signatures, International Conference on Intelligent Networking, 5 (2013)
- [46] H Li, Q Niu, B Liang, Leakage-resilient zero-knowledge proofs of knowledge for NP, International Conference on Network and System Security, 365-380 (2013)
- [47] B Liang, A Mitrokotsa, G Tsaloli, C Dimitrakakis, Homomorphic Signcryption with Public Verification and its Application to Verifiable Differential Privacy
Update Time: 2025-11-26 09:00:07