欧美av在线

English Version

English Version

Prof. Qi Xie

来源 : 欧美av在线      作者 : 学院     浏览量:419     时间 : 2022-01-07


谢琪

Prof. Qi Xie


Prof. Qi Xie

School of Mathematics

Hangzhou Normal University
No.2318 Yuhangtang Road, Hangzhou 311121 Zhejiang P R China .

E-mail:qixie68@126.com; qixie@zaixianomav.com

Phone:+86-571-28869619Qi Xie, Director of Key Laboratory of Cryptography of Zhejiang Province, Dean of School of Mathematics. His research area is Applied Cryptography, including digital signatures, authentication and key agreement protocols, security in IoT (e.g. VANETS and smart healthcare) etc. He is a World's Top 2% Scientists (2021-2024) and has published over 100 research papers in international journals and conferences, and served as general co-chair of ISPEC2012 and ACM ASIACCS2013, and a reviewer for over 40 international journals.

Education and profession

  • 2021.7--     School of Mathematics, Hangzhou Normal University.
  • 1997.3-2021.6: School of Information Science and Engineering, Hangzhou Normal University.
  • 2012.6-2012.8: Visiting Scholar, School of Computer Science, City University of Hong Kong.
  • 2009.9-2010.9: Visiting Scholar, School of Computer Science, University of Birmingham, UK.
  • 2007.7-2010.11: Postdoctor, School of Computer Science, Zhejiang University, Hangzhou, Zhejiang, P R China..
  • 2001.3-2005.3: Ph.D., Applied Mathematics, Zhejiang University, Hangzhou, Zhejiang, P RChina. Ph.D. dissertation:“Research on some group signatures and special group signatures”. Supervised by Prof. Xiuyan Yu.
  • 1994.9-1997.3: M.S., Operations Research and Cybernetics, Shanghai University, Shanghai, P RChina.
  • 1986.9-1990.8: B.S., Department of Mathematics, Hangzhou Normal University, Hangzhou, Zhejiang, P RChina.

Selected Projects

  • 2024-2026: “Research on Data Cross-Domain Security Access Sharing and Privacy Computing Methods for Urban Digital Governance”, supported by the Hangzhou Joint Fund of the Zhejiang Provincial Natural Science Foundation of China. (No.LHZSZ24F020002).
  • 2021-2025: “Research on Key Cryptographic Technologies for the Data Security and Privacy Protection in Blockchain System Based on Chinese Commercial Cryptography Standard”, SubProject of NSFC-Key projects of joint fund for regional innovation and development, (No. U21A20466).
  • 2017-2021: “Research on new data protection cipher algorithm”, National Key R&D Program of China, (No. 2017YFB0802000) (participation).
  • 2013-2017: “Application of related mathematical problems in Cryptanalysis and design”, National Basic Research Program of China (973 Program) (No. 2013CB834205) (participation).
  • 2012-2016: “Research on authentication mechanisms with privacy protection in cloud computing”, Key Project of Natural Science Foundation of Zhejiang province (No. LZ12F02005).
  • 2011-2013: “Research on some provably secure authentication and key exchange protocols”, National Natural Science Foundation of China (No. 61070153)
  • 2008-2010: “Research on Mutual Authentication Protocols without Verification Tables”, China Postdoctoral Science Foundation funded (No. 20080440200).
  • 2008-2010: “Research on Trusted Authentication Protocols”, Natural Science Foundation of Zhejiang province (No. Y1080831).
  • 2005-2007: “Research on non-repudiation authenticated encryption group signatures for specified recipients”, Natural Science Foundation of Zhejiang province ( No.Y105067).
  • 2002-2005: “Studies and applications of some questions in the number theory related with the information security”, National Natural Science Foundation of China (No.10271037) (participation).
  • 2004-2006: “Irrational, continued fraction and pseudorandom numbers”, Natural Science Foundation of Zhejiang province (No. M103060) (participation).

Selected Papers

[1] Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6):1382-1392.

[2] Qi Xie, Zixuan Ding, Qingyun Xie, Xiao Tan, Debiao He and Wen Tang. Blockchain-based traffic accident handling protocol without third-party for VANETs, IEEE Internet of Things Journal, vol.11, no.19, pp. 31068-31079, 2024, DOI 10.1109/JIOT.2024.3414453.

[3] Qi Xie, Yuanyuan Zhao, Qingyun Xie, Xiumei Li, Debiao He, Kefei Chen. A Multi-server Authentication Protocol with Integrated Monitoring for IoMT-based Healthcare System", IEEE Internet of Things Journal, 12(2): 2265-2278, JANUARY 15, 2025, DOI: 10.1109/JIOT.2024.3469629

[4] Qingyun Xie and Qi Xie. Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System, IEEE Internet of Things Journal, 11(8): 15038 – 15042,2024. 10.1109/JIOT.2023.3334708

[5] Qi Xie, Zixuan Ding and Panpan Zheng, "Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs," in IEEE Transactions on Intelligent Transportation Systems, 24(7): 7318-7327, 2023. doi: 10.1109/TITS.2023.3253710, 2023.

[6] Ding Zixuan, Xie, Qi. Provably secure and lightweight three-factor authentication scheme for industrial medical CPS. Journal of Information Security and Applications, 792023103656, 2023. //doi.org/10.1016/j.jisa.2023.103656

[7] Qi Xie, Zixuan Ding, Wen Tang, Debiao He, Xiao Tan. Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs, IEEE Transactions on Vehicular Technology, 72(12): 15200-15212, 2023. 10.1109/TVT.2023.3289175, 2023

[8] Huige Wang; Kefei Chen; Qi Xie; Qian Meng. Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 833-844, Jan.-Feb. 2025, doi: 10.1109/TDSC.2024.3418984.

[9] Qi Xie, Zixuan Ding. Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. Scientific Reports, (2025) 15:6461, //doi.org/10.1038/s41598-025-90219-5.

[10] Bin Hu, Wen Tang, Qi Xie, A Two-factor Security Authentication Scheme for Wireless Sensor Networks in IoT Environments, Neurocomputing 500 (2022) 741–749. doi: //doi.org/10.1016/j.neucom. 2022.05.099

[11] Lidong Han, Guangwu Xu, Qi Xie. Comment on an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage, IEEE Transactions on Information Forensics and Security. 2023, 18: 3934-3935. DOI 10.1109/TIFS.2023.3271272

[12] Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie, PBIDM: Privacy-preserving blockchain-based identity management system for Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 19(2): 1524-1534 (2023). DOI: 10.1109/TII.2022.3206798, 2022.

[13] Yi Yang, Debiao He, Pandi Vijayakumar, Brij B Gupta, Qi Xie. An Efficient Identity-based Aggregate Signcryption Scheme with Blockchain for IoT-enabled Maritime Transportation System. IEEE Transactions on Green Communications and Networking, 2022, 6 (3), pp.1520-1531

[14] Qi Xie. A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012; 25(1):4754.

[15] Xie Qi. Provably secure convertible multi-authenticated encryption scheme, IET Information Security, 2012, 6( 2): 6570.

[16] Guilin Wang, Jiangshan Yu and Qi Xie. Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks, IEEE Transactions on Industrial Informatics, 9(1): 294-302 (2013).

[17] Qi Xie, Guilin Wang, Fubiao Xia and Deren Chen. Self-Certified Proxy Convertible Authenticated Encryption: Formal Definitions And A Provably Secure Scheme. Concurrency and Computation: Practice and Experience,2014, 26(5): 1038-1051.

[18] Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Information Technology And Control, 2013, Vol.42, No.3231-237.

[19] Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao and Na Dong. A practical anonymous authentication protocol for wireless roaming, Security and Communication Networks. 7(8): 1264-1273 (2014) .

[20] Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu. Robust anonymous two-factor authentication scheme for roaming service in global mobility network, Wireless Personal Communications, 2014, 74(2): 601-614.

[21] Qi Xie, Jianmin Zhao, Xiuyuan Yu. Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement Scheme. Nonlinear Dynamics, 2013, Volume 74, Issue 4, pp 1021-1027.

[22] Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong and Duncan S. Wong. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks, International Journal of Distributed Sensor Networks, vol. 2014, Article ID 325734, 7 pages, 2014.

[23] Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu. Improvement of a Uniqueness-and-Anonymity Preserving User Authentication Scheme for Connected Health Care, Journal of Medical Systems, (2014) 38:91.

[24] Qi Xie, Bin Hu, Na Dong, Duncan S. Wong. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems, PLoS ONE 9(7): e102747. doi:10.1371/journal.pone.0102747 (2014).

[25] Xie, Q., Li, K., Tan, X. et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP Journal of Wireless Commmunication and Networkings, 2021, 119 (2021).

[26] Qi Xie, Jun Zhang, Na Dong. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems, Journal of Medical Systems.2013 Apr;37(2):1-8.

[27] Qi Xie. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme, Scientia Iranica (2012) 19 (6), 18561860.

[28] Qi Xie, Zhixiong Tang, Kefei Chen. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks, Computers and Electrical Engineering, 2017(59): 218-230.

[29] Xie Qi, Hu Bin, Chen Ke-Fei, Liu Wen-Hao and Tan Xiao. Chaotic maps and biometrics based anonymous three-party authenticated key exchange protocol without using passwords. Chinese Physics B, Vol. 24, No. 11 (2015) 110505

[30] Qi Xie, Bin Hu, Ting Wu. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card. Nonlinear Dynamics, 2015, 79(4 ): 2345-2358

[31] Qi Xie, Zhixiong Tang. Biometrics based authentication scheme for session initiation protocol. SpringerPlus, (2016) 5: 1045-1058.

[32] Qi Xie, Xiao Tan, Bin Hu, Guilin Wang, Duncan S. Wong, Kefei Chen, and XiuYuan Yu. Probably Secure Anonymous Authenticated Key Agreement Protocols with Enhanced Security Models, Science, 360(6387):27-28, 2018APR 27

[33] Qi Xie, Lingfeng Hwang, Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city, Neurocomputing 347 (2019): 131-138.

[34] Qi Xie, Yanrong Lu, Xiao Tan,Zhixiong Tang, Bin Hu. Security and Efficiency Enhancement of an Anonymous Three-Party Password-Authenticated Key Agreement Using Extended Chaotic Maps. PLoS ONE, 2018, 13(10): e0203984.

[35] Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong. Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks, Wireless Personal Communications, (2017) 96:5881-5896.

[36] Xie Qi, Yu XiuYuan. Cryptanalysis of Tseng et al's authenticated encryption schemesApplied Mathematics and Computation, 2004, 158(1):1-5.

[37] Xie Qi. Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers. Applied Mathematics and Computation, 2005,168(2):776-782.

[38] Qi Xie , Zixuan Ding , and Bin Hu. A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. Security and Communication Networks, Volume 2021, Article ID 4799223, 12 pages.


联系我们

地址:浙江省杭州市余杭塘路2318号勤园23号楼 
电话:0571-28867633 邮编:311121
版权所有 © 2021 欧美av在线-cos成人视频-av欧美中文  
公安备案号:33011002011919  浙ICP备11056902号-1