北京雁栖湖应用数学研究院 北京雁栖湖应用数学研究院

  • 关于我们
    • 院长致辞
    • 理事会
    • 协作机构
    • 参观来访
  • 人员
    • 管理层
    • 科研人员
    • 博士后
    • 来访学者
    • 行政团队
    • 学术支持
  • 学术研究
    • 研究团队
    • 公开课
    • 讨论班
  • 招生招聘
    • 教研人员
    • 博士后
    • 学生
  • 会议
    • 学术会议
    • 工作坊
    • 论坛
  • 学院生活
    • 住宿
    • 交通
    • 配套设施
    • 周边旅游
  • 新闻
    • 新闻动态
    • 通知公告
    • 资料下载
关于我们
院长致辞
理事会
协作机构
参观来访
人员
管理层
科研人员
博士后
来访学者
行政团队
学术支持
学术研究
研究团队
公开课
讨论班
招生招聘
教研人员
博士后
学生
会议
学术会议
工作坊
论坛
学院生活
住宿
交通
配套设施
周边旅游
新闻
新闻动态
通知公告
资料下载
清华大学 "求真书院"
清华大学丘成桐数学科学中心
清华三亚国际数学论坛
上海数学与交叉学科研究院
BIMSA > 梁蓓

梁蓓

     助理研究员    
助理研究员 梁蓓

团队: 人工智能和机器学习

办公室: A3-4-202

邮箱: lbei@bimsa.cn

研究方向: 隐私保护

CV

个人简介


梁蓓,博士毕业于中科院信息工程研究所信息安全专业,后于瑞典查尔姆斯理工大学做博士后研究,现任北京雁栖湖应用数学研究院助理研究员。主要研究方向是理论密码学,可证明安全。在密码学国际期刊及会议上发表论文20余篇,曾获ISC2019最佳论文奖和ProvSec2015最佳学生论文奖。作为课题负责人参与了国家重点研发计划两项,承担了北京自然科学基金面上项目一项。

教育经历


  • 2012 - 2016      中国科学院信息工程研究所      信息安全      博士
  • 2007 - 2010      西安理工大学      应用数学      硕士
  • 2003 - 2007      西安理工大学      计算数学      学士

工作经历


  • 2021 -      北京雁栖湖应用数学研究院      Assistant Professor
  • 2018 - 2018      东京工业大学      访问学者      Prof. Tanaka Keisuke
  • 2017 - 2017      中国科学院信息工程研究所      访问学者      薛锐
  • 2017 - 2017      奥尔胡斯大学      访问学者      Prof. Claudio Orlandi
  • 2016 - 2016      苏黎世联邦理工学院      访问学者      Prof. Adrian Perrig
  • 2016 - 2020      查尔姆斯理工大学      博士后

荣誉与奖项


  • 2019      最佳论文,互联网安全大会

出版物


  • [1] Z Li, J Chang, B Liang, K Ling, Y Dong, Y Ji, M Xu, Private-Set-Intersection-Based Medical Data Sharing Scheme with Integrity Auditing for IoMT Cloud Storage Systems, IEEE Transactions on Knowledge and Data Engineering (2025)
  • [2] D Wu, B Liang, Z Lu, J Ding, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications, Cryptography (2025)
  • [3] H Cai, X Wang, Z Lu, B Liang, Privately Compute the Item with Maximal Weight Sum in Set Intersection, International Conference on Applied Cryptography and Network Security, 195-223 (2025)
  • [4] S Meng, X Wang, Z Lu, B Liang, Efficient and Practical Multi-party Private Set Intersection Cardinality Protocol, IEEE 23rd International Conference on Trust, Security and Privacy (2024)
  • [5] D Wu, B Liang, Z Lu, J Ding, Efficient secure multi-party computation for multi-dimensional arithmetics and its application in privacy-preserving biometric identification, International Conference on Cryptology and Network Security, 3-25 (2024)
  • [6] Shengzhe Meng, Chengrui Dang, Bei Liang* and Jintai Ding, Two-round Post-quantum Private Equality Test and OT from RLWE-encryption, accepted by ICICS 2024 (2024)
  • [7] 昝瑶, 李红达, 梁蓓, & 孟宪宁, 受限伪随机函数: 定义的讨论和可验证性构造, accepted by 信息安全学报 (2024)
  • [8] Dongyu Wu, Bei Liang, Zijie Lu and Jintai Ding*, Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification, accepted by CANS2024 (2024)
  • [9] 胡希,向宏,丁津泰,梁蓓,夏鲁宁,向涛, 后量子密码迁移趋势下应用于区块链的公钥密码安全, 密码学报, 10(2), 219-245 (2023)
  • [10] Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas and Aikaterini Mitrokotsa., Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning, ACISP 2021, 13083(), 510-528, 2021 (2021)
  • [11] Carlo Brunett, Mario Larangeira, Bei Liang and Aikaterini Mitrokotsa, Keisuke Tanaka. , Turn-Based Communication Channels, ProvSec2021, 13059(), 376-392, 2021 (2021)
  • [12] Li, S., Liang, B. Mitrokotsa, A. Xue R., Homomorphic signcryption with public plaintext-result checkability, IET Inf. Secur., 15(5), 333-350, 2021(2021)
  • [13] Georgia Tsaloli, Bei Liang, Carlo Brunetta, Gustavo Banegas, Aikaterini Mitrokotsa, DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, ISC(2021), 296-319
  • [14] C Dang, X Zhou, B Liang, Efficient Fuzzy PSI Based on Prefix Representation, Cryptology ePrint Archive (2025)
  • [15] X Wang, Z Lu, B Liang, S Meng, Unbalanced PSI from Client-Independent Relaxed Oblivious PRF, Proceedings on Privacy Enhancing Technologies (2025)
  • [16] G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa, $DEVA$ : Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning, International Conference on Information Security, 296-319 (2021)
  • [17] S Li, B Liang, A Mitrokotsa, R Xue, Homomorphic signcryption with public plaintext‐result checkability, IET Information Security, 15(5), 333-350 (2021)
  • [18] B Liang, G Banegas, A Mitrokotsa, Statically aggregate verifiable random functions and application to e-lottery, Cryptography, 4(4), 37 (2020)
  • [19] H Xue, MH Au, R Yang, B Liang, H Jiang, Compact authenticated key exchange in the quantum random oracle model, Cryptology ePrint Archive (2020)
  • [20] D Pan, B Liang, H Li, P Ni, Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications, Australasian Conference on Information Security and Privacy, 609-619 (2019)
  • [21] D Pan, B Liang, H Li, P Ni, Hierarchical functional signcryption: notion and construction, International Conference on Provable Security, 167-185 (2019)
  • [22] B Liang, A Mitrokotsa, Robust Distributed Pseudorandom Functions for mNP Access Structures, International Conference on Information Security, 107-126 (2019)
  • [23] D Pan, B Liang, H Li, P Ni, Public-Coin Differing-Inputs Obfuscator for Hiding-Input Point Function with Multi-bit Output and Its Applications, International Conference on Cryptology in India, 297-317 (2019)
  • [24] B Liang, A Mitrokotsa, Decentralised functional signatures, Mobile Networks and Applications, 24(3), 934-946 (2019)
  • [25] C Brunetta, B Liang, A Mitrokotsa, Code-based zero knowledge PRF arguments, International Conference on Information Security, 171-189 (2019)
  • [26] X Wang, B Wang, B Liang, R Xue, A more compact multi-id identity-based FHE scheme in the standard model and its applications, Science China. Information Sciences, 62(3), 39101 (2019)
  • [27] G Tsaloli, B Liang, A Mitrokotsa, Verifiable homomorphic secret sharing, International Conference on Provable Security, 40-55 (2018)
  • [28] S Li, B Liang, R Xue, Private functional signatures: definition and construction, Australasian Conference on Information Security and Privacy, 284-303 (2018)
  • [29] X Xu, H Xue, K Wang, S Tian, B Liang, W Yu, Strongly Secure Authenticated Key Exchange from Supersingular Isogeny., IACR Cryptol. ePrint Arch., 2018, 760 (2018)
  • [30] C Brunetta, B Liang, A Mitrokotsa, Lattice-based simulatable vrfs: Challenges and future directions, Journal of Internet Services and Information Security (JISIS), 8(4), 57-69 (2018)
  • [31] X Wang, B Liang, S Li, R Xue, On Constructing Pairing-Free Identity-Based Encryptions, International Conference on Information Security, 308-327 (2018)
  • [32] C Brunetta, C Dimitrakakis, B Liang, A Mitrokotsa, A differentially private encryption scheme, International Conference on Information Security, 309-326 (2017)
  • [33] B Liang, A Mitrokotsa, Fast and adaptively secure signatures in the random oracle model from indistinguishability obfuscation, Cryptology ePrint Archive (2017)
  • [34] B Liang, A Mitrokotsa, Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper), International Conference on Information Security Practice and Experience … (2017)
  • [35] B Liang, A Mitrokotsa, Distributed pseudorandom functions for general access structures in NP, International Conference on Information and Communications Security, 81-87 (2017)
  • [36] D Zhang, F Fang, B Li, H Xue, B Liang, Compact hierarchical IBE from lattices in the standard model, International Conference on Information and Communications Security, 210-221 (2017)
  • [37] B Liang, H Li, J Chang, Verifiable random functions from (leveled) multilinear maps, International Conference on Cryptology and Network Security, 129-143 (2015)
  • [38] F Tang, H Li, Q Niu, B Liang, Secure Mobile Agent from Leakage‐Resilient Proxy Signatures, Mobile Information Systems, 2015(1), 901418 (2015)
  • [39] B Liang, H Li, J Chang, Constrained verifiable random functions from indistinguishability obfuscation, International Conference on Provable Security, 43-60 (2015)
  • [40] Q Niu, H Li, G Huang, B Liang, F Tang, One-round witness indistinguishability from indistinguishability obfuscation, International Conference on Information Security Practice and Experience … (2015)
  • [41] B Liang, H Li, J Chang, The generic transformation from standard signatures to identity-based aggregate signatures, International Conference on Information Security, 21-41 (2015)
  • [42] B Liang, R Zhang, H Li, Simpler cca-secure public key encryption from lossy trapdoor functions, International Conference on Information Security and Cryptology, 193-206 (2014)
  • [43] F Tang, H Li, Q Niu, B Liang, Efficient leakage-resilient signature schemes in the generic bilinear group model, International Conference on Information Security Practice and Experience … (2014)
  • [44] F Tang, H Li, B Liang, Attribute-based signatures for circuits from multilinear maps, International Conference on Information Security, 54-71 (2014)
  • [45] F Tang, H Li, Q Niu, B Liang, Leakage-resilient proxy signatures, International Conference on Intelligent Networking, 5 (2013)
  • [46] H Li, Q Niu, B Liang, Leakage-resilient zero-knowledge proofs of knowledge for NP, International Conference on Network and System Security, 365-380 (2013)
  • [47] B Liang, A Mitrokotsa, G Tsaloli, C Dimitrakakis, Homomorphic Signcryption with Public Verification and its Application to Verifiable Differential Privacy

 

更新时间: 2025-12-04 17:00:08


北京雁栖湖应用数学研究院
CONTACT

No. 544, Hefangkou Village Huaibei Town, Huairou District Beijing 101408

北京市怀柔区 河防口村544号
北京雁栖湖应用数学研究院 101408

Tel. 010-60661855 Tel. 010-60661855
Email. administration@bimsa.cn

版权所有 © 北京雁栖湖应用数学研究院

京ICP备2022029550号-1

京公网安备11011602001060 京公网安备11011602001060