梁蓓
助理研究员团队: 人工智能和机器学习
办公室: A3-4-202
邮箱: lbei@bimsa.cn
研究方向: 隐私保护
个人简介
梁蓓,博士毕业于中科院信息工程研究所信息安全专业,后于瑞典查尔姆斯理工大学做博士后研究,现任北京雁栖湖应用数学研究院助理研究员。主要研究方向是理论密码学,可证明安全。在密码学国际期刊及会议上发表论文20余篇,曾获ISC2019最佳论文奖和ProvSec2015最佳学生论文奖。作为课题负责人参与了国家重点研发计划两项,承担了北京自然科学基金面上项目一项。
教育经历
- 2012 - 2016 中国科学院信息工程研究所 信息安全 博士
- 2007 - 2010 西安理工大学 应用数学 硕士
- 2003 - 2007 西安理工大学 计算数学 学士
工作经历
- 2021 - 北京雁栖湖应用数学研究院 Assistant Professor
- 2018 - 2018 东京工业大学 访问学者 Prof. Tanaka Keisuke
- 2017 - 2017 中国科学院信息工程研究所 访问学者 薛锐
- 2017 - 2017 奥尔胡斯大学 访问学者 Prof. Claudio Orlandi
- 2016 - 2016 苏黎世联邦理工学院 访问学者 Prof. Adrian Perrig
- 2016 - 2020 查尔姆斯理工大学 博士后
荣誉与奖项
- 2019 最佳论文,互联网安全大会
出版物
- [1] Z Li, J Chang, B Liang, K Ling, Y Dong, Y Ji, M Xu, Private-Set-Intersection-Based Medical Data Sharing Scheme with Integrity Auditing for IoMT Cloud Storage Systems, IEEE Transactions on Knowledge and Data Engineering (2025)
- [2] D Wu, B Liang, Z Lu, J Ding, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications, Cryptography (2025)
- [3] H Cai, X Wang, Z Lu, B Liang, Privately Compute the Item with Maximal Weight Sum in Set Intersection, International Conference on Applied Cryptography and Network Security, 195-223 (2025)
- [4] S Meng, X Wang, Z Lu, B Liang, Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol, IEEE 23rd International Conference on Trust, Security and Privacy (2024)
- [5] D Wu, B Liang, Z Lu, J Ding, Efficient secure multi-party computation for multi-dimensional arithmetics and its application in privacy-preserving biometric identification, International Conference on Cryptology and Network Security, 3-25 (2024)
- [6] Shengzhe Meng, Chengrui Dang, Bei Liang* and Jintai Ding, Two-round Post-quantum Private Equality Test and OT from RLWE-encryption, accepted by ICICS 2024 (2024)
- [7] 昝瑶, 李红达, 梁蓓, & 孟宪宁, 受限伪随机函数: 定义的讨论和可验证性构造, accepted by 信息安全学报 (2024)
- [8] Dongyu Wu, Bei Liang, Zijie Lu and Jintai Ding*, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification, accepted by CANS2024 (2024)
- [9] 胡希,向宏,丁津泰,梁蓓,夏鲁宁,向涛, 后量子密码迁移趋势下应用于区块链的公钥密码安全, 密码学报, 10(2), 219-245 (2023)
- [10] Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas and Aikaterini Mitrokotsa., Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning, ACISP 2021, 13083(), 510-528, 2021 (2021)
- [11] Carlo Brunett, Mario Larangeira, Bei Liang and Aikaterini Mitrokotsa, Keisuke Tanaka. , Turn-Based Communication Channels, ProvSec2021, 13059(), 376-392, 2021 (2021)
- [12] Li, S., Liang, B. Mitrokotsa, A. Xue R., Homomorphic signcryption with public plaintext-result checkability, IET Inf. Secur., 15(5), 333-350, 2021(2021)
- [13] Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa, DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, ISC(2021), 296-319
- [14] C Dang, X Zhou, B Liang, Efficient Fuzzy PSI Based on Prefix Representation, Cryptology ePrint Archive (2025)
- [15] X Wang, Z Lu, B Liang, S Meng, Unbalanced PSI from Client-Independent Relaxed Oblivious PRF, Proceedings on Privacy Enhancing Technologies (2025)
- [16] G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa, $DEVA$ : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, International Conference on Information Security, 296-319 (2021)
- [17] S Li, B Liang, A Mitrokotsa, R Xue, Homomorphic signcryption with public plaintext‐result checkability, IET Information Security, 15(5), 333-350 (2021)
- [18] B Liang, G Banegas, A Mitrokotsa, Statically aggregate verifiable random functions and application to e-lottery, Cryptography, 4(4), 37 (2020)
- [19] H Xue, MH Au, R Yang, B Liang, H Jiang, Compact authenticated key exchange in the quantum random oracle model, Cryptology ePrint Archive (2020)
- [20] D Pan, B Liang, H Li, P Ni, Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications, Australasian Conference on Information Security and Privacy, 609-619 (2019)
- [21] D Pan, B Liang, H Li, P Ni, Hierarchical functional signcryption: notion and construction, International Conference on Provable Security, 167-185 (2019)
- [22] B Liang, A Mitrokotsa, Robust Distributed Pseudorandom Functions for mNP Access Structures, International Conference on Information Security, 107-126 (2019)
- [23] D Pan, B Liang, H Li, P Ni, Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications, International Conference on Cryptology in India, 297-317 (2019)
- [24] B Liang, A Mitrokotsa, Decentralised functional signatures, Mobile Networks and Applications, 24(3), 934-946 (2019)
- [25] C Brunetta, B Liang, A Mitrokotsa, Code-based zero knowledge PRF arguments, International Conference on Information Security, 171-189 (2019)
- [26] X Wang, B Wang, B Liang, R Xue, A more compact multi-id identity-based FHE scheme in the standard model and its applications, Science China. Information Sciences, 62(3), 39101 (2019)
- [27] G Tsaloli, B Liang, A Mitrokotsa, Verifiable homomorphic secret sharing, International Conference on Provable Security, 40-55 (2018)
- [28] S Li, B Liang, R Xue, Private functional signatures: definition and construction, Australasian Conference on Information Security and Privacy, 284-303 (2018)
- [29] X Xu, H Xue, K Wang, S Tian, B Liang, W Yu, Strongly Secure Authenticated Key Exchange from Supersingular Isogeny., IACR Cryptol. ePrint Arch., 2018, 760 (2018)
- [30] C Brunetta, B Liang, A Mitrokotsa, Lattice-based simulatable vrfs: Challenges and future directions, Journal of Internet Services and Information Security (JISIS), 8(4), 57-69 (2018)
- [31] X Wang, B Liang, S Li, R Xue, On Constructing Pairing-Free Identity-Based Encryptions, International Conference on Information Security, 308-327 (2018)
- [32] C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa, A differentially private encryption scheme, International Conference on Information Security, 309-326 (2017)
- [33] B Liang, A Mitrokotsa, Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation, Cryptology ePrint Archive (2017)
- [34] B Liang, A Mitrokotsa, Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper), International Conference on Information Security Practice and Experience … (2017)
- [35] B Liang, A Mitrokotsa, Distributed pseudorandom functions for general access structures in NP, International Conference on Information and Communications Security, 81-87 (2017)
- [36] D Zhang, F Fang, B Li, H Xue, B Liang, Compact hierarchical IBE from lattices in the standard model, International Conference on Information and Communications Security, 210-221 (2017)
- [37] B Liang, H Li, J Chang, Verifiable random functions from (leveled) multilinear maps, International Conference on Cryptology and Network Security, 129-143 (2015)
- [38] F Tang, H Li, Q Niu, B Liang, Secure Mobile Agent from Leakage‐Resilient Proxy Signatures, Mobile Information Systems, 2015(1), 901418 (2015)
- [39] B Liang, H Li, J Chang, Constrained verifiable random functions from indistinguishability obfuscation, International Conference on Provable Security, 43-60 (2015)
- [40] Q Niu, H Li, G Huang, B Liang, F Tang, One-round witness indistinguishability from indistinguishability obfuscation, International Conference on Information Security Practice and Experience … (2015)
- [41] B Liang, H Li, J Chang, The generic transformation from standard signatures to identity-based aggregate signatures, International Conference on Information Security, 21-41 (2015)
- [42] B Liang, R Zhang, H Li, Simpler cca-secure public key encryption from lossy trapdoor functions, International Conference on Information Security and Cryptology, 193-206 (2014)
- [43] F Tang, H Li, Q Niu, B Liang, Efficient leakage-resilient signature schemes in the generic bilinear group model, International Conference on Information Security Practice and Experience … (2014)
- [44] F Tang, H Li, B Liang, Attribute-based signatures for circuits from multilinear maps, International Conference on Information Security, 54-71 (2014)
- [45] F Tang, H Li, Q Niu, B Liang, Leakage-resilient proxy signatures, International Conference on Intelligent Networking, 5 (2013)
- [46] H Li, Q Niu, B Liang, Leakage-resilient zero-knowledge proofs of knowledge for NP, International Conference on Network and System Security, 365-380 (2013)
- [47] B Liang, A Mitrokotsa, G Tsaloli, C Dimitrakakis, Homomorphic Signcryption with Public Verification and its Application to Verifiable Differential Privacy
更新时间: 2025-12-04 17:00:08