Position: Home> Research> Research Achievements

Research Achievements

(1) Break through the key security technologies of heterogeneous multi-domain wireless network fusion


Wireless network presents the trend of heterogeneous interconnection, and security is the main bottleneck restricting its development.Combining with the national strategic requirements, the project has invented the self-adaptive comprehensive identity authentication method and cross-domain anonymous authentication method at the network layer. Based on the pre-authentication multi-domain roaming switching method of mobile terminal, the project has invented the real-time automatic updating method of security association response protocol and security policy on TCP/IP, and proposed the security association management architecture of heterogeneous multi-domain wireless network.The related achievements won various prizes. "Key Technologies and Applications of Heterogeneous Multi-domain Wireless Network Collaborative Security" won the second prize of 2013 National Technological Invention Award", "Key Technologies of Ubiquitous Network Information Aggregation and Security Protection" won the first prize of Science and Technology of China Electronics Society in 2014, and "Security Management Technologies and Methods of Wireless LAN Based on Trusted Computing" won the first prize of Science and Technology Progress of Colleges and Universities in 2013.


(2) Realize the key technology and demonstration application of data security


The encryption reference structure of cloud database system is proposed to effectively prevent data leakage and illegal access.The key agreement problem of cloud database access is solved to improve the efficiency of ciphertext data operation.A fine-grained access control mechanism based on attributes is designed to ensure the security of multi-user concurrent access to data.In view of the business demand of random cross encryption and decryption of multi-data stream/multi-key/multi-data stream in the complex network environment, a data processing method of parallel running algorithm is proposed to solve the problem of random cross encryption and decryption of multi-cryptographic algorithm/multi-key/multi-data stream.It has developed a high-performance integrated password service system, a high-performance signature check server and a high-performance financial data cipher machine, which have passed the special examination of the State Cryptography Administration, ranking the first in the comprehensive evaluation of similar products and listed in the national commercial password product catalog.The "QinCloudDB" cloud encryption database system has won the "Gold Award" and "the Best Business Investment Value Award" in National Science and Technology Workers Innovation and Entrepreneurship Competition of the 18th Annual Meeting of China Association for Science and Technology in 2016, and the related achievement "service security providing methods and key technology under complex network environment" won the First Prize of Science and Technology of China Institute of Communications in 2014.


(3) Make breakthroughs in the key technologies of cryptographic design and analysis, and attract great attention from the international cryptographic community

The Shaw-Massey theorem proposed opens up a new field of stream cipher research, and creates a new method of stream cipher analysis and design using spectrum technology in the world.The secure network coding proposed opens up a new direction of network coding.In terms of the new public key theory, the GGH13 multi-linear mapping and most of its cryptographic applications, which was currently recognized as the best, was broke through from the basic security assumption in 2015 and caused a sensation in the international cryptography community. ZUC, a stream cipher standard involved in the design, has become an international LTE standard. And a number of new achievements have been made in the construction of Algebraic Immune Boolean functions.A series of fingerprint-based encryption and identity authentication technologies with the fusion of traditional cryptography and fingerprint identification technology are proposed to solve the security problems such as information leakage, identity impersonation and identity abuse caused by the traditional cryptography with the key as the security core. A series of secure key binding or generating schemes are proposed to solve the existing security holes in the existing key binding or generating schemes.As one of the contributions, it won the second prize of National Technological Invention.



TOP

Baidu
map