陈晓峰
近期热点
资料介绍
个人简历
教育经历1994.09-2000.03:西北大学,数学系(基础数学专业,六年制本硕连读),获理学硕士学位。2000.03-2003.03:西安电子科技大学,通信工程学院(密码学专业),获工学博士学位。2003.04-2004.04:韩国,信息与通信大学国际信息安全研究中心,博士后研究。工作经历2004.05-2009.03:中山大学,副教授2009.03-至今:西安电子科技大学,教授2013.10-2014.01:美国弗吉尼亚理工大学,访问学者荣誉奖励国家万人计划科技创新领军人才教育部“青年长江学者”网络安全优秀教师奖(2018)科技部“中青年科技创新领军人才”教育部“新世纪优秀人才支持计划”陕西省密码学专业教学团队带头人西安电子科技大学华山青年学者/华山学者西安电子科技大学优秀教师(2011);师德先进个人(2016)陕西省青年科技奖(2016)中国密码学会密码创新奖(2016)陕西省高等学校科学技术奖一等奖(2018)中国密码学会优秀博士学位论文指导教师(2017)教育部自然科学奖励二等奖、陕西省科学技术奖励自然科学奖二等奖(2019)课程教学信息安全专题讨论(研究生)(2018);公钥密码学研究生(2018);应用密码学(2018)应用密码学(2017);信息安全专题讨论(研究生)(2017)离散数学(2016);信息安全专题讨论(研究生)(2016)编码理论新进展(研究生)(2010-2016)通信网安全与保密(2010-2015)抽象代数;组合数学与数论;公钥密码学(研究生)(2008)离散数学(2007);电子商务安全技术;组合数学与数论(2007)线性代数;电子商务;公钥密码体制的可证明安全性(研究生)(2006)电子商务;金融密码学(研究生)(2005)现代密码学(2004)招生要求欢迎优秀的博士(代数、数论、公钥密码学背景均可)做博士后合作研究博士研究生:有学术理想;数学和外语基础好;思维活跃,做事有恒心;(学术路漫漫,读博需谨慎!)硕士研究生:工程背景好,有较强的编程能力;性格开朗,有团队意识;喜欢运动(篮球最好)和音乐(架子鼓最好)。研究项目国家\研究领域
公钥密码学、金融密码学云计算与云安全数据安全近期论文
2016XiaofengChen,JianfengWang,XinyiHuang,Proceedingsofthe11thACMonAsiaConferenceonComputerandCommunicationsSecurity,AsiaCCS2016,Xi'an,China,May30-June3,2016.ACM2016,ISBN978-1-4503-4233-9.XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates.IEEEtransactionsonComputers,65(10):3184-3195,2016.TaoJiang,XiaofengChen,JianfengMa,PublicIntegrityAuditingforSharedDynamicCloudDatawithGroupUserRevocation.IEEEtransactionsonComputers,65(8):2363-2373,2016.JianfengWang,MeixiaMiao,YaqianGao,XiaofengChen,Enablingefficientapproximatenearestneighborsearchforoutsourceddatabaseincloudcomputing.SoftComput.20(11):4487-4495(2016)PengChen,JunYe,XiaofengChen,Efficientrequest-basedcomparableencryptionschemebasedonslidingwindowmethod.SoftComput.20(11):4589-4596(2016)JunYe,XiaofengChen,JianfengMa,Improvedalgorithmforsecureoutsourcingofmodularexponentiationswithhighcheckability.IJAHUC23(3/4):182-191(2016)BaojiangCui,ZiyueWang,BingZhao,XiaofengChen,DesignandanalysisofsecuremechanismsbasedontripartitecredibilityforRFIDsystems.ComputerStandards&Interfaces44:110-116(2016).LiangLiu,XiaofengChen,WenjingLou,Securethree-partycomputationalprotocolsfortrianglearea.Int.J.Inf.Sec.15(1):1-13(2016).ZheliLiu,XiaofengChen,JunYang,ChunfuJia,IlsunYou,Neworderpreservingencryptionmodelforoutsourceddatabasesincloudenvironments.J.NetworkandComputerApplications59:198-207(2016).YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,Efficientattribute-baseddatasharinginmobileclouds.PervasiveandMobileComputing28:135-149(2016).YinghuiZhang,JinLi,XiaofengChen,HuiLi,Anonymousattribute-basedproxyre-encryptionforaccesscontrolincloudcomputing.SecurityandCommunicationNetworks9(14):2397-2411(2016).JianfengWang,XiaofengChen,EfficientandSecureStorageforOutsourcedData:ASurvey.DataScienceandEngineering1(3):178-188(2016).ZheliLiu,DejiangLuo,JinLi,XiaofengChen,ChunfuJia,N-Mobishare:newprivacy-preservinglocation-sharingsystemformobileonlinesocialnetworks.Int.J.Comput.Math.93(2):384-400(2016).TaoJiang,XiaofengChen,QianhongWu,JianfengMa,WillySusilo,WenjingLou,TowardsEfficientFullyRandomizedMessage-LockedEncryption.ACISP(1)2016:361-375.YinghuiZhang,JinLi,DongZheng,XiaofengChen,HuiLi,AccountableLarge-UniverseAttribute-BasedEncryptionSupportingAnyMonotoneAccessStructures.ACISP(1)2016:509-524.KamilKluczniak,JianfengWang,XiaofengChen,MiroslawKutylowski,Multi-deviceAnonymousAuthentication.NSS2016:21-36.2015XiaofengChen,JinLi,XinyiHuang,JianfengMa,WenjingLou,NewPubliclyVerifiableDatabaseswithEfficientUpdates.IEEETransactionsonDependableandSecureComputing,12(5):546-556,2015.Xiaofeng,XinyiHuang,JinLi,JianfengMa,WenjingLou,NewAlgorithmsforSecureOutsourcingofLarge-scaleSystemsofLinearEquations.IEEETransactionsonInformationandForensicsSecurity,10(1),69-78,2015.XiaofengChen,WillySusilo,JinLi,DuncanSWong,JianfengMa,ShaohuaTang,QiangTang,EfficientAlgorithmsforSecureOutsourcingofBilinearPairings,TheoreticalComputerScience,562:112-121,2015.JianfengWang,XiaofengChen,XinyiHuang,IlsunYou,andYangXiang,VerifiableAuditingforOutsourcedDatabaseinCloudComputing,IEEETransactionsonComputers,64(11):3293-3303,2015.JinLi,XiaofengChen,XinyiHuang,ShaohuaTang,andYangXiang,SecureDistributedDeduplicationSystemswithImprovedReliability.IEEETransactionsonComputers,64(12):3569-3579,2015.JinLi,XiaoTan,XiaofengChen,DuncanWong,FatosXhafa.OPoR:EnablingProofofRetrievabilityinCloudComputingwithResource-ConstrainedDevices.IEEETransactionsonCloudComputing,3(2):195-205,2015.JinLi,YanKitLi,XiaofengChen,PatrickP.C.Lee,WenjingLou:AHybridCloudApproachforSecureAuthorizedDeduplication,IEEETransactionsonParallelandDistributedSystems,26(5),1206-1216,2015.JinLi,JingweiLi,XiaofengChen,ChunfuJiaandWenjingLou.Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing.IEEETransactionsonComputers,64(2):425-437,2015.TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,andJosephK.Liu,Towardssecureandreliablecloudstorageagainstdatare-outsourcing,FutureGenerationComputerSystems,Vol.52,2015,pp.86-94.JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Newaccesscontrolsystemsbasedonoutsourcedattribute-basedencryption1.JournalofComputerSecurity,23(6):659-683(2015).JinLi,XiaofengChen,FatosXhafa,LeonardBarolli,Securededuplicationstoragesystemssupportingkeywordsearch.J.Comput.Syst.Sci.81(8):1532-1541(2015).JinLi,XiaofengChen,XinyiHuang:Newattribute-basedauthenticationanditsapplicationinanonymouscloudaccessservice.IJWGS11(1),125-141,2015.MeixiaMiao,JianfengWang,HuiLi,XiaofengChen,Securemulti-server-aideddatadeduplicationincloudcomputing.PervasiveandMobileComputing24:129-137(2015).HuiZhu,YingfangXue,XiaofengChen,QiangLi,HuiLi,V-MGSM:AMultilevelandGroupingSecurityVirtualizationModelforMobileInternetService.MobileInformationSystems2015:841292:1-841292:9(2015).QiangTang,HuaMa,XiaofengChen,ExtendtheConceptofPublicKeyEncryptionwithDelegatedSearch.TheComputerJournal,58(4):724-734(2015).YanshengFeng,HuaMa,XiaofengChen,EfficientandVerifiableOutsourcingSchemeofSequenceComparisons.IntelligentAutomation&SoftComputing,21(1):51-63(2015).JinLi,ZheliLiu,XiaofengChen,FatosXhafa,XiaoTan,DuncanS.Wong,L-EncDB:Alightweightfr[ant]ameworkforprivacy-preservingdataqueriesincloudcomputing.Knowl.-BasedSyst.79:18-26(2015).ShaohuaTang,BoLv,GuominChen,ZhiniangPeng,AdamaDiene,XiaofengChen,EfficienthardwareimplementationofPMI+forlow-resourcedevicesinmobilecloudcomputing.FutureGenerationComp.Syst.52:116-124(2015).JianfengWang,XiaofengChen,JinLi,KamilKluczniak,MiroslawKutylowski,ANewSecureDataDeduplicationApproachSupportingUserTraceability.BWCCA2015:120-124.JunYe,XiaofengChen,JianfengMa,AnImprovedAlgorithmforSecureOutsourcingofModularExponentiations.AINAWorkshops2015:73-76PengChen,JunYe,XiaofengChen,ANewEfficientRequest-BasedComparableEncryptionScheme.AINAWorkshops2015:436-439.QinZou,JianfengWang,XiaofengChen,SecureEncryptedImageSearchinMobileCloudComputing.BWCCA2015:572-575.YujueWang,QianhongWu,BoQin,XiaofengChen,XinyiHuang,YunyaZhou,Group-orientedProofsofStorage.ASIACCS2015:73-84.BaojiangCui,ZiyueWang,JunYang,XiaofengChen,DesignandAnalysisofanEnhancedSecureMechanismofLLRPinRFIDSystems.AINAWorkshops2015:17-21.JunYe,MeixiaMiao,PengChen,XiaofengChen,Request-BasedComparableEncryptionSchemewithMultipleUsers.BWCCA2015:414-416.XuYang,WeiWu,JosephK.Liu,XiaofengChen,LightweightAnonymousAuthenticationforAdHocGroup:ARingSignatureApproach.ProvSec2015:215-226.TranVietXuanPhuong,GuominYang,WillySusilo,XiaofengChen,AttributeBasedBroadcastEncryptionwithShortCiphertextandDecryptionKey.ESORICS(2)2015:252-269.2014XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,IEEETransactionsonParallelandDistributedSystems,25(9),2386-2396,2014.XiaofengChen,JinLi,XinyiHuang,JingweiLi,YangXiang,DuncanWong.SecureOutsourcedAttribute-basedSignatures.IEEETransactionsonParallelandDistributedSystems,25(12):3285-3294,2014.XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-basedchameleonhashingandsignatureswithoutkeyexposure,InformationSciences,265:198-210,2014.XiaofengChen,JinLi,JianWeng,JianfengMa,WenjingLou,VerifiableComputationoverLargeDatabasewithIncrementalUpdates,ESORICS2014,LNCS8712,148–162,Springer-Verlag,2014.XiaofengChen,JinLi,JianfengMa,WenjingLou,DuncanS.Wong:Newandefficientconditionale-paymentsystemswithtransferability.FutureGenerationComp.Syst.37:252-258(2014).JingweiLiu,ZonghuaZhang,XiaofengChen,KyungSupKwak:CertificatelessRemoteAnonymousAuthenticationSchemesforWirelessBodyAreaNetworks.IEEETrans.ParallelDistrib.Syst.25(2):332-342(2014).JinLi,XiaofengChen,MingqiangLi,JingweiLi,PatrickP.C.Lee,WenjingLou:SecureDeduplicationwithEfficientandReliableConvergentKeyManagement.IEEETrans.ParallelDistrib.Syst.25(6):1615-1625(2014).XinyiHuang,XiaofengChen,JinLi,YangXiang,LiXu:FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems.IEEETrans.ParallelDistrib.Syst.25(7):1767-1775(2014).JinLi,XinyiHuang,JingweiLi,XiaofengChen,YangXiang,SecurelyOutsourcingAttribute-BasedEncryptionwithCheckability.IEEETrans.ParallelDistrib.Syst.25(8):2201-2210(2014).HaiboTian,XiaofengChen,WillySusilo:Deniabilityandforwardsecrecyofone-roundauthenticatedkeyexchange.TheJournalofSupercomputing67(3):671-690(2014).YinghuiZhang,XiaofengChen,JinLi,HuiLi,GenericconstructionforsecureandefficienthandoffauthenticationschemesinEAP-basedwirelessnetworks.ComputerNetworks75:192-211(2014).FatosXhafa,XiaofengChen,XinyiHuang,VladiKolici,Advancesinsecureandintelligentdataprocessing.ConcurrencyandComputation:PracticeandExperience26(5):1021-1022(2014).YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,Attribute-BasedDataSharingwithFlexibleandDirectRevocationinCloudComputing.TIIS8(11):4028-4049(2014).LeonardBarolli,FatosXhafa,XiaofengChen,MakotoIkeda,NinthInternationalConferenceonBroadbandandWirelessComputing,CommunicationandApplications,BWCCA2014,Guangdong,China,November8-10,2014.IEEEComputerSociety2014,ISBN978-1-4799-4173-5.LiXu,YuanHe,XiaofengChen,XinyiHuang,Ticket-basedhandoffauthenticationforwirelessmeshnetworks.ComputerNetworks73:185-194(2014).HaixinNie,HuaMa,JianfengWang,XiaofengChen,VerifiableAlgorithmforSecureOutsourcingofSystemsofLinearEquationsintheCaseofNoSolution.BWCCA2014:572-577.YaqianGao,MeixiaMiao,JianfengWang,XiaofengChen,SecureApproximateNearestNeighborSearchoverEncryptedData.BWCCA2014:578-583.JingweiLi,JinLi,XiaofengChen,ZheliLiu,ChunfuJia:Privacy-preservingdatautilizationinhybridclouds.FutureGenerationComp.Syst.30:98-106(2014).QiHan,YinghuiZhang,XiaofengChen,HuiLi,JiaxiangQuan:Efficientandrobustidentity-basedhandoffauthenticationforEAP-basedwirelessnetworks.ConcurrencyandComputation:PracticeandExperience26(8):1561-1573(2014).JinLi,XiaofengChen,QiongHuang,DuncanS.Wong:Digitalprovenance:Enablingsecuredataforensicsincloudcomputing.FutureGenerationComp.Syst.37:259-266(2014).YuanChen,XiaofengChen,HuiLi,MoreDCCA-securepublic-keyencryptionsfromKEM+DEMstylehybridparadigmsandsomeobservationsonthe'inner-outer'structure,IJGUC5(1):60-70(2014).FatosXhafa,JianfengWang,XiaofengChen,JosephK.Liu,JinLi,PaulKrause,AnefficientPHRservicesystemsupportingfuzzykeywordsearchandfine-grainedaccesscontrol.SoftComput.18(9):1795-1802(2014).LiangLiu,XiaofengChen,WenjingLou:ASecureThree-PartyComputationalProtocolforTriangleArea.ACISP2014:82-97.ZheliLiu,JinLi,XiaofengChen,JunYang,ChunfuJia:TMDS:Thin-ModelDataSharingSchemeSupportingKeywordSearchinCloudStorage.ACISP2014:115-130.HaixinNie,XiaofengChen,JinLi,JosolphLiu,WenjingLou:EfficientandVerifiableAlgorithmforSecureOutsourcingofLarge-scaleLinearProgramming.AINA2014:591-596.JinLi,XiaofengChen,FatosXhafa,LeonardBarolli:SecureDeduplicationStorageSystemswithKeywordSearch.AINA2014:971-977.TaoJiang,XiaofengChen,JinLi,JianfengMa:M-SRS:SecureandTrustworthyMobileServiceReviewSystemBasedonMobileCloudlet.ICT-EurAsia2014:612-621.ZhenyuZhang,WujunZhang,JianfengWang,XiaofengChen:AnEffectiveCloud-BasedActiveDefenseSystemagainstMaliciousCodes.ICT-EurAsia2014:690-695.TaoJiang,XiaofengChen,JinLi,DuncanS.Wong,JianfengMa,JosephK.Liu:TIMER:SecureandReliableCloudStorageagainstDataRe-outsourcing.ISPEC2014:346-358.YinghuiZhang,DongZheng,XiaofengChen,JinLi,HuiLi,ComputationallyEfficientCiphertext-PolicyAttribute-BasedEncryptionwithConstant-SizeCiphertexts.ProvSec2014:259-273.2013JinLi,XiaofengChen,JingweiLi,ChunfuJia,JianfengMa,WenjingLou,Fine-GrainedAccessControlSystembasedonOutsourcedAttribute-basedEncryption,ESORICS2013,LNCS8134,592-609,Springer-Verlag,2013.QiangTangandXiaofengChen,TowardsAsymmetricSearchableEncryptionwithMessageRecoveryandFlexibleSearchAuthorization,ASIACCS,253-264,2013.YinghuiZhang,XiaofengChen,JinLi,DuncanS.WongandHuiLi,AnonymousAttribute-BasedEncryptionSupportingEfficientDecryptionTest,ASIACCS,511-516,2013.JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,EfficientVerifiableFuzzyKeywordSearchOverEncryptedDatainCloudComputing,ComputerSciencesandInformationSystems,Vol.10,No.2,667-684,2013.JinLi,XiaofengChen,EfficientMulti-userKeywordSearchOverEncryptedDatainCloudComputing,ComputingandInformatics,32(4),723-738,2013.HaiboTian,FangguoZhang,XiaofengChen,andBaodianWei,Selectivelyunforgeablebutexistentiallyforgeablesignatureschemesandapplications,ScienceinChina:InformationSciences,Vol.56,No.1,107-200,2013.XingxingXie,HuaMa,JinLi,XiaofengChen,AnEfficientCiphertext-PolicyAttribute-BasedAccessControltowardsRevocationinCloudComputing,J.UCS19(16):2349-2367,2013.HaiboTian,XiaofengChen,FangguoZhang,andBaodianWei,ZhengtaoJiang,YiLiu,Anon-delegatablestrongdesignatedverifiersignatureinID-basedsettingformobileenvironment,MathematicalandComputerModelling,58(5-6),1289-1300,2013.FeiYan,XiaofengChen,YinghuiZhang,EfficientOn-line/Off-lineSigncrypitonWithoutKeyExposure,InternationalJournalofGridandUtilityComputing,4(1),85-93,2013.JinLi,XiaoTan,XiaofengChen,DuncanS.Wong,AnEfficientProofofRetrievabilitywithPublicAuditinginCloudComputing,INCoS2013:93-98YinghuiZhang,XiaofengChen,JinLi,HuiLi,FenghuaLi,FDR-ABE:Attribute-BasedEncryptionwithFlexibleandDirectRevocation,INCoS2013:38-45HuiZhu,SiyuChen,LexiangZhu,HuiLi,XiaofengChen,RangeTree:AFeatureSelectionAlgorithmforC4.5DecisionTree,INCoS2013:17-22HuiZhu,YingfangXue,YunZhang,XiaofengChen,HuiLi,XimengLiu,V-MLR:AMultilevelSecurityModelforVirtualization,INCoS2013:9-16ZheliLiu,JinLi,XiaofengChen,JingweiLi,ChunfuJia,NewPrivacy-PreservingLocationSharingSystemforMobileOnlineSocialNetworks,3PGCIC2013:214-218JinLi,DongqingXie,XiaofengChen,Server-AidedHierarchicalIdentity-BasedEncryption,EIDWT2013:643-647XingxingXie,HuaMa,JinLi,XiaofengChen,NewCiphertext-PolicyAttribute-BasedAccessControlwithEfficientRevocation,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,373–382,2013.YinghuiZhang,XiaofengChen,HuiLi,Key-EvolvingHierarchicalID-BasedSigncryption,TheComputerJournal,56(10),1228-1248,2013.HaiboTian,XiaofengChen,BaodianWei,YiLiu,SecurityAnalysisofaSuiteofDeniableAuthenticationProtocols,I.J.NetworkSecurity15(5):384-389(2013)YanshengFeng,HuaMa,XiaofengChen,HuiZhu,SecureandVerifiableOutsourcingofSequenceComparisons,AsianConferenceonAvailability,ReliabilityandSecurity,LNCS7804,Springer,243–252,2013.2012XiaofengChen,JinLi,WillySusilo,EfficientFairConditionalPaymentsforOutsourcingComputations,IEEETransactionsonInformationForensicsandSecurity,7(6),1687-1694,2012.XiaofengChen,JinLi,JianfengMa,QiangTang,WenjingLou,NewAlgorithmsforSecureOutsourcingofModularExponentiations,ESORICS2012,LNCS7459,541–556,Springer-Verlag,2012.ChunhuiWu,XiaofengChen,DongyangLong,EfficientID-basedNon-MalleableTrapdoorCommitment,ComputersandElectricalEngineering,38(6),1647-1657,2012.YuanjieZhao,XiaofengChen,HuaMa,QiangTang,HuiZhu,ANewTrapdoor-indistinguishablePublicKeyEncryptionwithKeywordSearch,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,3(1/2),72-81,2012.JianfengWang,XiaofengChen,HuaMa,QiangTang,JinLi,HuiZhu,AVerifiableFuzzyKeywordSearchOverEncryptedData,JournalofInternetServicesandInformationSecurity,2(1/2),49-58,2012.JianfengWang,HuaMa,QiangTang,JinLi,HuiZhu,SiqiMa,andXiaofengChen,ANewEfficientVerifiableFuzzyKeywordSearchScheme,JournalofWirelessMobileNetworks,UbiquitousComputing,andDependableApplications,4(3),61-71,2012.HaiboTian,XiaofengChenandJinLi,AShortNon-delegatableStrongDesignatedVerifierSignature,ACISP2012,LNCS7372,247-260,Springer-Verlag,2012.HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ZhengtaoJiang,YiLiu,AnEfficientIdentity-BasedStrongDesignatedVerifierSignaturewithoutDelegatability,IMIS2012,88-88,IEEE,2012.JinLi,FangguoZhang,XiaofengChen,KwangjoKim,DuncanS.Wong,Genericsecurity-amplifyingmethodsofordinarydigitalsignatures,InformationSciences,Elsevier,Vol.201,128-139,2012.JingweiLi,JinLi,XiaofengChen,ChunfuJiaandZheliLiu,EfficientKeywordSearchoverEncryptedDatawithFine-GrainedAccessControlinHybridCloud,NSS2012,LNCS7645,Springer,490-502,2012.JingweiLi,ChunfuJia,JinLi,andXiaofengChen,OutsourcingEncryptionofAttribute-basedEncryptionwithMapReduce,The14thInterenationConferenceonInformationSecurity,LNCS7618,Springer,191–201,2012.QiHan,YinghuiZhang,XiaofengChen,HuiLi,andJiaxiangQuan,EfficientandRobustIdentity-BasedHandoffAuthenticationinWirelessNetworks,NSS2012,LNCS7645,Springer,180–191,2012.YinghuiZhang,XiaofengChen,HuiLi,andJinCao,SecureandEfficientIdentity-BasedHandoffAuthenticationSchemes,SecurityandCommunicationNetworks,5(10),1121-1130,JohnWiley&Sons,2012.2011XiaofengChen,WillySusilo,FangguoZhang,HaiboTian,JinLi,Identity-BasedTrapdoorMercurialCommitmentandApplications,TheoreticalComputerScience,412(39),5498-5512,2011.XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,KwangjoKim,DiscreteLogarithmBasedChameleonHashingandSignaturesWithoutKeyExposure,ComputersandElectricalEngineering,37(4),614-623,2011.XiaofengChen,QianhongWu,FangguoZhang,HaiboTian,BaodianWei,ByoungcheonLee,HyunrokLee,KwangjoKim:Newreceipt-freevotingschemeusingdouble-trapdoorcommitment,InformationSciences,Elsevier,181(8),1493-1502,2011.JinLi,QiongHuang,XiaofengChenandShermanS.Chow,Multi-AuthorityCiphertext-PolicyAttribute-BasedEncryptionwithAccountability,ASIACCS2011,386-390,2011.HaiboTian,XiaofengChen,ZhengtaoJiang.Non-interactiveDeniableAuthenticationProtocols,acceptedby7thChinaInternationalConferenceonInformationSecurityandCryptology(InsCrypt2011),LNCS7537,Springer,142-159,2011.HaiboTian,XiaofengChen,ZhengtaoJiang,YusongDu.Non-delegatableStrongDesignatedVerifierSignatureonEllipticCurves,acceptedby14thAnnualInternationalConferenceonInformationSecurityandCryptology(ICISC2011),Springer,LNCS7259,219–234,2012.YangZhan,XiaofengChen,HaiboTian,YuminWang,Identity-basedKey-exposureFreeChameleonHashingBasedontheRSAAssumption,JournalofComputationalInformationSystems,7(2),350-358,2011.YudingLiu,HangLi,andXiaofengChen,Identity-BasedTrapdoorMercurialCommitmentundertheRSAAssumption,Chinacrypt2011,206-214,2011.2010XiaofengChen,FangguoZhang,WillySusilo,HaiboTian,JinLi,KwangjoKim,Identity-BasedChameleonHashSchemeWithoutKeyExposure,15thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2010),LNCS6168,Springer,200-215,2010.XiaofengChen,FangguoZhang,HaiboTian,QianhongWu,YiMu,KwangjoKim,Three-roundAbuse-freeOptimisticContractSigningWithEverlastingSecrecy,14thFinancialCryptographyandDataSecurity(FC2010),LNCS6052,Springer,304-311,2010.BaodianWei,FangguoZhang,andXiaofengChen,EfficientOnline/OfflineSigncryptionScheme,IntelligentAutomationandSoftComputing,16(3),449-459,2010.XiaofengChen,HaiboTian,FangguoZhang,YongDing,CommentsandImprovementsonKey-exposureFreeChameleonHashingBasedonFactoring,Inscrypt2010,LNCS6584,Springer,415-426,2010.JinLi,GansenZhao,XiaofengChen,DongqingXie,ChunmingRong,WenjunLi,LianzhangTang,Fine-GrainedDataAccessControlSystemswithUserAccountabilityinCloudComputing,IEEESecondInternationalConferenceonCloudComputingTechnologyandScience(CloudCom),89-96,2010.2009FangguoZhang,XiaofengChen,CryptanalysisandImprovementofanID-basedAd-hocAnonymousIdentificationSchemeatCT-RSA05,InformationProcessingLetters,109(15),846-849,2009.XiaofengChen,GuominChen,FangguoZhang,BaodianWei,andYiMu,Identity-BasedUniversalDesignatedVerifierSignatureProof,InternationalJournalofNetworkSecurity,8(1),52–58,2009.JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,TheRingAuthenticatedEncryption:Howtoprovideacluewisely,InformationSciences,179(1-2),161-168,2009.ChunhuiWu,XiaofengChen,ANewEfficientOn-line/Off-lineThresholdSignatureScheme,ChineseJournalofElectronics,18(2),321-324,2009.BaodianWei,FangguoZhang,XiaofengChen,HaiboTian,SomePropertiesofAlgebraicStructuresofRSA-likeSystems,WorldCongressonSoftwareEngineering,440-445,IEEEComputerSociety,2009.HaiboTian,XiaofengChen,andYongDing,AnalysisofTwoTypesDeniableAuthenticationProtocols,InternationalJournalofNetworkSecurity,9(3),242–246,2009.FangguoZhang,XingwenZhaoandXiaofengChen,ID-BasedAdaptiveObliviousTransfer,The10thInternationalWorkshoponInformationSecurityApplications(WISA2009),LNCS5932,133-147,2009.ChunhuiWu,XiaofengChen,DongyangLong,YiMu,andWillySusilo,ANewSecureDigital-CopyrightedContentDistributionScheme,JournalofComputationalInformationSystems,4(5),2343-2349,2009.张方国,陈晓峰,基于身份的密码体制的研究综述,中国密码发展报告,1-31,2009。陈国敏,陈晓峰,一个安全的广义指定验证者签名证明系统,《电子与信息学报》,31(2),489-492,2009。2008XiaofengChen,FangguoZhang,HaiboTian,BaodianWei,WillySusilo,YiMu,HyunrokLee,KwangjoKim,Efficientgenericon-line/off-line(threshold)signatureswithoutkeyexposure,InformationSciences,178(21),4192-4203,2008.ChunhuiWu,YuqingXing,XiaofengChen,DongyangLong,HyunrokLee,andKwangjoKim,GenericOn-line/Off-lineAggregateSignatures,ICESS08,107-112,IEEEComputerSocietyPress,2008.GuominChen,ChunhuiWu,WeiHan,XiaofengChen,HyunrokLee,andKwangjoKim,ANewReceipt-FreeVotingSchemeBasedonLinkableRingSignatureforDesignatedVerifiers,ICESS08,18-23,IEEEComputerSocietyPress,2008.FangguoZhang,XiaofengChen,YiMu,andWillySusilo,ANewandEfficientSignatureonCommitmentValues,InternationalJournalofNetworkSecurity,7(1),101-106,2008.BaodianWei,FangguoZhang,XiaofengChen,RingProxySignatures,JournalofElectronics,25(1),108-114,2008.BaodianWei,FangguoZhangandXiaofengChen,ANewTypeofDesignatedConfirmerSignaturesforaGroupofIndividuals,InternationalJournalofNetworkSecurity,7(2),293-300,2008.ShengliLiu,XiaofengChen,andFangguoZhang,OntheForgeabilityofWang-Tang-Li'sID-BasedRestrictivePartiallyBlindSignatureScheme,JournalofComputerScienceandTechnology,23(2),265-269,2008.FangguoZhang,XiaofengChen,andBaodianWei,EfficientDesignatedConfirmerSignaturefromBilinearPairings,AsiaCCS,363-368,2008.HaiboTian,XiaofengChen,FangguoZhang,BaodianWei,ADeniableAuthentationKeyAgreementProtocol,Chinacrypt,406-415,2008.WeiHan,TaoHao,DongZheng,KefeiChen,andXiaofengChen,ATamper-EvidentVotingMachineResistanttoCovertChannels,ProvSecConference,LNCS5324,335–344,Springer-Verlag,2008.2007XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignaturesandApplications,TheJournalofSystemsandSoftware,80(2),164–171,2007.XiaofengChen,FangguoZhang,WillySusiloandYiMuEfficientGenericOn-line/Off-lineSignaturesWithoutKeyExposure,AppliedCryptographyandNetworkSecurity07,LNCS4521,18-30,Springer-Verlag,2007.XiaofengChen,QianhongWu,FangguoZhang,BaodianWei,ByoungcheonLee,HyunrokLeeandKwangjoKim,NewReceipt-freeVotingSchemeUsingDouble-trapdoorCommitment,The8thInternationalWorkshoponInformationSecurityApplications,395-409,2007.BaodianWei,XiaofengChen,FangguoZhang,andJiaLiu,TwoNewID-BasedProxyRingSignatureSchemes,JournalofComputationalInformationSystems,3(1),81-88,2007.BaodianWei,FangguoZhang,XiaofengChen,ID-basedRingProxySignatures,InternationalSymposiumonInformationTheory07,1031-1035,IEEEComputerSociety,2007.BaodianWei,FangguoZhang,XiaofengChen,Society-orientedDesignatedConfirmerSignatures,InternationalConferenceonNaturalComputation07,VolV,707-712,IEEEComputerSociety,2007.ChunhuiWu,XiaofengChen,FangguoZhang,HyunrokLee,andKwangjoKim,RemarksonReceipt-freeAuction/VotingSchemesUsingCommitment,Chinacrypt07,272-282,SciencePress,2007.JinLi,KwangjoKim,FangguoZhangandXiaofengChen,AggregateProxySignatureandVerifiablyEncryptedProxySignature,InternationalConferenceonProvableSecurity07,LNCS4784,208-217,Springer-Verlag,2007.2006XiaofengChen,FangguoZhang,ID-basedgroup-orientedsignaturesfrompairings,ChineseJournalofElectronics,15(1),12-16,2006.XiaofengChen,FangguoZhang,andKwangjoKim,ANewID-BasedGroupSignatureSchemefromBilinearPairings,JournalofElectronics,23(6),892-900,2006.XiaofengChen,FangguoZhang,YiMu,andWillySusilo,EfficientProvablySecureRestrictivePartiallyBlindSignaturesfromBilinearPairings,FinancialCryptographyandDataSecurity06,LNCS4107,251-265,Springer-Verlag,2006.Fangguozhang,XiaofengChen,WillySusiloandYiMu,ANewSignatureSchemeWithoutRandomOraclesfromBilinearPairings,VietCrypt2006,LNCS4341,67-80,Springer-Verlag,2006.JinLi,XiaofengChen,FangguoZhang,andYanmingWang,GeneralizationoftheSelective-IDSecurityModelforHIBSProtocols,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,894-902,Springer-Verlag,2007.JinLi,XiaofengChen,TszHonYuen,andYanmingWang,ProxyRingSignature:FormalDefinitions,EfficientConstructionandNewVariant,InternationalConferenceonComputationalIntelligenceandSecurity06,LNAI4456,545-555,Springer-Verlag,2007.2005QianhongWu,BoQin,ChangjieWang,XiaofengChenandYuminWang,t-Out-of-nString/BitObliviousTransfers:Revisited,InformationSecurityPracticeandExperienceConference2005,LNCS3439,410–421,Springer-Verlag,2005.FangguoZhangandXiaofengChen,CryptanalysisofHuang–Changpartiallyblindsignaturescheme,TheJournalofSystemsandSoftware,76(3),323-325,2005.FangguoZhang,XiaofengChenandBaodianWei,CryptanalysisonTwoBlindSignatureSchemes,CCICS’05,116-123,Xi’an,China,SciencePress,2005XiaofengChen,FangguoZhang,andBaodianWei,Commentonthepublickeysubstitutionattacks,InternationalJournalofNetworkSecurity,1(3),168-172,2005FangguoZhang,WillySusilo,YiMu,andXiaofengChen,Identity-basedUniversalDesignatedVerifierSignatures,TheFirstInternationalWorkshoponSecurityinUbiquitousComputingSystems(SecUbiq2005),LNCS3823,825–834,Springer-Verlag,2005.XinyiHuang,YiMu,WillySusilo,FangguoZhangandXiaofengChen,AShortProxySignatureScheme:EfficientAuthenticationintheUbiquitousWorld,The2ndinternationalSymposiumonUbiquitousIntelligenceandSmartWorlds(UISW2005),LNCS3823,480–489,Springer-Verlag,2005.XiaofengChen,FangguoZhang,andShengliLiu,ID-basedRestrictivePartiallyBlindSignatures,InternationalConferenceonComputationalIntelligenceandSecurity,PartII,LNAI3802,117-124,Springer-Verlag,2005.2004XiaofengChen,FangguoZhangandKwangjoKim,LimitedverifiersignaturefrombilinearPairings,AppliedCryptographyandNetworkSecurity04,LNCS3089,135-148,Springer-Verlag,2004.XiaofengChen,FangguoZhangandKwangjoKim,ChameleonHashingwithoutKeyExposure,InformationSecurityConference04,LNCS3225,135-148,Springer-Verlag,2004.XiaofengChen,FangguoZhangandKwangjoKim,NewID-basedthresholdsignatureschemefrombilinearpairings,Indocrypt04,LNCS3348,371-383,Springer-Verlag,2004.XiaofengChenandFangguoZhang,ANovelID-basedSignatureSchemefromBilinearPairings,InternationalConferenceonComputerCommunications04,551-555,Beijing,2004.XiaofengChen,FangguoZhangandYuminWang,ANewApproachtoPreventBlackmailinginE-Cash,Chinacrypt’04,272-282,Wuxi,SciencePress,2004QianhongWu,ChangjieWang,XiaofengChenandYuminWang,PubliclyVerifiableAuctionswithMinimalLeakage,28thAnnualInternationalComputerSoftwareandApplicationsConference,384-389,Hongkong,IEEEComputerSocietyPress,2004QianhongWu,XiaofengChen,ChangjieWangandYuminWang,Shared-keySignatureandItsApplicationtoAnonymousAuthenticationinAdHocGroup,InformationSecurityConference04,LNCS3225,330-341,Springer-Verlag,2004.FangguoZhangandXiaofengChen,AttackonanID-basedAuthenticatedGroupKeyAgreementSchemefromPKC2004,InformationProcessingLetters.91(4),191-193,2004.JiqiangLv,KuiRen,XiaofengChenandKwangjoKim,RingAuthenticatedEncryption:ANewTypeofAuthenticatedEncryption,SCIS04,1179-1184,Sendi,Japan,2004.PingWang,XiaofengChenandKwangjoKim,OntheSecurityofZhang-Wu-Wang'sForward-SecureGroupSignatureSchemeinICICS'03,CISC2004,Korea.陈晓峰,王继林,王育民,无强迫的最优合同签署方案,《电子学报》,32(3),404-407,2004。陈晓峰,王继林,王育民,基于广义XTR体制的签名方案,《电子与信息学报》,26(4),562-567,2004。陈晓峰,王育民,公钥密码体制研究及进展,《通信学报》,25(8),146-155,2004。2003XiaofengChen,ByoungcheonLeeandKwangjoKim,Receipt-freeelectronicauctionschemesusinghomomorphicencryption,ICISC’03,LNCS2971,259-273,Springer-Verlag,2003.XiaofengChen,FeiFengandYuminWang,NewkeyimprovementsanditsapplicationforXTRsystem,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,561-564,2003.Chenxiaofeng,Wangjilin,Wangyumin,FairElectronicCashBasedonFingerprinting,Chinese3rdinformationandcommunicationsecurityconference,Wuhan,SciencePress,2003.WangChangjie,ChenXiaofengandWangYumin,AnAgent-basedMultiroundsOnlineAuctionProtocolwithSealedBids,TheInternationalConferenceonAdvancedInformationNetworkingandApplications,Xi’an,IEEEComputerSocietyPress,194-197,2003.JianhongZhang,XiaofengChenandYuminWang,Securityanalysisoftheimprovedgroupsignature,Proceedingof2003IEEEInformationTheoryWorkshop,171-174,France,2003.YanXie,FangguoZhang,XiaofengChenandKwangjoKim,ID-basedDistributed`MagicInk'Signature,ICICS'03,LNCS2836,249-259,Springer-Verlag,2003.陈晓峰,王育民,张文鹏,一个类似于Dedekind和的四次均值公式,《西北大学学报》,33(2),129-132,2003。陈晓峰,王育民,电子拍卖研究现状与进展,《通信学报》,23(12),73-81,2003。陈晓峰,高虎明,王育民,基于XTR体制的盲签名方案,《电子与信息学报》,25(6),851-854,2003。陈晓峰,王育民,基于匿名通讯信道的安全电子投票方案,《电子学报》,31(3),390-393,2003。陈晓峰,王继林,王育民,基于不完全信任模型的无收据的电子投票,《计算机学报》,26(5),557-561,2003。陈晓峰,伍前红,王育民,基于多方安全计算的密钥协商,《西安电子科技大学学报》 相关热点
最新收录
- 武藤彩香(武藤あやか Ay 06-20
- 袁嘉敏 06-20
- 黄子佼 06-19
- 黄子佼 06-19
- 唐家三少 06-19
- 广末凉子 06-19
- 広末凉子(广末凉子 , Ryo 06-19
- 简恺乐(蝴蝶姐姐) 06-19
- 周扬青 06-19
- 东条夏( 東條なつ Tojo Na 06-17