Welcome to Da-Zhi Sun’s Home Page [中文版]


  Email
  Address School of Computer Science and Technology, Tianjin University, No. 135, Yaguan Road, Tianjin Haihe Education Park, Tianjin 300350, PR China
  Office 55-B-407
  Fax +86-022-27406538

Brief Biography

Da-Zhi Sun received the Ph.D. degree under the supervision of Prof. Zhen-fu Cao in Computer Science and Technology from Shanghai Jiao Tong University, in 2006. From 2007 to 2011, Dr Sun performs the postdoctoral research under the supervision of Prof. Jin-Peng Huai in the Institute of Advanced Computing Technology at Beihang University. Dr Sun now is an associate  professor in the School of Computer Science and Technology at Tianjin University. Dr Sun’s current research interests include information and network security, trusted computing, and applied cryptography.


Publications

2017
[1] Da-Zhi Sun and Guang-Quan Xu, One-round provably secure yoking proof for RFID applications,  in: Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications-TrustCom 2017, IEEE, 2017, pp. 315-322.

2016
[1] Da-Zhi Sun and Xiao-Hong Li, Vulnerability and enhancement on Bluetooth pairing and link key generation scheme for Security Modes 2 and 3, in: Kwok-Yan Lam and Chi-Hung Chi (Eds), Proceedings of the 18th International Conference on Information and Communications Security-ICICS 2016, LNCS 9977, Springer-Verlag, 2016,
 pp. 403-417.

[2] Da-Zhi Sun and Ji-Dong Zhong, Cryptanalysis of a hash based mutual RFID tag authentication protocol, Wireless Personal Communications 91(3) (2016) 1085-1093.

[3] Zhong-Yuan Hao, Wei Guo, Ji-Zeng Wei, and Da-Zhi Sun, Dual processing engine architecture to speed up optimal Ate pairing on FPGA platform,  in: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications-TrustCom 2016, IEEE, 2016, pp. 584-589.

2015

[1] Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, and Mohammad Reza Aref, Analysis and enhancement of desynchronization attack on an ultralightweight RFID authentication protocol, Cryptology ePrint Archive, Report 2015/037 (2015).

[2] Shao-Guang Geng, Xiao-Hong Li, Zhi-Yong Feng, and Da-Zhi Sun, Web application architecture security evaluation method based on AADL, in: Proceedings of the 20th International Conference on Engineering of Complex Computer Systems-ICECCS 2015, IEEE, 2015, pp. 186-189.

2013

[1] Da-Zhi Sun and Zhen-Fu Cao, On the privacy of Khan et al.'s dynamic ID-based remote authentication scheme with user anonymity, Cryptologia 37(4) (2013) 345-355.

[2] Da-Zhi Sun, Jian-Xin Li, Zhi-Yong Feng, Zhen-Fu Cao, and Guang-Quan Xu, On the security and improvement of a two-factor user authentication scheme in wireless sensor networks, Personal and Ubiquitous Computing 17(5) (2013) 895-905.

[3] Da-Zhi Sun, Jin-Peng Huai, and Zhen-Fu Cao, A comment on "An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation", Information Sciences 223 (2013) 331-334.

[4] Jian-Xin Li, Xu-Dong Liu, Lu Liu, Da-Zhi Sun, and Bo Li, HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree, Telecommunication Systems 52(2) (2013) 1353-1365.

[5] Xiu-Ming Tian, Guang-Quan Xu, Xiao-Hong Li, Zhi-Yong Feng, and Da-Zhi Sun, Personalized recommendation based on information flow in data intensive services, Journal of Internet Technology 14(5) (2013) 825-834.

[6] Rui Xu, Guang-Quan Xu, Da-Zhi Sun, Xiao-Hong Li, and Zhi-Yong Feng, Improving KeyNote trust management model based on user behavior for social learning, in: Dickson K. W. Chiu, Min-Hong Wang, Elvira Popescu, Qing Li, Rynson Lau, Timothy K. Shih, Chu-Sing Yang, and Demetrios G. Sampson (Eds), Proceedings of the 12th International Conference on Advances in Web-Based Learning-ICWL 2013, LNCS 8390, Springer-Verlag, 2015, pp. 96-103.

2012

[1] Da-Zhi Sun and Ji-Dong Zhong, A hash-based RFID security protocol for strong privacy protection, IEEE Transactions on Consumer Electronics 58(4) (2012) 1246-1252.

[2] Da-Zhi Sun, Jin-Peng Huai, and Jian-Xin Li, A note on asynchronous multi-exponentiation algorithm using binary representation, Information Processing Letters 112(22) (2012) 876-879.

[3] Da-Zhi Sun, An error in "On a new formal proof model for RFID location privacy", Cryptology ePrint Archive, Report 2012/031 (2012).

[4] Wei Guo, Ya-Ling Liu, Song-Hui Bai, Ji-Zeng Wei, and Da-Zhi Sun, Hardware architecture for RSA cryptography based on residue number system, Transactions of Tianjin University 18(4) (2012) 237-242.

[5] Yan-Hua Liu, Wei Guo, Ya Tan, Ji-Zeng Wei, Da-Zhi Sun, An efficient scheme for implementation of SM2 digital signature over GF(p), in: Proceedings of Contemporary Research on E-business Technology and Strategy, Communications in Computer and Information Science, Volume 332, Springer Berlin Heidelberg, pp. 250-258, 2012.

2011

[1] Jing-Wei Hu, Wei Guo, Ji-Zeng Wei, Yi-Song Chang, and Da-Zhi Sun, A novel architecture for fast RSA key generation based on RNS, in: Proceedings of 2011 Fourth International Symposium on Parallel Architectures, Algorithms, and Programming (PAAP), IEEE, pp. 345-349, 2011.

2010

[1] Zeng Peng, Kim-Kwang Raymond Choo, and Da-Zhi Sun, On the security of an enhanced novel access control protocol for wireless sensor networks, IEEE Transactions on Consumer Electronics 56(2) (2010) 566-569.

[2] Jian-Xin Li, Bo Li, Lin-Lin Meng, and Da-Zhi Sun, HiTrust: A hybrid tree based trust negotiation service, in: Proceedings of IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), IEEE,  pp. 854-859, 2010.

2009

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jian-Xin Li, Analysis of multi-exponentiation algorithm using binary signed-digit representations, International Journal of Computational Methods 6(2) (2009) 307-315.

[2] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jian-Xin Li, Jia-Wan Zhang, and Zhi-Yong Feng, Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards, IEEE Transactions on Industrial Electronics 56(6) (2009) 2284-2291.

[3] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Jian-Xin Li, Cryptanalysis of a mutual authentication scheme based on nonce and smart cards, Computer Communications 32(6) (2009) 1015-1017.

2008

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, Jia-Wan Zhang, and Zhi-Yong Feng, A new design of wearable token system for mobile device security, IEEE Transactions on Consumer Electronics 54(4) (2008) 1784-1789.

[2] Da-Zhi Sun and Zhen-Fu Cao, New cryptanalysis paradigm on a nonce-based mutual authentication scheme, International Journal of Network Security 6(1) (2008) 116-120.

2007

[1] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Zhen-Fu Cao, An efficient modular exponentiation algorithm against simple power analysis attacks, IEEE Transactions on Consumer Electronics 53(4) (2007) 1718-1723.

[2] Da-Zhi Sun, Jin-Peng Huai, Ji-Zhou Sun, and Jia-Wan Zhang, Computational efficiency analysis of Wu et al.'s fast modular multi-exponentiation algorithm, Applied Mathematics and Computation 190(2) (2007) 1848-1854.

[3] Da-Zhi Sun, A note on Chang-Lai's modular square algorithm based on the generalized Chinese remainder theorem, Applied Mathematics and Computation 188(1) (2007) 411-416.

2006

[1] Da-Zhi Sun, Research on several basic authentication problems under distributing environments, PhD Thesis, 2006. (In Chinese)

[2] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, How to compute modular exponentiation with large operators based on the right-to-left binary algorithm, Applied Mathematics and Computation 176(1) (2006) 280-292.

[3] Zhen-Fu Cao and Da-Zhi Sun, Cryptanalysis and improvement of user authentication scheme using smart cards for multi-server environments, in: Proceedings of 2006 International Conference on Machine Learning and Cybernetics-ICMLC'06, IEEE, 2006, pp. 2818-2822.

2005

[1] Da-Zhi Sun, Ji-Dong Zhong, and Yu Sun, Weakness and improvement on Wang-Li-Tie's user-friendly remote authentication scheme, Applied Mathematics and Computation 170(2) (2005) 1185-1193.

[2] Da-Zhi Sun and Zhen-Fu Cao, Novel forgery method on some password authentication schemes, Journal of Computation Information Systems 1(3) (2005) 471-475.

[3] Da-Zhi Sun and Zhen-Fu Cao, Improved public key authentication scheme for non-repudiation, Applied Mathematics and Computation 168(2) (2005) 927-932.

[4] Da-Zhi Sun and Zhen-Fu Cao, Improvement of Lee-Kim-Yoo's remote user authentication scheme using smart cards, in: Li-Po Wang and Yao-Chu Jin (Eds), Proceedings of Second International Conference on Fuzzy Systems and Knowledge Discovery-FSKD'05, LNAI 3614, Springer-Verlag, 2005, pp. 596-599.

[5] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, Remarks on a new key authentication scheme based on discrete logarithms, Applied Mathematics and Computation 167(1) (2005) 572-575.

[6] Da-Zhi Sun, Zhen-Fu Cao, and Yu Sun, Comment: cryptanalysis of Lee-Hwang-Li's key authentication scheme, Applied Mathematics and Computation 164(3) (2005) 675-678.


Patents

[1] Da-Zhi Sun, Ji-Zhou Sun, Jia-Wan Zhang, A scalar multiplication algorithm against simple power analysis attacks, Application No. 200810154231.2, Patent No. ZL 2008 1 0154231.2. (Submitted to State Intellectual Property Office of the PRC)

[2] Da-Zhi Sun, Yue-Jiao Wang, Zhi-Yong Feng, An efficient cryptographic hash-based authentication method for wireless sensor networks, Application No. 201210578596.4, Patent No. ZL 2012 1 0578596.4. (Submitted to State Intellectual Property Office of the PRC)

[3] Da-Zhi Sun, Yue-Jiao Wang, Xiao-Hong Li, A modified RFID authentication method based on the HB+ protocol, Application No. 201210185839.8, Patent No. ZL 2012 1 0185839.8. (Submitted to State Intellectual Property Office of the PRC)

[4] Da-Zhi Sun, Ya-Jiao Mao, Xiao-Hong Li, Guang-Quan Xu, An efficient ownership transfer method for RFID system, Application No. 201410068882.5, Patent No. ZL 2014 1 0068882.5. (Submitted to State Intellectual Property Office of the PRC)

[5] Da-Zhi Sun
, Bo-Wei Yang, Xiao-Hong Li, An improvement on the sliding-window exponentiation algorithm, Application No. 201410726861.8. (Submitted to State Intellectual Property Office of the PRC)

[6] Da-Zhi Sun
, Ze-Guang Zhu, Xiao-Hong Li, Guang-Quan Xu, A secure concurrency control method for real-time database, Application No. 201510264204.0. (Submitted to State Intellectual Property Office of the PRC)


Courses

SEG 2180081: Modern Cryptography - Spring 2008|Spring 2009|Fall 2009|Fall 2010.

CSTG 2160157: Modern Cryptography - Spring 2009|Fall 2009|Fall 2010|Fall 2011|Spring 2013|Spring 2014|Spring 2016|Spring 2018.

CSTG 2160245: Security in Computing - Spring 2010|Spring 2011|Spring 2012|Spring 2013|Spring 2014|Spring 2015|Spring 2016|Spring 2018.

2090907: Modern Cryptography - Spring 2014.

2090923: Wireless Network Security - Fall 2014.

S216C001: Cryptography and Network Security - Spring 2012|Spring 2013|Spring 2014|Spring 2015|Spring 2016.

S216E608: Cryptography and Information Security - Fall 2012|Fall 2013|Fall 2014|Spring 2015|Fall 2015|Fall 2016.


Professional Activity

1 August 2017-4 August 2017, Attend the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2017), Sydney, Australia.

December 2016- , Visit Centre for Computer and Information Security Research, School of Computing and Information Technology, University of Wollongong, Australia supported by China Scholarship Council. Research collaborator: Prof. Yi Mu.

29 November 2016-2 December 2016, Attend the 18th International Conference on Information and Communications Security (ICICS 2016), Singapore, Pictures.

2012, Invite Prof. Atsuko Miyaji to give a technical talk in the School of Computer Science and Technology at Tianjin University.

2011, Attend the 2011 FTRA International Symposium on Advances in Cryptography, Security, and Applications for Future Computing (ACSA 11), Jeju, Korea.

2010, Visit Japan Advanced Institute of Science and Technology, Pictures.


Last update: 01-Jul-2017