Welcome to Dr. Xiaofeng Chen's Homepage

 

Dr. Xiaofeng Chen
Professor
School of Telecommunications Enginnering, Xidian University
Email: xfchen@xidian.edu.cn; chenerry@gmail.com

Phone: 86-29-88204749 (O)

 

Education and working background:

  • 5/2009ㄜCurrent   Professor (2011.7), Xidian University
  • 5/2004ㄜ5/2009   Associate Professor (2005.1), Sun Yat-sen University
  • 4/2003ㄜ4/2004   Research as a Post-doctor in ICU, Korea
  • 3/2000ㄜ3/2003   Ph.D in Cryptography in Xidian University, P.R. China
  • 3/1998ㄜ12/1999   M.Sc of Mathematics in Northwest University, P.R. China
  • 9/1994ㄜ12/1997   B.Sc in Mathematics in Northwest University, P.R. China

Selected Papers:

New!
  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jianfeng Ma, Wenjing Lou, New Publicly Verifiable Databases with Efficient Updates, IEEE Transactions on Dependable and Secure Computing, accepted.
  • Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang, Efficient Algorithms for Secure Outsourcing of Bilinear Pairings, Theoretical Computer Science, accepted.
  • Xiaofeng Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations. IEEE Transactions on Information and Forensics Security, 10(1), 69-78, 2015.
  • Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li, Yang Xiang, Duncan Wong. Secure Outsourced Attribute-based Signatures, IEEE Transactions on Parallel and Distributed Systems, 25(12): 3285-3294, 2014.
  • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou, Verifiable Computation over Large Database with Incremental Updates, ESORICS 2014, LNCS 8712, 148每162, Springer-Verlag, 2014.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, IEEE Transactions on Parallel and Distributed Systems, 25(9), 2386-2396, 2014.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim, Identity-based chameleon hashing and signatures without key exposure, Information Sciences, 265: 198-210, 2014.
  • Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak, Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks, IEEE Transactions on Parallel and Distributed Systems, 25(2), 332-342, 2014.
  • Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou, Fine-Grained Access Control System based on Outsourced Attribute-based Encryption, ESORICS 2013, LNCS 8134, 592-609, Springer-Verlag, 2013.
  • Xiaofeng Chen, Jin Li, Willy Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6), pp 1687-1694, 2012.
  • Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou, New Algorithms for Secure Outsourcing of Modular Exponentiations, ESORICS 2012, LNCS 7459, 541每556, Springer-Verlag, 2012.
  • Xiaofeng Chen, Willy Susilo, Fangguo Zhang, Haibo Tian, Jin Li, Identity-Based Trapdoor Mercurial Commitment and Applications, Theoretical Computer Science, 412(39)ㄛ5498-5512, 2011.
  • Xiaofeng Chen, Fangguo  Zhang, Haibo  Tian, Baodian  Wei, Kwangjo  Kim, Discrete Logarithm Based Chameleon Hashing and Signatures Without Key Exposure, Computers and Electrical Engineering,37(4), 614-623, 2011.
  • Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, Kwangjo Kim: New receipt-free voting scheme using double-trapdoor commitment, Information Sciences, Elsevier, 181(8), 1493-1502, 2011.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo KimㄛIdentity-Based Chameleon Hash Scheme Without Key Exposure, 15th Australasian Conference on Information Security and Privacy (ACISP 2010), LNCS 6168, Springer, 200-215, 2010.
  • Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong Wu, Yi Mu, Kwangjo KimㄛThree-round Abuse-free Optimistic Contract Signing With Everlasting SecrecyFinancial Cryptography and Data Security (FC 2010)ㄛLNCS 6052, Springer, 304每311, 2010.
  • Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim, Efficient Generic On-line/Off-line (Threshold) Signatures Without Key Exposure, Information Sciences, 178(21) 4192每4203, 2008.
  • Xiaofeng Chen, Fangguo Zhang, and Shengli Liu, ID-based Restrictive Partially Blind Signatures and Applications, The Journal of Systems and Software, 80(2), 164每171, 2007.
  • Xiaofeng Chen, Fangguo Zhang, Willy Susilo and Yi Mu, Efficient Generic On-line/Off-line Signatures Without Key Exposure, Applied Cryptography and Network Security 07, LNCS 4521, 18-30, Springer-Verlag, 2007.
  • Xiaofeng Chen, Fangguo Zhang, Yi Mu, and Willy Susilo, Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings, Financial Cryptography and Data Security 06, LNCS 4107, 251-265, Springer-Verlag,2006.
  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim, Limited verifier signature from bilinear Pairings, Applied Cryptography and Network Security 04, LNCS 3089, 135-148, Springer-Verlag, 2004.
  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim, Chameleon Hashing without Key Exposure, Information Security Conference 04, LNCS 3225, 135-148, Springer-Verlag, 2004.
  • Xiaofeng Chen, Fangguo Zhang and Kwangjo Kim, New ID-based threshold signature scheme from bilinear pairings, Indocrypt04, LNCS 3348, 371-383, Springer-Verlag, 2004.

Professoinal Activities:

PC members:
  • The 7th International Conference on Provable Security (ProvSec 2013)
  • Asian Conference on Availability, Reliability and Security(AsiaARES 2013)
  • The 6th International Conference on Network and System Security (NSS 2012)
  • The 4th International Workshop on Managing Insider Security Threats (MIST 2012)
  • The Third International Workshop on Heterogeneous Networking Environments and Technologies (HETNET'2012)
  • The 6th International Symposium on Digital Forensics and Information Security (DFIS-12)
  • The 15th Information Security Conference (ISC 2012)
  • The 6th International Conference on Provable Security (ProvSec 2012)
  • The Thirteenth International Conference on Information and Communication Security (ICICS 2011)
  • The 14th Information Security Conference (ISC 2011)
  • The 5th International Conference on Innovative Mobile and Intelligent Services in Ubiquitous ComputingㄗIMIS-11ㄘ
  • The 6th International Symposium on Wireless sensor network Technologies and Applications for Smart Space (WTA 2010)
  • The 4th International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous ComputingㄗIMIS-10ㄘ
  • The Second International Workshop on Multimedia, Information Privacy and Intelligent Computing Systems (MPIS-2009)
  • The 3rd International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous ComputingㄗIMIS-09ㄘ
  • The 4th International Conference on Frontier of Computer Science and technology (FCST 2009)
  • The 2nd International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous ComputingㄗIMIS-08ㄘ
  • The 3rd International Symposium on Smart Home (SH-08)
  • The 2nd International Workshop on Service, Security and its Data management for Ubiquitous Computing (SSDU-08)
  • The 1st International Workshop on Interactive Multimedia & Intelligent Services in Mobile and Ubiquitous ComputingㄗIMIS-07ㄘ
  • The 2007 International Workshop on Service, Security and its Data management for Ubiquitous Computing (SSDU-07)
  • The 2nd International Symposium on Smart Home (SH-07)
  • The 2007 International Conference on Intelligent Pervasive Computing (IPC-07)
  • The Second International Workshop on Security in Ubiquitous Computing Systems (SecUbiq-06)

Program Co-Chair:

General Co-Chair:

Publicity Chair:

  • The Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2013)
  • The FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-11)
  • International Conference on Provable Security (ProvSec 2009) .
  • The FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09)

Journal Editorship:

Project:

  • National Natural Science Foundation of China: Research on Special Digital Signatures With Privacy Preserving
  • National Natural Science Foundation of China: Research on Trapdoor Commitment Schemes and Applications
  • National Natural Science Foundation of China: Research on Key Cryptographic Techniques for Secure Data in Cloud Computing
  • Program for New Century Excellent Talents in University of Ministry of Education of China

  • Doctoral Fund of Ministry of Education of China
  • National Natural Science Foundation of China (NSFC-KOSEF Joint Research Project): Design of Secure Voting Schemes
  • Program of the Science and Technology of Guangzhou, China (No. 2008J1-C231-2)
  • Hundred of Talents Project, Sun Yan-sen University

Courses:

  • Communications Network Security (2015-2011)
  • Advance in Cryptography (Graduated, Seminar) (2015-2010)
  • Communications Network Security (2009)
  • Abstract Algebra (2008)
  • Discrete Mathematics; Security in Electronic Commerce; Combinational Mathematics and Number Theory (2007)
  • Linear Algebra; Electronic Commerce; Provable Secuirty in PKC (Graduated) (2006)
  • Electronic commerce; Financial Cryptography (Graduated) (2005)
  • Modern Cryptography (2004)


Last updated: 2nd Dec, 2014