About
EducationWorkExperienceResumeOther AppointmentsResearch FieldsNumber Theory, Cryptography, Network Security Enrollment and TrainingCourseScientific ResearchAcademic Achievements
Selected Publications (since 2011):
[1] Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 28: 1145-1160, 2016. [2] J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, to appear. [3] J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, to appear. [4] W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, DOI: 10.1002/sec.950. [5] J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, DOI:10.1007/s12083-016-0449-0. [6] J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016. [7] Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese) [8] Z. Cao, Q. Xu, Y. Zhang, Xiaolei Dong. Introduction: Special Issue on Research progress of cyberspace security and privacy protection. Journal of Computer Research and Development, 52(10): 2163-2166, 2015 (in Chinese). [9] J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese). [10] X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015. [11] J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015. [12] J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015. [13] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015. [14] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy – preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015. [15] J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015. [16] J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015. [17] J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015. [18] J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015. [19] J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015. [20] L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014. [21] W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014. [22] Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese). [23] C. Huang and Xiaolei Dong. A privacy preserving taxi hailing protocol in VANET, Journal of Natural Science of Heilongjiang University, 31(1), 6-12, 2014 (in Chinese). [24] J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014. [25] Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014. [26] H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014. [27] D. He, Z. Cao, Xiaolei Dong, and J. Shen. User Self-controllable Profile Matching for Privacy-preserving Mobile Social Networks, ICCS 2014, Macau, 19-21 Nov. 2014, IEEE, 248-252, 2014. [28] Z. Li, Xiaolei Dong, and Z. Cao. Generalized Cipolla-Lehmer Root Computation in Finite Fields, ICINS 2014. [29] S. Fan, Z. Cao, and Xiaolei Dong. Cryptanalysis and improvement of a smart card-based identity authentication scheme, ICINS 2014. [30] L. Wei, Z. Cao, and Xiaolei Dong. Secure identity-based multisignature schemes under quadratic residue assumptions. Security and Communication Networks, 6(6): 689-701, 2013. [31] J. Zhou, Z. Cao, Xiaolei Dong, X. Lin, and A. V. Vasilakos. Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12-21, 2013. [32] H. Guo, Xiaolei Dong, and Z. Cao. Identity-based Ring Signature Scheme Constructed by Cubic Residues, Computer Engineering, 39(12), 111-117, 2013 (in Chinese). [33] Xiaolei Dong. Research Progress on Ciphertext Access Control in Cloud Computing. INCoS 2013/EIDWT 2013, Xi’an, China, SEPTEMBER 9-11, 2013. [Invited speaker] [34] J. Zhou, Z. Cao, and Xiaolei Dong. BDK: Secure and Efficient Biometric based Deterministic Key Agreement in Wireless Body Area Networks. BODYNETS 2013, Boston, Massachusetts, United States, September 30–October 2, 2013. [35] X. Zhang, Xiaolei Dong, J. Wu, X. Li, and N. Xiong. Fault-Aware Flow Control and Multi-Path Routing in Wireless Sensor Networks. ICDCS 2013 Workshops, Philadelphia, PA, USA, 8-11 July, 2013. [36] C. Qi and Xiaolei Dong. An efficient and secure spatial encryption scheme. Journal of Shanghai Jiaotong University, 46(9), 1361-1365, 2012 (in Chinese). [37] X. Ni and Xiaolei Dong. A blind signature scheme base on cubic residues. Journal of Natural Science of Heilongjiang University, 29(5), 608-613, 2012 (in Chinese). [38] P. Yang, Z. Cao, and Xiaolei Dong. Fuzzy identity based signature with applications to biometric authentication. Computers & Electrical Engineering, 37(4): 532-540, 2011. [39] D. Xing, Z. Cao, and Xiaolei Dong. Identity based signature scheme based on cubic residues. SCIENCE CHINA Information Sciences, 54(10): 2001-2012, 2011. [40] P. Yang, Z. Cao, Xiaolei Dong, and T. A. Zia. An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks. IEEE Communications Letters, 15(11): 1205-1207, 2011. [41] P. Yang, Z. Cao, and Xiaolei Dong. Threshold proxy re-signature. Journal of Systems Science & Complexity, 24(4): 816-824, 2011. [42] Xiaolei Dong, L. Wei, H. Zhu, Z. Cao, and L. Wang. An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 60(2): 580-591, 2011. [43] J. Qain and Xiaolei Dong. Fully Secure Revocable Attribute-Based Encryption, Journal of Shanghai Jiaotong Univ. (Sci.), 16(4): 490-496, 2011. [44] J. Luo, Xiaolei Dong, and H. Huang. A group authenticated key exchange protocol in the wireless mobile environment, Journal of Natural Science of Heilongjiang University, 28(2), 156-161, 2011 (in Chinese). [45] Xiaolei Dong. New Researches from Number Theory to Cryptograghy, Seventh Conference on Combinatorics (7SHC), Shanghai, May 24 - 28, 2011. [Invited speaker] [46] P. Yang, T. Zia, Z. Cao, and Xiaolei Dong. Efficient And Expressive Fully Secure Attribute-Based Signature In The Standard Model, Proceedings of 9th Australian Information Security Management Conference, Edith Cowan University, Perth Western Australia, 5th -7th December, pp. 252-261, 2011.
Honor |