近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Y. Yang, Xiaolei Dong, Z. Cao, J. Shen, S. Dou: IXT: Improved searchable encryption for multi-word queries based on PSI. Frontiers Comput. Sci. 17(5): 175811 (2023)
J. Zhou, S. Chen, K.-K. R. Choo, Z. Cao, Xiaolei Dong: EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023)
H. Hu, Z. Cao, Xiaolei Dong: Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Access 10: 87322-87332 (2022)
Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, H. Bao, J. Shen: A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022)
Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, T. Liu, H. Bao, J. Shen: EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022)
Y. Guo, Z. Cao, Xiaolei Dong: Generalized Goldwasser and Micali's Type Cryptosystem. J. Comput. Sci. Technol. 37(2): 459-467 (2022)
J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022)
Y. Chen, T. Zhou, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022)
G. Wang, Z. Cao, Xiaolei Dong: Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021)
X. Zhao, Z. Cao, Xiaolei Dong, J. Shao: Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021)
Y. Guo, F. Meng, L. Cheng, Xiaolei Dong, Z. Cao: Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021)
N. Cao, Z. Cao, Xiaolei Dong, H. Wang: Improved RSA lossy trapdoor function and applications. Int. J. Inf. Comput. Secur. 14(3/4): 229-241 (2021)
L. Chen, J. Zhou, Y. Chen, Z. Cao, Xiaolei Dong, K.-K. R. Choo: PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021)
M. Lou, Xiaolei Dong, Z. Cao, J. Shen: SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Networks 2021: 8884478:1-8884478:18 (2021)
J. Zhou, K.-K. R. Choo, Z. Cao, Xiaolei Dong: PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021)
J. Ning, Z. Cao, Xiaolei Dong, K. Liang, L. Wei, K.-K. R. Choo: CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021)
J. Qian, Z. Cao, Xiaolei Dong, J. Shen, Z. Liu, Y. Ye: Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid. IEEE Trans. Smart Grid 12(3): 2625-2637 (2021)
J. Zhou, M. Zheng, Z. Cao, Xiaolei Dong: PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. Comput. Secur. 88 (2020)
J. Chen, J. Zhou, Z. Cao, A. V. Vasilakos, Xiaolei Dong, K.-K. R. Choo: Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020)
H. Shen, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020)
J. Zhou, Z. Cao, Z. Qin, Xiaolei Dong, K. Ren: LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020)
H. Wang, Xiaolei Dong, Z. Cao: Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 13(6): 1142-1151 (2020)
X. Zhao, Z. Cao, Xiaolei Dong, J. Shao, L. Wang, Z. Liu: New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424
Y. Wu, L. Yu, Z. Cao, Xiaolei Dong: Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. ASIACRYPT (1) 2020: 662-693
X. Zhao, Z. Cao, Xiaolei Dong, J. Zheng: Anonymous IBE from Quadratic Residuosity with Fast Encryption. ISC 2020: 3-19
C. Fan, Xiaolei Dong, Z. Cao, J. Shen: VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. TrustCom 2020: 285-292
H. Wang, Xiaolei Dong, Z. Cao, D. Li, N. Cao: Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62(3): 39111:1-39111:3 (2019)
G. Wang, Z. Cao, Xiaolei Dong: Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019)
N. Cao, Z. Cao, Z. Liu, Xiaolei Dong, X. Zhao: All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019)
J. Zhou, Z. Cao, Xiaolei Dong, T. Vasilakos: GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. Future Gener. Comput. Syst. 101: 70-82 (2019)
D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Appl. 47: 59-64 (2019)
H. Wang, Xiaolei Dong, Z. Cao: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1): 32-42 (2019)
J. Zhou, Y. Zhang, Z. Cao, Xiaolei Dong: PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks. ICDCS 2019: 1127-1137
D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. SCIENCE CHINA Information Sciences 61(3): 032112:1-032112:9, 2018.
S. Chen, P. Zeng, K. R. Choo, Xiaolei Dong: Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.Comput. J. 61(4): 545-560, 2018.
H. Wang, Xiaolei Dong, Z. Cao, D. Li: Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142, 2018.
H. Zhang, Z. Cao, Xiaolei Dong, J. Shen: Proof of Multicopy via Proof of File Position in Cloud. Fundam. Inform. 157(1-2): 141-151, 2018.
J. Ning, Z. Cao, Xiaolei Dong, L. Wei: White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Sec. Comput. 15(5): 883-897, 2018.
J. Ning, Z. Cao, Xiaolei Dong, K. Liang, H. Ma, L. Wei: Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Information Forensics and Security 13(1): 94-105, 2018.
M. Zheng, J. Zhou, Z. Cao, Xiaolei Dong: PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231.
Y. Liang, Z. Cao, Xiaolei Dong, J. Shen: Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392.
J. Zhou, Z. Cao, Xiaolei Dong, A. V. Vasilakos: Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine 55(1): 26-33, 2017.
X. Zhang, Xiaolei Dong, J. Wu, Z. Cao, C. Lyu: Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wireless Communications and Mobile Computing2017 (2017)
Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 28(4): 1145-1160, 2016.
J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, 59(11): 1669-1688, 2016.
D. Li, Xiaolei Dong, Z. Cao: Secure and privacy-preserving pattern matching in outsourced computing. Security and Communication Networks 9(16): 3444-3451, 2016.
J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, 59(11): 119102:1-119102:3, 2016.
W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, 9(13): 1905-1915, 2016.
J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, 9(4): 774-794, 2016.
J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016.
J. Gong, Xiaolei Dong, J. Chen, Z. Cao: Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654
J. Zhou, Z. Cao, Xiaolei Dong: PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153.
J. Ning, Z. Cao, Xiaolei Dong, J. Gong, J. Chen: Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569.
Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese)
J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese).
X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015.
J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015.
J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015.
J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015.
J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy – preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015.
J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015.
J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015.
J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015.
J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015.
J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015.
L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014.
W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014.
Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese).
J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014.
Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014.
H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014.