头像

Dongxiaolei

      

About

  • Department:
  • Graduate School:
  • Degree:
  • Academic Credentials:
  • PostCode:
  • Tel: 021-62237971
  • Fax: 021-62233147
  • Email: dong-xl[at]sei.ecnu.edu.cn
  • Office: Room B1207,Science Building
  • Address: School of Computer Science and Software Engineering, East China Normal University, 3663 Zhongshan Road (North), Shanghai 200062, P. R. China

Education

WorkExperience

Resume

Other Appointments

Research Fields

Number Theory, Cryptography, Network Security

Enrollment and Training

Course

Scientific Research

Academic Achievements

 

Selected Publications (since 2011) 

 

[1] Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 28: 1145-1160, 2016.

[2] J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, to appear.

[3] J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, to appear.

[4] W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, DOI: 10.1002/sec.950.

[5] J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, DOI:10.1007/s12083-016-0449-0.

[6] J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016.

[7] Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese)

[8] Z. Cao, Q. Xu, Y. Zhang, Xiaolei Dong. Introduction: Special Issue on Research progress of cyberspace security and privacy protection. Journal of Computer Research and Development, 52(10): 2163-2166, 2015 (in Chinese).

[9] J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese).

[10] X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015.

[11] J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015.

[12] J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015.

[13] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015.

[14] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy – preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015.

[15] J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015.

[16] J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015.

[17] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015.

[18] J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015.

[19] J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015.

[20] L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014.

[21] W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014.

[22] Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese).

[23] C. Huang and Xiaolei Dong. A privacy preserving taxi hailing protocol in VANET, Journal of Natural Science of Heilongjiang University, 31(1), 6-12, 2014 (in Chinese).

[24] J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014.

[25] Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014.

[26] H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014.

[27] D. He, Z. Cao, Xiaolei Dong, and J. Shen. User Self-controllable Profile Matching for Privacy-preserving Mobile Social Networks, ICCS 2014, Macau, 19-21 Nov. 2014, IEEE, 248-252, 2014.

[28] Z. Li, Xiaolei Dong, and Z. Cao. Generalized Cipolla-Lehmer Root Computation in Finite Fields, ICINS 2014.

[29] S. Fan, Z. Cao, and Xiaolei Dong. Cryptanalysis and improvement of a smart card-based identity authentication scheme, ICINS 2014.

[30] L. Wei, Z. Cao, and Xiaolei Dong. Secure identity-based multisignature schemes under quadratic residue assumptions. Security and Communication Networks, 6(6): 689-701, 2013.

[31] J. Zhou, Z. Cao, Xiaolei Dong, X. Lin, and A. V. Vasilakos. Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12-21, 2013.

[32] H. Guo, Xiaolei Dong, and Z. Cao. Identity-based Ring Signature Scheme Constructed by Cubic Residues, Computer Engineering, 39(12), 111-117, 2013 (in Chinese).

[33] Xiaolei Dong. Research Progress on Ciphertext Access Control in Cloud Computing. INCoS 2013/EIDWT 2013, Xi’an, China, SEPTEMBER 9-11, 2013. [Invited speaker]

[34] J. Zhou, Z. Cao, and Xiaolei Dong. BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks. BODYNETS 2013, Boston, Massachusetts, United States, September 30–October 2, 2013.

[35] X. Zhang, Xiaolei Dong, J. Wu, X. Li, and N. Xiong. Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks. ICDCS 2013 Workshops, Philadelphia, PA, USA, 8-11 July, 2013.

[36] C. Qi and Xiaolei Dong. An efficient and secure spatial encryption scheme. Journal of Shanghai Jiaotong University, 46(9), 1361-1365, 2012 (in Chinese).

[37] X. Ni and Xiaolei Dong. A blind signature scheme base on cubic residues. Journal of Natural Science of Heilongjiang University, 29(5), 608-613, 2012 (in Chinese).

[38] P. Yang, Z. Cao, and Xiaolei Dong. Fuzzy identity based signature with applications to biometric authentication. Computers & Electrical Engineering, 37(4): 532-540, 2011.

[39] D. Xing, Z. Cao, and Xiaolei Dong. Identity based signature scheme based on cubic residues. SCIENCE CHINA Information Sciences, 54(10): 2001-2012, 2011.

[40] P. Yang, Z. Cao, Xiaolei Dong, and T. A. Zia. An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Communications Letters, 15(11): 1205-1207, 2011.

[41] P. Yang, Z. Cao, and Xiaolei Dong. Threshold proxy re-signature. Journal of Systems Science & Complexity, 24(4): 816-824, 2011.

[42] Xiaolei Dong, L. Wei, H. Zhu, Z. Cao, and L. Wang. An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 60(2): 580-591, 2011.

[43] J. Qain and Xiaolei Dong. Fully Secure Revocable Attribute-Based Encryption, Journal of Shanghai Jiaotong Univ. (Sci.), 16(4): 490-496, 2011.

[44] J. Luo, Xiaolei Dong, and H. Huang. A group authenticated key exchange protocol in the wireless mobile environment, Journal of Natural Science of Heilongjiang University, 28(2), 156-161, 2011 (in Chinese).

[45] Xiaolei Dong. New Researches from Number Theory to Cryptograghy, Seventh Conference on Combinatorics (7SHC), Shanghai, May 24 - 28, 2011. [Invited speaker]

[46] P. Yang, T. Zia, Z. Cao, and Xiaolei Dong. Efficient And Expressive Fully Secure Attribute-Based Signature In The Standard Model, Proceedings of 9th Australian Information Security Management Conference, Edith Cowan University, Perth Western Australia, 5th -7th December, pp. 252-261, 2011.

 

Honor

10 Visits

Related to the teacher