Jingguo Bi

Associate Member

Tel: 62789974

E-mail: jingguobi(at)mail.tsinghua.edu.cn

Education background

2007.09-2012.12, School of Mathematics, Shangdong University. Ph.D. 

2011.09-2012.09, Department of Computer Science, The university of Oklahoma. Visting scholar.

2003.09-2007.07, School of Mathematics, Shangdong University. Bachelor.

Experience

2015.6-                 Associate member, Institute for Advanced Study, Tsinghua university

2013.3-2015.6,   Post doctor, Institute for Advanced Study, Tsinghua university

Areas of Research Interests/ Research Projects

My research interest focuses mainly on the design and security assessment of the cryptosystems, especially on the design and cryptanalysis of the public-key schemes and solving the cryptologic mathematical problems by using lattice-based method. Related research results have been published in the famous cryptology conferences, such as PKC、ISSAC、ISIT.

Academic Achievement

Selected publication:

1. Jingguo Bi and Qi Cheng. Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices. Theoritical Computer Science 560, 121-130, 2014.(Journal version of the article in TAMC 2012)

2. Jingguo Bi, Jean-Sébastien Coron, Jean-Charles Faugère, Phong Q. Nguyen, Guénaël Renault, Rina Zeitoun: Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences. Public Key Cryptography 2014 (PKC 2014): 185-202

3. Jingguo Bi, Qi Cheng, J. Maurice Rojas: Sub-linear root detection, and new hardness results, for sparse polynomials over finite fields. International Symposium on Symbolic and Algebraic Computation 2013 (ISSAC 2013): 61-68. (The winner of Distinguished Paper Award).

4. Jingguo Bi and Qi Cheng. Lower Bounds of Shortest Vector Lengths in Random NTRU Lattices. Proceeding of 9th annual conference on Theory and Applications of Models of Computation (TAMC 12),143-155.

5. Jingguo Bi, Mingjie Liu and Xiaoyun Wang. Cryptanalysis of a Homomorphic Encryption Scheme From ISIT 2008. Proceeding of International Symposium on Information Security (ISIT 12),2152-2156.

6. Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi. Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. ASIACCS 2011,1-9.

7. Xianmeng Meng, Jingguo Bi: Weak Keys in RSA with Primes Sharing Least Significant Bits. Inscrypt 2009, 278-287.