头像

董晓蕾

特聘教授、博士生导师

软件工程学院      

个人资料

  • 部门: 软件工程学院
  • 毕业院校:
  • 学位: 博士
  • 学历: 博士
  • 邮编: 200062
  • 联系电话: 021-62237971
  • 传真: 021-62233147
  • 电子邮箱: dong-xl@sei.ecnu.edu.cn
  • 办公地址: 理科楼B1207室
  • 通讯地址: 上海市中山北路3663号,华东师范大学软件工程学院,邮编200062

教育经历


1998.9-2001.7,哈尔滨工业大学数学系,理学博士,导师:游宏教授。


工作经历

2001.9-2003.7,上海交通大学数学系,博士后,联系导师:沈灏教授。

2003.7-2014.12,上海交通大学计算机系,担任副教授(2004)、教授、博导(2009),组建上海交通大学密码学与SEC-X实验室(2003.9-2014.9)。

2014.5-,华东师范大学软件工程学院,担任教授、博导,特聘教授,学校通识教育委员会委员、学院教学委员会委员。

个人简介


长期从事数论、密码与安全理论的研究工作,主持国家973 计划项目、国家重点研发计划项目、国家发改委信息安全标准专项项目和国家自然科学基金项目等,其中主持国家发改委信息安全标准专项项目的同时,担任12项相关标准的专家组组长,主持完成的国家自然科学基金项目“可证安全密码系统的若干理论与应用研究”获得特优完成项目。在区块链密码算法、后量子密码算法、多方密码学安全模型研究中取得重要成果。


早年在国际上最重要的数论期刊 Acta Arith. 和 J. Number Theory 等发表多篇重要论文,后来在密码学与安全领域的IEEE TIFSIEEE TDSCASIACRYPTPKCESORICSINFOCOM等国际权威期刊和会议上发表学术论文100 余篇。研究成果数论和现代密码算法云安全的关键理论与方法研究分别获得2001年度和2018年度教育部自然科学一等奖,复杂密码系统的形式化安全理论与应用信息安全协议新方法研究分别获得2008年度和2015年度教育部自然科学奖二等奖,密码学新理论和若干共性基础问题研究”获得2007年度上海市自然科学二等奖,“密码算法若干关键问题研究”获得2016年度全国党政密码科学技术二等奖。云计算安全的论文“Security and privacy for storage and computation in cloud computing”(Inf. Sci. 258: 371-386, 2014)入选中国百篇最具国际影响力的学术论文后量子密码算法的论文“Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols”(Comput. J. 61(4): 545-560, 2018)获得国际高水平期刊The Computer Journal颁发的2019Wilkes奖。担任多项国内外著名期刊的编委或特邀编委。


分别获得2009年和2014年上海交通大学优秀教师一等奖和特等奖,主编教材获得上海交通大学第十四届优秀教材特等奖。

社会兼职

国际期刊Security and Communication Networks (John Wiley)副编辑(Associate Editor )以及KSII Transactions on Internet and Information Systems编委。密码学和网络安全等方面著名国际会议的TPC member,包括:Globecom、BODYNETS、Pairing等。

研究方向

数论、密码学与网络安全

招生与培养

开授课程


主讲课程包括:

1、信息安全数学导论

2、离散数学

3、密码学选讲

4、概率论与数理统计


主编教材:

1、离散数学,机械工业出版社,2009

2、离散数学学习指导,科学出版社,2005

科研项目


近期科研项目:


1、国家重点研发计划项目,2022YFB2701400,面向区块链分布式场景的密码技术,2022-122025-11,在研,主持。

2、国家自然科学基金面上项目,62172162,高效安全的多功能可搜索加密设计与分析,2022-012025-12,在研,主持。

3、国家自然科学基金面上项目,61672239,从属性基加密到功能加密的扩展安全模型与新方法研究,2017-012020-12,已结题,主持。

4、国家自然科学基金面上项目,61373154,高效属性基密码及其拓展的研究,2014-012017-12,已结题,主持。

5、国家973计划项目,2012CB723400,基于海量数据的光电信息服务基础研究,2012-012015-12,已结题,主持(负责人)。

6、国家973计划课题,2012CB723401,云计算及云安全的基础理论研究,2012-012015-12,已结题,主持。

7、国家发展和改革委员会项目(2011年国家信息安全专项标准项目),发改办高技[2012]1424号文件,灾备标准体系建设,2012-012015-12,已结题,主持。

学术成果


国家重点研发计划项目“面向区块链分布式场景的密码技术”(项目编号:2022YFB2701400)和国家973计划项目基于海量数据的光电信息服务基础研究(项目编号:2012CB723400)及973课题云计算及云安全的基础理论研究(项目编号:2012CB723401)负责人,国家发改委信息安全标准专项项目灾备标准体系建设(发改办高技[2012]1424号)负责人。主持国家自然科学基金项目多项,其中可证安全密码系统的若干理论与应用研究(项目编号:60673079)获得国家自然科学基金委特优完成项目。数论和现代密码算法获得2001年度教育部自然科学一等奖,复杂密码系统的形式化安全理论与应用获得2008年度教育部自然科学二等奖,密码学新理论和若干共性基础问题研究获得2007年度上海市自然科学二等奖,信息安全协议新方法研究获得2015年度教育部自然科学二等奖,密码算法若干关键问题研究获得2016年度全国党政密码科学技术进步二等奖,“云安全的关键理论与方法研究”获得2018年度教育部自然科学一等奖。此外,还分别获得2009年和2014年上海交通大学优秀教师一等奖和特等奖,主编的教材获得上海交通大学第十四届优秀教材特等奖。  

 

Selected Publications (since 2014) 

  

 

【1】    Y. Yang, Xiaolei Dong, Z. Cao, J. Shen, S. Dou: IXT: Improved searchable encryption for multi-word queries based on PSI. Frontiers Comput. Sci. 17(5): 175811 (2023)

【2】    J. Zhou, S. Chen, K.-K. R. Choo, Z. Cao, Xiaolei Dong: EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023)

【3】    H. Hu, Z. Cao, Xiaolei Dong: Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Access 10: 87322-87332 (2022)

【4】    Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, H. Bao, J. Shen: A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022)

【5】    Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, T. Liu, H. Bao, J. Shen: EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022)

【6】    Y. Guo, Z. Cao, Xiaolei Dong: Generalized Goldwasser and Micali's Type Cryptosystem. J. Comput. Sci. Technol. 37(2): 459-467 (2022)

【7】    J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022)

【8】    Y. Chen, T. Zhou, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022)

【9】    G. Wang, Z. Cao, Xiaolei Dong: Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021)

【10】  X. Zhao, Z. Cao, Xiaolei Dong, J. Shao: Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021)

【11】  Y. Guo, F. Meng, L. Cheng, Xiaolei Dong, Z. Cao: Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021)

【12】  N. Cao, Z. Cao, Xiaolei Dong, H. Wang: Improved RSA lossy trapdoor function and applications. Int. J. Inf. Comput. Secur. 14(3/4): 229-241 (2021)

【13】  L. Chen, J. Zhou, Y. Chen, Z. Cao, Xiaolei Dong, K.-K. R. Choo: PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021)

【14】  M. Lou, Xiaolei Dong, Z. Cao, J. Shen: SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Networks 2021: 8884478:1-8884478:18 (2021)

【15】  J. Zhou, K.-K. R. Choo, Z. Cao, Xiaolei Dong: PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021)

【16】  J. Ning, Z. Cao, Xiaolei Dong, K. Liang, L. Wei, K.-K. R. Choo: CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021)

【17】  J. Qian, Z. Cao, Xiaolei Dong, J. Shen, Z. Liu, Y. Ye: Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid. IEEE Trans. Smart Grid 12(3): 2625-2637 (2021)

【18】  J. Zhou, M. Zheng, Z. Cao, Xiaolei Dong: PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. Comput. Secur. 88 (2020)

【19】  J. Chen, J. Zhou, Z. Cao, A. V. Vasilakos, Xiaolei Dong, K.-K. R. Choo: Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020)

【20】  H. Shen, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020)

【21】  J. Zhou, Z. Cao, Z. Qin, Xiaolei Dong, K. Ren: LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020)

【22】  H. Wang, Xiaolei Dong, Z. Cao: Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 13(6): 1142-1151 (2020)

【23】  X. Zhao, Z. Cao, Xiaolei Dong, J. Shao, L. Wang, Z. Liu: New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424

【24】  Y. Wu, L. Yu, Z. Cao, Xiaolei Dong: Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. ASIACRYPT (1) 2020: 662-693

【25】  X. Zhao, Z. Cao, Xiaolei Dong, J. Zheng: Anonymous IBE from Quadratic Residuosity with Fast Encryption. ISC 2020: 3-19

【26】  C. Fan, Xiaolei Dong, Z. Cao, J. Shen: VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. TrustCom 2020: 285-292

【27】  H. Wang, Xiaolei Dong, Z. Cao, D. Li, N. Cao: Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62(3): 39111:1-39111:3 (2019)

【28】  G. Wang, Z. Cao, Xiaolei Dong: Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019)

【29】  N. Cao, Z. Cao, Z. Liu, Xiaolei Dong, X. Zhao: All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019)

【30】  J. Zhou, Z. Cao, Xiaolei Dong, T. Vasilakos: GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. Future Gener. Comput. Syst. 101: 70-82 (2019)

【31】  D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Appl. 47: 59-64 (2019)

【32】  H. Wang, Xiaolei Dong, Z. Cao: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1): 32-42 (2019)

【33】  J. Zhou, Y. Zhang, Z. Cao, Xiaolei Dong: PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks. ICDCS 2019: 1127-1137

【34】  D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. SCIENCE CHINA Information Sciences 61(3): 032112:1-032112:9, 2018.

【35】  S. Chen, P. Zeng, K. R. Choo, Xiaolei Dong: Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.Comput. J. 61(4): 545-560, 2018.

【36】  H. Wang, Xiaolei Dong, Z. Cao, D. Li: Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142, 2018.

【37】  H. Zhang, Z. Cao, Xiaolei Dong, J. Shen: Proof of Multicopy via Proof of File Position in Cloud. Fundam. Inform. 157(1-2): 141-151, 2018.

【38】  J. Ning, Z. Cao, Xiaolei Dong, L. Wei: White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Sec. Comput. 15(5): 883-897, 2018.

【39】  J. Ning, Z. Cao, Xiaolei Dong, K. Liang, H. Ma, L. Wei: Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Information Forensics and Security 13(1): 94-105, 2018.

【40】  M. Zheng, J. Zhou, Z. Cao, Xiaolei Dong: PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231.

【41】  Y. Liang, Z. Cao, Xiaolei Dong, J. Shen: Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392.

【42】  J. Zhou, Z. Cao, Xiaolei Dong, A. V. Vasilakos: Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine 55(1): 26-33, 2017.

【43】  X. Zhang, Xiaolei Dong, J. Wu, Z. Cao, C. Lyu: Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wireless Communications and Mobile Computing2017 (2017)

【44】  Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 284: 1145-1160, 2016.

【45】  J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, 59(11): 1669-1688, 2016.

【46】  D. Li, Xiaolei Dong, Z. Cao: Secure and privacy-preserving pattern matching in outsourced computing. Security and Communication Networks 9(16): 3444-3451, 2016.

【47】  J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, 59(11): 119102:1-119102:3, 2016.

【48】  W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, 9(13): 1905-1915, 2016.

【49】  J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, 9(4): 774-794, 2016.

【50】  J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016.

【51】  J. Gong, Xiaolei Dong, J. Chen, Z. Cao: Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654

【52】  J. Zhou, Z. Cao, Xiaolei Dong: PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153.

【53】  J. Ning, Z. Cao, Xiaolei Dong, J. Gong, J. Chen: Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569.

【54】  Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese)

【55】  J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese).

【56】  X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015.

【57】  J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015.

【58】  J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015.

【59】  J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015.

【60】  J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy  preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015.

【61】  J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015.

【62】  J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015.

【63】  J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015.

【64】  J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015.

【65】  J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015.

【66】  L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014.

【67】  W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014.

【68】  Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese).

【69】  J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014.

【70】  Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014.

【71】  H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014.



荣誉及奖励

研究成果数论和现代密码算法云安全的关键理论与方法研究分别获得2001年度和2018年度教育部自然科学一等奖,复杂密码系统的形式化安全理论与应用信息安全协议新方法研究分别获得2008年度和2015年度教育部自然科学奖二等奖,密码学新理论和若干共性基础问题研究”获得2007年度上海市自然科学二等奖,“密码算法若干关键问题研究”获得2016年度全国党政密码科学技术二等奖。云计算安全的论文“Security and privacy for storage and computation in cloud computing”(Inf. Sci. 258: 371-386, 2014)入选中国百篇最具国际影响力的学术论文后量子密码算法的论文“Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols”(Comput. J. 61(4): 545-560, 2018)获得国际高水平期刊The Computer Journal颁发的2019Wilkes奖。


此外,可证安全密码系统的若干理论与应用研究(项目编号:60673079)获得国家自然科学基金委特优完成项目。还分别获得2009年和2014年上海交通大学优秀教师一等奖和特等奖,主编教材获得上海交通大学第十四届优秀教材特等奖。


10 访问

相关教师