陈晓峰教授
2018年10月26日 15:59  点击:

陈晓峰 博士 教授 硕/博士生导师

博士学科:网络空间安全/密码学

硕士学科:网络空间安全/信息安全 

工作单位:网络与信息安全学院

    务:副院长

 

联系方式

通信地址:西安电子科技大学91信箱

电子邮箱:xfchen@xidian.edu.cn

办公电话:88204749

办公地点:主楼I320

 

教育经历

  1994.09-2000.03:西北大学,数学系(基础数学专业,六年制本硕连读),获理学硕士学位 。

  2000.03-2003.03:西安电子科技大学,通信工程学院(密码学专业),获工学博士学位。

  2003.04-2004.04:韩国,信息与通信大学国际信息安全研究中心,博士后研究。

 

工作经历

  2004.05-2009.03 :中山大学,副教授

  2009.03-至今 :西安电子科技大学 ,教授

  2013.10-2014.01 :美国弗吉尼亚理工大学 ,访问学者

 

荣誉奖励

  网络安全优秀教师奖 (2018

  陕西省密码学专业教学团队带头人

  西安电子科技大学华山青年学者

  西安电子科技大学优秀教师(2011);师德先进个人(2016

  陕西省青年科技奖

  中国密码学会密码创新奖

  陕西省高等学校科学技术奖一等奖

  中国密码学会优秀博士学位论文指导教师 (2017

 

课程教学

  信息安全专题讨论(研究生)(2018)公钥密码学研究生(2018)应用密码学 (2018

  应用密码学 (2017);信息安全专题讨论(研究生)(2017

  离散数学 (2016);信息安全专题讨论(研究生)(2016

  编码理论新进展 (研究生)(2010- 2016

  通信网安全与保密 (2010- 2015

  抽象代数; 组合数学与数论; 公钥密码学(研究生)(2008

  离散数学(2007);电子商务安全技术;组合数学与数论(2007

  线性代数;电子商务;公钥密码体制的可证明安全性(研究生)(2006

  电子商务;金融密码学(研究生)(2005

  现代密码学(2004

 

主要研究方向

  公钥密码学、金融密码学

  云计算与云安全

  数据安全

 

研究项目

  国家自然科学基金项目“云环境中的安全外包计算技术研究”(61572382)(负责人)

  国家自然科学基金项目“云计算平台下数据安全的关键密码技术研究”(61272455)(负责人)

  国家自然科学基金项目“保护隐私性的特殊签名技术研究”(60503006)(负责人)

  国家自然科学基金项目“陷门承诺方案及其应用研究”(60970144)(负责人)

  国家自然科学基金项目国际(地区)合作与交流项目第五届可证明安全性国际会议” (61210306010)(负责人)

  国家自然科学基金项目中韩国际合作研究项目“安全电子投票方案的设计”(NSFC—KOSEF)(负责人)

  教育部博士点基金“基于属性的加密体制及其应用研究”(20130203110004)(负责人)

  陕西省自然科学基础研究计划重点项目“云环境下大数据库安全密码关键技术研究” (负责人)

  密码科学技术国家重点实验室开放课题”云计算中密码学新理论与关键技术研究”(负责人)

  中山大学985“百人计划引进人才科研启动项目 (负责人)

  广州市科技计划项目“快速短签名技术的研究” (负责人)

 

论文发表(部分):

1)     2016

  Xiaofeng Chen, XiaoFeng Wang, Xinyi Huang,Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016. ACM 2016, ISBN 978-1-4503-4233-9.

  Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates. IEEE transactions on Computers, 65(10): 3184-3195, 2016.

  Tao Jiang, Xiaofeng Chen, Jianfeng Ma,Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation. IEEE transactions on Computers, 65(8): 2363-2373, 2016.

  Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen, Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11): 4487-4495 (2016)

  Peng Chen, Jun Ye, Xiaofeng Chen, Efficient request-based comparable encryption scheme based on sliding window method. Soft Comput. 20(11): 4589-4596 (2016)

  Jun Ye, Xiaofeng Chen, Jianfeng Ma, Improved algorithm for secure outsourcing of modular exponentiations with high checkability. IJAHUC 23(3/4): 182-191 (2016)

  Baojiang Cui, Ziyue Wang, Bing Zhao, Xiaofeng Chen,Design and analysis of secure mechanisms based on tripartite credibility for RFID systems. Computer Standards & Interfaces 44: 110-116 (2016).

  Liang Liu, Xiaofeng Chen, Wenjing Lou,Secure three-party computational protocols for triangle area. Int. J. Inf. Sec. 15(1): 1-13 (2016).

  Zheli Liu, Xiaofeng Chen, Jun Yang, Chunfu Jia, Ilsun You,New order preserving encryption model for outsourced databases in cloud environments. J. Network and Computer Applications 59: 198-207 (2016).

  Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li,Efficient attribute-based data sharing in mobile clouds. Pervasive and Mobile Computing 28: 135-149 (2016).

  Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li, Anonymous attribute-based proxy re-encryption for access control in cloud computing. Security and Communication Networks 9(14): 2397-2411 (2016).

  Jianfeng Wang, Xiaofeng Chen, Efficient and Secure Storage for Outsourced Data: A Survey. Data Science and Engineering 1(3): 178-188 (2016).

  Zheli Liu, Dejiang Luo, Jin Li, Xiaofeng Chen, Chunfu Jia,N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks. Int. J. Comput. Math. 93(2): 384-400 (2016).

  Tao Jiang, Xiaofeng Chen, Qianhong Wu, Jianfeng Ma, Willy Susilo, Wenjing Lou,Towards Efficient Fully Randomized Message-Locked Encryption. ACISP (1) 2016: 361-375.

  Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li,Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524.

  Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Miroslaw Kutylowski, Multi-device Anonymous Authentication. NSS 2016: 21-36.

 

2)     2015

  Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou, New Publicly Verifiable Databases with Efficient Updates. IEEE Transactions on Dependable and Secure Computing, 12(5): 546-556, 2015.

  Xiaofeng, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security, 10(1), 69-78, 2015.

  Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang, Efficient Algorithms for Secure Outsourcing of Bilinear Pairings, Theoretical Computer Science, 562: 112-121, 2015.

  Jianfeng Wang, Xiaofeng Chen, Xinyi Huang, Ilsun You, and Yang Xiang, Verifiable Auditing for Outsourced Database in Cloud Computing, IEEE Transactions on Computers, 64(11): 3293-3303, 2015.

  Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, and Yang Xiang, Secure Distributed Deduplication Systems with Improved Reliability. IEEE Transactions on Computers, 64(12): 3569-3579, 2015.

  Jin Li, Xiao Tan, Xiaofeng Chen, Duncan Wong, Fatos Xhafa. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices. IEEE Transactions on Cloud Computing, 3(2): 195-205, 2015. 

  Jin Li, Yan Kit Li, Xiaofeng Chen, Patrick P. C. Lee, Wenjing Lou: A Hybrid Cloud Approach for Secure Authorized Deduplication, IEEE Transactions on Parallel and Distributed Systems, 26(5), 1206-1216, 2015.

  Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia and Wenjing Lou. Identity-based Encryption with Outsourced Revocation in Cloud Computing. IEEE Transactions on Computers, 64(2): 425-437, 2015.

  Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, and Joseph K. Liu, Towards secure and reliable cloud storage against data re-outsourcing, Future Generation Computer Systems, Vol. 52, 2015, pp. 86-94.

  Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou,New access control systems based on outsourced attribute-based encryption1. Journal of Computer Security, 23(6): 659-683 (2015).

  Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli,Secure deduplication storage systems supporting keyword search. J. Comput. Syst. Sci. 81(8): 1532-1541 (2015).

  Jin Li, Xiaofeng Chen, Xinyi Huang: New attribute-based authentication and its application in anonymous cloud access service. IJWGS 11(1), 125-141, 2015.

  Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen,Secure multi-server-aided data deduplication in cloud computing. Pervasive and Mobile Computing 24: 129-137 (2015).

  Hui Zhu, Yingfang Xue, Xiaofeng Chen, Qiang Li, Hui Li,V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Mobile Information Systems 2015: 841292:1-841292:9 (2015).

  Qiang Tang, Hua Ma, Xiaofeng Chen, Extend the Concept of Public Key Encryption with Delegated Search. The Computer Journal, 58(4): 724-734 (2015).

  Yansheng Feng, Hua Ma, Xiaofeng Chen, Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons. Intelligent Automation & Soft Computing, 21(1): 51-63 (2015).

  Jin Li, Zheli Liu, Xiaofeng Chen, Fatos Xhafa, Xiao Tan, Duncan S. Wong, L-EncDB: A lightweight fr[ant]amework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79: 18-26 (2015).

  Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen,Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing. Future Generation Comp. Syst. 52: 116-124 (2015).

  Jianfeng Wang, Xiaofeng Chen, Jin Li, Kamil Kluczniak, Miroslaw Kutylowski,A New Secure Data Deduplication Approach Supporting User Traceability. BWCCA 2015: 120-124.

  Jun Ye, Xiaofeng Chen, Jianfeng Ma, An Improved Algorithm for Secure Outsourcing of Modular Exponentiations. AINA Workshops 2015: 73-76

  Peng Chen, Jun Ye, Xiaofeng Chen, A New Efficient Request-Based Comparable Encryption Scheme. AINA Workshops 2015: 436-439.

  Qin Zou, Jianfeng Wang, Xiaofeng Chen,Secure Encrypted Image Search in Mobile Cloud Computing. BWCCA 2015: 572-575.

  Yujue Wang, Qianhong Wu, Bo Qin, Xiaofeng Chen, Xinyi Huang, Yunya Zhou, Group-oriented Proofs of Storage. ASIACCS 2015: 73-84.

  Baojiang Cui, Ziyue Wang, Jun Yang, Xiaofeng Chen, Design and Analysis of an Enhanced Secure Mechanism of LLRP in RFID Systems. AINA Workshops 2015: 17-21.

  Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen, Request-Based Comparable Encryption Scheme with Multiple Users. BWCCA 2015: 414-416.

  Xu Yang, Wei Wu, Joseph K. Liu, Xiaofeng Chen,Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach. ProvSec 2015: 215-226.

  Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen,Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269.

 

3)     2014

  Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular ExponentiationsIEEE Transactions on Parallel and Distributed Systems, 25(9), 2386-2396, 2014.

  Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan Wong. Secure Outsourced Attribute-based Signatures. IEEE Transactions on Parallel and Distributed Systems, 25(12): 3285-3294, 2014.

  Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim, Identity-based chameleon hashing and signatures without key exposure, Information Sciences, 265: 198-210, 2014.

  Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates, ESORICS 2014, LNCS 8712, 148–162, Springer-Verlag, 2014.

  Xiaofeng Chen, Jin Li, Jianfeng Ma, Wenjing Lou, Duncan S. Wong: New and efficient conditional e-payment systems with transferability. Future Generation Comp. Syst. 37: 252-258 (2014).

  Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak: Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distrib. Syst. 25(2): 332-342 (2014).

  Jin Li, Xiaofeng Chen, Mingqiang Li, Jingwei Li, Patrick P. C. Lee, Wenjing Lou: Secure Deduplication with Efficient and Reliable Convergent Key Management. IEEE Trans. Parallel Distrib. Syst. 25(6): 1615-1625 (2014).

  Xinyi Huang, Xiaofeng Chen, Jin Li, Yang Xiang, Li Xu: Further Observations on Smart-Card-Based Password-Authenticated Key Agreement in Distributed Systems. IEEE Trans. Parallel Distrib. Syst. 25(7): 1767-1775 (2014).

  Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang, Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distrib. Syst. 25(8): 2201-2210 (2014).

  Haibo Tian, Xiaofeng Chen, Willy Susilo: Deniability and forward secrecy of one-round authenticated key exchange. The Journal of Supercomputing 67(3): 671-690 (2014).

  Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li,Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Computer Networks 75: 192-211 (2014).

  Fatos Xhafa, Xiaofeng Chen, Xinyi Huang, Vladi Kolici,Advances in secure and intelligent data processing. Concurrency and Computation: Practice and Experience 26(5): 1021-1022 (2014).

  Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li,Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. TIIS 8(11): 4028-4049 (2014).

  Leonard Barolli, Fatos Xhafa, Xiaofeng Chen, Makoto Ikeda,Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, BWCCA 2014, Guangdong, China, November 8-10, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-4173-5.

  Li Xu, Yuan He, Xiaofeng Chen, Xinyi Huang,Ticket-based handoff authentication for wireless mesh networks. Computer Networks 73: 185-194 (2014).

  Haixin Nie, Hua Ma, Jianfeng Wang, Xiaofeng Chen,Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution. BWCCA 2014: 572-577.

  Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen,Secure Approximate Nearest Neighbor Search over Encrypted Data. BWCCA 2014: 578-583.

  Jingwei Li, Jin Li, Xiaofeng Chen, Zheli Liu, Chunfu Jia: Privacy-preserving data utilization in hybrid clouds. Future Generation Comp. Syst. 30: 98-106 (2014).

  Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan: Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurrency and Computation: Practice and Experience 26(8): 1561-1573 (2014).

  Jin Li, Xiaofeng Chen, Qiong Huang, Duncan S. Wong: Digital provenance: Enabling secure data forensics in cloud computing. Future Generation Comp. Syst. 37: 259-266 (2014).

  Yuan Chen, Xiaofeng Chen, Hui Li, More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure, IJGUC 5(1): 60-70 (2014).

  Fatos Xhafa, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Jin Li, Paul Krause, An efficient PHR service system supporting fuzzy keyword search and fine-grained access control. Soft Comput. 18(9): 1795-1802 (2014).

  Liang Liu, Xiaofeng Chen, Wenjing Lou: A Secure Three-Party Computational Protocol for Triangle Area. ACISP 2014: 82-97.

  Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia: TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ACISP 2014: 115-130.

  Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, Wenjing Lou: Efficient and Verifiable Algorithm for Secure Outsourcing of Large-scale Linear Programming. AINA 2014: 591-596.

  Jin Li, Xiaofeng Chen, Fatos Xhafa, Leonard Barolli: Secure Deduplication Storage Systems with Keyword Search. AINA 2014: 971-977.

  Tao Jiang, Xiaofeng Chen, Jin Li, Jianfeng Ma: M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet. ICT-EurAsia 2014: 612-621.

  Zhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen: An Effective Cloud-Based Active Defense System against Malicious Codes. ICT-EurAsia 2014: 690-695.

  Tao Jiang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Jianfeng Ma, Joseph K. Liu: TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. ISPEC 2014: 346-358.

  Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li,Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273.

 

4)     2013

  Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou, Fine-Grained Access Control System based on Outsourced Attribute-based Encryption, ESORICS 2013, LNCS 8134, 592-609, Springer-Verlag, 2013.

  Qiang Tang and Xiaofeng Chen, Towards Asymmetric Searchable Encryption with Message Recovery and Flexible Search Authorization, ASIACCS, 253-264, 2013.

  Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test, ASIACCS, 511-516, 2013.

  Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, and Xiaofeng Chen, Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing, Computer Sciences and Information Systems, Vol. 10, No. 2, 667-684, 2013.

  Jin Li, Xiaofeng Chen, Efficient Multi-user Keyword Search Over Encrypted Data in Cloud Computing, Computing and Informatics, 32(4), 723-738, 2013.

  Haibo Tian, Fangguo Zhang, Xiaofeng Chen, and Baodian Wei, Selectively unforgeable but existentially forgeable signature schemes and applications, Science in China : Information Sciences, Vol. 56, No. 1, 107-200, 2013.

  Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing, J. UCS 19(16): 2349-2367, 2013.

  Haibo Tian, Xiaofeng Chen, Fangguo Zhang, and Baodian Wei, Zhengtao Jiang, Yi Liu, A non-delegatable strong designated verifier signature in ID-based setting for mobile environment, Mathematical and Computer Modelling, 58(5-6), 1289-1300, 2013.

  Fei Yan, Xiaofeng Chen, Yinghui Zhang, Efficient On-line/Off-line Signcrypiton Without Key Exposure, International Journal of Grid and Utility Computing,4(1), 85-93,2013.

  Jin Li, Xiao Tan, Xiaofeng Chen, Duncan S. Wong, An Efficient Proof of Retrievability with Public Auditing in Cloud Computing, INCoS 2013: 93-98

  Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li, FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation, INCoS 2013: 38-45

  Hui Zhu, Siyu Chen, Lexiang Zhu, Hui Li, Xiaofeng Chen, RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree, INCoS 2013: 17-22

  Hui Zhu, Yingfang Xue, Yun Zhang, Xiaofeng Chen, Hui Li, Ximeng Liu, V-MLR: A Multilevel Security Model for Virtualization, INCoS 2013: 9-16

  Zheli Liu, Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, New Privacy-Preserving Location Sharing System for Mobile Online Social Networks,3PGCIC 2013: 214-218

  Jin Li, Dongqing Xie, Xiaofeng Chen, Server-Aided Hierarchical Identity-Based Encryption, EIDWT 2013: 643-647

  Xingxing Xie, Hua Ma, Jin Li, Xiaofeng Chen, New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 373–382, 2013.

  Yinghui Zhang, Xiaofeng Chen, Hui Li, Key-Evolving Hierarchical ID-Based Signcryption, The Computer Journal, 56(10), 1228-1248, 2013.

  Haibo Tian, Xiaofeng Chen, Baodian Wei, Yi Liu, Security Analysis of a Suite of Deniable Authentication Protocols, I. J. Network Security 15(5): 384-389 (2013)

  Yansheng Feng, Hua Ma, Xiaofeng Chen, Hui Zhu, Secure and Verifiable Outsourcing of Sequence Comparisons, Asian Conference on Availability, Reliability and Security, LNCS 7804, Springer, 243–252, 2013.

上一篇:
李兴华教授
下一条:
李晖教授

Baidu
map