主要成果: | 目前主持国家自然科学基金项目“云计算环境下属性基密码及其应用研究”(61672207),国家自然科学基金项目“可证明安全的基于证书密码体制及其拓展研究”(61272542),江苏省自然科学基金项目“抗泄漏的公钥密码算法研究”(BK20161511),中央高校基本科研业务费重点培育专项“云计算环境下公钥密码关键技术研究” (2016B10114),中美计算机科学研究中心开放课题“公钥密码及其在云计算中的应用研究”(KJR16039)。主持完成江苏省“六大人才高峰”第六批高层次人才项目“新型公钥密码体制研究”(2009182),中国博士后基金“可证明安全的基于证书签名体制研究”(20100471373),河海大学中央高校基本科研项目“可证明安全的基于证书签名体制研究”(2009B21114),与南京师范大学共同主持完成国家自然科学基金项目“高效无证书密码体制及其应用”(60673070),作为骨干成员参加完成国家863项目“分布式可信计算系统研究” (2007AA01Z409)。主持完成了江苏省公安厅项目“新型数字签名理论、应用及其关键技术研究”(200503002),河海大学科技创新基金项目“代理签名及其应用研究”。作为骨干成员参加完成了国家自然科学基金项目“二次域密码、门限密钥托管及其应用”(60072018,该项目2003年结题,结题评价为优秀)。国家自然科学基金项目“密码系统与密码分析”(69772037),黑龙江省自然科学基金项目“二次背包密码体制与二次密钥方案”。出版了信息安全系列教材2部(《信息安全数学基础》和《密码学教程》。从事密码与信息安全研究至今已经在Journal of Computer Security、IEEE Transactions on Information Forensics and Security、IEEE Transactions on Services Computing、Information Sciences、Journal of Systems and Software、The Computer Journal、Theoretical Computer Science、Future Generation Computer Systems、IET Information Security、Computers & Mathematics with Applications、JCST、Journal of Communications and Networks、International Journal of Network Security、Security and Communication Networks、Computing and Informatics、Concurrency and Computation Practice and Experience、International Journal of Computer Mathematics、International Journal of Information Security、KSII Transactions on Internet and Information Systems、Journal of Information Science and Engineering、计算机学报,软件学报、电子学报、计算机研究与发展、电子与信息学报和通信学报等国内外核心学术期刊和EuroPKI’07, Infosecu’04等重要国际会议发表学术论文100余篇,其中SCI、EI收录论文80余篇,一级学报26篇。JCR一区4篇,JCR二区12篇,JCR三、四区多篇,中国计算机学会推荐国际学术刊物A类期刊1篇, B类期刊15篇。据不完全统计,论文他引1500余次。目前,申请密码与信息安全相关的发明专利30项,已授权13项。获得2004年度江苏省高校“青蓝工程”优秀青年骨干教师培养人选,2008年入选河海大学首批优秀创新人才计划,2009年入选江苏省“六大人才高峰”第六批高层次人才项目资助计划。2005届河海大学本科毕业设计(论文)优秀指导教师称号。获得2010年江苏省优秀硕士学位论文指导教师。 目前为国家自然科学基金项目、霍英东教育基金、教育部博士点基金项目和中国博士后基金项目评审专家,IEEE会员,中国密码学会会员,中国计算机学会会员,江苏省计算机学会计算机安全专业委员会常务委员,江苏省大数据专家委员会委员,江苏省计算机学会会员,南京市三网融合工作专家委员会专家,被邀请担任IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Services Computing, IEEE Systems Journal, IEEE Transactions on Cloud Computing, IEEE Communications Letters, IET Information Security, Information Sciences, Journal of Systems and Software, The Computer Journal, Designs, Codes and Cryptography, Future Generation Computer System, Computers & Electrical Engineering, Computing and Informatics, Computers & Mathematics with Applications, Journal of Applied Mathematics, Security and Communication Networks, International Journal of Information Security, International Journal of Security and Networks, International Journal of Network Security, Journal of Information and Computer Security, Mathematical Problems in Engineering, Journal of Computer Science and Technology, International Journal of Communications, Network and System Sciences, International Journal of Computers and applications, Frontiers in China, The Scientific World Journal, Frontiers of Computer Science, Sensor Letter, Journal of Internet Technology, KSII Transactions on Internet and Information Systems, IETE Technical Review, Pervasive and Mobile Computing, Fundamenta Informaticae, Engineering Science and Technology, an International Journal, Journal of Information Science and Engineering, SCIENCE CHINA Information Sciences,计算机学报、软件学报、电子学报、通信学报、中国通信、电子与信息学报等60余学术期刊和CIS 2004-2015,InfoSecu 2004,CANS 07-08等国际会议的特邀审稿人及CIS2010-2015, MINES 2010, SECRYPT 2012-2015, ICICS2013, NFSP2013, GC13 WS – BigSecurity 2013-2015, CSS 2014, ISPEC 2014-2015, Inscrypt 2014, ICIT 2014, 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data, NSS 2015, CS-2015, ICCCS2015, SSCC-2015, ProvSec 2016, BigSecurity'16, ISPEC 2016, Globecom'16,SAI'16,DPM 2016等国际会议的PC Member和Organizing Chair of ProvSec 2016。 电话:17302555826 Address:南京市江宁区佛城西路8号365bet体育投注网,211100 Office:勤学楼4103 Email:ljg1688@163.com,lijiguo@hhu.edu.cn 欢迎报考本人硕士和博士研究生,请邮件联系。 发表和录用的部分论文如下: [1]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, and Jian Shen. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Security and Communication Networks, 2016, accepted. (SCI&EI) [2] Yuyan Guo,Jiguo Li, Yichen Zhang, Jian Shen. Hierarchical Attribute-Based Encryption with Continuous Auxiliary Inputs Leakage. Security and Communication Networks, 2016, accepted. (SCI&EI) [3]Hao Yan,Jiguo Li, Jinguang Han,Yichen Zhang.A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage, IEEE Transactions on Information Forensics and Security, 2016, 10.1109/TIFS.2016.2601070.(SCI, Impact Factor: 2.441 (2015),中国计算机学会推荐国际学术刊物与会议(信息安全)A类期刊) [4] Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang and Futai Zhang. Continuous Leakage-Resilient Certificate-Based Encryption. Information Sciences, 355–356 (2016) 1–14DOI:10.1016/j.ins.2016.03.032. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221,中国计算机学会推荐国际学术刊物与会议(数据库数据挖掘内容检索)B类期刊, EI, JCR一区) [5] Jiguo Li,WeiYao, Yichen Zhang, Huiling Qian and Jinguang Han. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2016.2520932. (SCI&EI)(中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR一区) [6] Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu.A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.The Computer Journal, 2016, 59(7): 1066-1075. DOI 10.1093/comjnl/bxv128. (SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊, JCR三区) [7] Yang Lu,Jiguo Li.A Provably Secure Certificate-Based Encryption Scheme against Malicious CA Attacks in the Standard Model. Information Sciences, 2016, accepted. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221,中国计算机学会推荐国际学术刊物与会议(数据库数据挖掘内容检索)B类期刊, EI, JCR一区) [8] Yang Lu,Jiguo Li. Provably Secure Certificateless Proxy Signature Scheme in the Standard Model. Theoretical Computer Science, 2016, 639: 42-59. http://dx.doi.org/10.1016/j.tcs.2016.05.019 (SCI, IDS Number: 125NI, Impact Factor: 0.657 (2014), 5-Year Impact Factor: 0.747,中国计算机学会推荐国际学术刊物与会议(计算机科学理论)B类期刊, EI, JCR一区) [9] Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen,Jiguo Li, Jie Cao. Accountable Mobile E-Commerce Scheme via Identity-based Plaintext-Checkable Encryption. Information Sciences, 2016, 345:143-155 doi:10.1016/j.ins.2016.01.045. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221,中国计算机学会推荐国际学术刊物与会议(数据库数据挖掘内容检索)B类期刊, EI, JCR一区) [10] Jiguo Li,Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Constructions of Certificate-Based Signature Secure against Key Replacement Attacks. Journal of Computer Security,2010,18(3): 421-449(EI,中国计算机学会推荐国际学术刊物与会议(信息安全)B类期刊) [11] Jiguo Li, Haiting Du, Yichen Zhang.Certificate-based Key-Insulated Signature in the Standard Model.The Computer Journal, 2016, 59(7):1028-1039 DOI 10.1093/comjnl/bxv115 (SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊) [12] Qihong Yu,Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang. Certificate-Based Encryption Resilient to Key Leakage, Journal of Systems and Software,2016, 116, 101–112.DOI: 10.1016/j.jss.2015.05.066 (SCI,中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊, JCR二区) [13] Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang and Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme. The Computer Journal, 2015, 58(4): 853-866.10.1093/comjnl/bxt141(SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊) [14] Jiguo Li,Xiaonan Lin, Yichen Zhang and Jinguang Han. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Transactions on Services Computing, 10.1109/TSC.2016.2542813. (SCI&EI)(中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR一区) [15] Jiguo Li, Zhiwei Wang, Yichen Zhang.Provably Secure Certificate-Based Signature Scheme without Pairings. Information Sciences, 2013, 233(6): 313-320. DOI information: 10.1016/j.ins.2013.01.013 (SCI,IDS Number:125NI, Impact Factor: 3.643(2012), 5-Year Impact Factor: 3.676,中国计算机学会推荐国际学术刊物与会议(数据库数据挖掘内容检索)B类期刊, EI, JCR一区) [16] Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu. An Efficient Short Certificate-based Signature Scheme. Journal ofSystems and Software, 2012, 85(2): 314-322. DOI: http://dx.doi.org/10.1016/j.jss.2011.08.014 (SCI: 893WH, 5-Year Impact Factor: 1.117,中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊, JCR二区) [17] Lu Yang andLi Jiguo. A Pairing-Free Certificate-Based Proxy Re-encryption Scheme for Secure Data Sharing in Public Clouds. Future Generation Computer Systems, 2016,62: 140-147. DOI:10.1016/j.future.2015.11.012. (SCI&EI,中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊) [18] Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Inputs Leakage. Security and Communication Networks,9(10): 1016-1024 (2016) 10.1002-sec.1396. (SCI&EI,中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊) [19] Li Jiguo, Wang Haiping,Yichen Zhang, Shen Jian. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Transactions on Internet and Information Systems,vol. 10, no. 7, pp. 3339-3352, 2016. DOI: 10.3837/tiis.2016.07.026.(SCI&EI) [20] Jiguo Li, Xuexia Zhao, Yichen Zhang, WeiYao.Provably Secure Certificate-based Conditional Proxy Re-encryption. Journal of Information Science and Engineering (J. Inf. Sci. Eng.) 32(4): 813-830 (2016). (SCI&EI) [21] Lu Yang, Zhang Quanling andLi Jiguo. Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols. In Proc. of 14th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2015. (EI) [22] Lu Yang, Zhang Quanling andLi Jiguo. An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications, 9(3), 353-373, 2015. (SCI&EI) [23] Lu Yang andLi Jiguo. An Improved Certificate-based Signature Scheme without Random Oracles. IET Information Security, 2016,10(2): 80-86. DOI: 10.1049/iet-ifs.2015.0188. (SCI&EI,中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊) [24] Xunjun Chen, Yuelong Zhu,Jiguo Li, Yamin Wen, Zheng Gong. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-based Supply Chains. Information, 2015, 6(2): 258-274 (EI) [25] Yichen Zhang,Jiguo Li, Zhiwei Wang, Wei Yao.A New Efficient Certificate-Based Signature Scheme, Chinese Journal of Electronics, 2015, 24 (4): 776-782.(SCI) [26] Huaqun Wang,Jiguo Li. Certificate-Based Remote Data Integrity Checking in Public Clouds. COCOON2015, LNCS 9198, 375-386, 2015. [27] Jiguo Li, Yuerong Shi, Yichen Zhang. Searchable Ciphertext-Policy Attribute-Based Encryption with Revocation in Cloud Storage, International Journal of Communication Systems, accepted. (SCI). DOI: 10.1002/dac.2942 [28] Qihong Yu,Jiguo Li, Yichen Zhang. Leakage-Resilient Certificate-Based Encryption, Security and Communication Networks, 2015, 8: 3346-3355, DOI:10.1002/sec.1258, 2015(SCI).(中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊) [29] Huiling Qian,Jiguo Li, Yichen Zhang, Jinguang Han. Privacy Preserving Personal Health Record Using Multi-Authority Attribute-Based Encryption with Revocation. International Journal of Information Security, 2015, 14(6): 487-497. (SCI,EI20144900283750,Impact Factor: 1.279(2015-2016),JCR二区,中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊,中国计算机学会推荐国际学术刊物与会议(信息安全)C类期刊). DOI: 10.1007/s10207-014-0270-9 [30]李继国,张亦辰,卫晓霞.可证安全的基于证书广播加密方案.电子学报,2016, 44(5): 1101-1110 (EI) [31]李继国,石岳蓉,张亦辰.隐私保护且支持用户撤销的属性基加密方案.计算机研究与发展, 2015, 52(10): 2281-2292 (EI) [32] 李艳琼,李继国,张亦辰.标准模型下安全的无证书签名方案.通信学报, 2015, 36(4): 2015098-1-2015098-10. [33] Jiguo Li, Jingjing Zhao, Yichen Zhang. Certificateless Online/Offline Signcryption Scheme, Security and Communication Networks, 2015, 8:1979–1990. DOI: 10.1002/sec.1146 (SCI). [34] Lu Yang andLi Jiguo. Efficient Constructions of Certificate-Based Key Encapsulation Mechanism. International Journal of Internet Protocol Technology, 2014, 8(2/3): 96-106 (EI). [35] Lu Yang andLi Jiguo. Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Transactions on Internet and Information Systems, 2014, 8(7): 2554-2571.(SCI&EI) [36] Yang Lu,Jiguo Li. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks. The Scientific World Journal, 2014, http://dx.doi.org/10.1155/2014/295419.(IDSNumber: AH7JO, 2013 Impact Factor 1.219,SCI) [37] Jiguo Li,Na Qian, Yichen Zhang and Xinyi Huang. An Efficient Certificate-Based Designated Verifier Signature Scheme, Computing and Informatics, accepted.(SCI) [38]Yang Lu, Jiguo Li. Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. Journal of Information Science and Engineering, 2014, 30(5): 1553-1568(SCI&EI) [39] Jiguo Li, Xuexia Zhao, and Yichen Zhang.Certificate-Based Conditional Proxy Re-Encryption. M.H. Au et al. (Eds.): NSS 2014, LNCS 8792, pp. 299–310, 2014(SCI,IDSNumber:BB6XN). [40] 禹勇,李继国,伍玮,黄欣沂.基于身份签名方案的安全性分析.计算机学报, 2014, 37(5): 1025-1029 [41] Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, and Yuexin Zhang. Provably Secure Certificate-based Key-Insulated Signature Scheme. Concurrency and Computation Practice and Experience, 2014, 26:1546–1560.DOI: 10.1002/cpe.3019 (IDSNumber: AF4CM, 2013 Impact Factor 0.784, SCI, JCR二区) [42] Tao Li,Jiguo Li, Jing Zhang. A Cryptanalysis Method based on Niche Genetic Algorithm. Applied Mathematics & Information Sciences, 2014, 8(1): 279-285 (IDSNumber: AA9AQ, 2013 Impact Factor 1.232,SCI, JCR一区) [43]陆阳,李继国.标准模型下高效安全的基于证书密钥封装机制.计算机研究与发展, 2014, 51(7): 1497-1505. (EI) [44] 陆阳,李继国.标准模型下前向安全公钥加密方案的新构造.通信学报. 2014, 35(2): 33-39. [45]Wan Zhongmei,Li Jiguo, Hong Xuan. Parallel key-insulated signature scheme without random oracles. Journal of Communications and Networks, 2013, 15(3): pp.252-257. (SCI,IDSNumber:187UL, 2012 Impact Factor 0.309, EI) [46]Huiling Qian,Jiguo Liand Yichen Zhang. Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.ICICS 2013, S. Qing et al. (Eds.): ICICS 2013, LNCS 8233, pp. 363–372, 2013.(中国计算机学会推荐国际学术刊物与会议(信息安全)C类会议) [47] Jiguo Li, Yanqiong Li and Yichen Zhang.Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Transactions on Internet and Information Systems, 2013, 7(8): 1972-1988. (SCI, 2012 Impact Factor 0.560, IDSNumber:245IL, EI,20133716726219) [48] Ji Yao,Jiguo Liand Yichen Zhang. Certificate-Based Encryption Scheme without Pairing. KSII Transactions on Internet and Information Systems, 2013, 7(6): 1480-1491. (SCI,IDSNumber:173ZF,2012 Impact Factor 0.560, EI) [49] Jiguo Li, Yanqiong Li and Yichen Zhang. Forward Secure Certificateless Proxy Signature Scheme. J. Lopez, X. Huang, and R. Sandhu (Eds.): NSS 2013, LNCS 7873, pp. 350-364, 2013. (EI, 20133716723893) [50] Lu Yang andLi Jiguo. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics. 2013,90(12): 2603-2613DOI:10.1080/00207160.2013.807915 (SCI,Impact Factor: 0.542 (2012), 5-Year Impact Factor: 0.561,EI) [51] Lu Yang andLi Jiguo. Constructing Pairing-Free Certificate-Based Encryption. International Journal of Innovative Computing, Information and Control, 2013, 9(11): 4509-4518. (EI) [52] Yang Lu,Jiguo Li. Generic Construction of Forward-Secure Identity-Based Encryption.JCP 7(12): 3068-3074 (2012) [53] Lu Yang andLi Jiguo. Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption. In 2012 Fourth International Symposium on Information Science and Engineering, Shanghai, China, pp. 199-202, 2012. (EI) [54]Jiguo Li, Yichen Zhang and Huiyun Teng. A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. Y. Xiang etal. (Eds.): CSS 2012, LNCS 7672, pp. 362-376. Springer, Heidelberg (2012). [55] Haiting Du,Jiguo Li, Yichen Zhang, Tao Li, and Yuexin Zhang. Certificate-based Key-Insulated Signature. Y. Xiang et al. (Eds.): ICDKE 2012, LNCS7696, pp. 206-220, 2012. [56]Zhang Yichen,Li Jiguo, Sun Chuanming. An Efficient Property-based Remote Attestation Scheme. China Communication, 2012,(10): 1-9 (SCI) [57]Jiguo Li, Xinyi Huang, Meixue Hong,Yichen Zhang.Certificate-based Signcryption with Enhanced Security Features. Computers and Mathematics with Applications. 2012, 64(6) : 1587-1601, http://dx.doi.org/10.1016/j.camwa.2012.01.006 (SCI, 012PD, 5-Year Impact Factor: 1.643) [58] 李继国,杨海珊,张亦辰.标准模型下安全的基于证书密钥封装方案.电子学报, 2012, 40 (8): 1577-1583(EI, 20124215582349). [59] 李继国,钱娜,黄欣沂,张亦辰.基于证书强指定验证者签名方案.计算机学报, 2012, 35 (8): 1579-1587 (EI, 20124415622447). [60]李继国,杨海珊,张亦辰.带标签的基于证书密钥封装方案.软件学报,2012, 23(8): 2163-2172(EI,20123815454316). [61]Lu Yang andLi Jiguo. Constructing Certificate-Based Encryption Secure against Key Replacement Attacks. ICIC Express Letters, Part B: Applications, 2012, 3(1): 195-200. (EI) [62] 李继国,孙刚,张亦辰.标准模型下可证安全的本地验证者撤销群签名方案.电子学报, 2011, 39 (7): 1618-1623 [63] 李继国,孙刚,张亦辰.实用的本地验证者撤销群签名方案.通信学报, 2011,32 (10): 67-77. [64]Zhongmei Wan Xuejia Lai, Jian Weng andJiguo Li. Certificateless Strong Key-Insulated Signature. ICIST 2011, pp.270-276 [65] Wan Zhong-Mei,Weng Jian,Lai Xue-Jia,Liu Sheng-Li,Li Ji-Guo. On the relation between identity-based proxy re-encryption and mediated identity-based encryption. Journal of Information Science and Engineering, 2011,27(1):243-259 (SCI) [66] Lu Yang andLi Jiguo. A Practical Forward-Secure Public Key Encryption Scheme. Journal of Networks, 2011, 6 (9): 1254-1261 [67] ZHOU Yajian, PAN Anwei,LI Jiguo. An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks,ChinaCommunications, 2010,(10):7-17 (SCIE) [68] Zhongmei Wan, Jian Weng, Jiguo Li. Security Mediated Certificateless Signatures Without Pairing. Journal of Computers. 2010, 5(12): 1862-1869 [69] 周亚建,徐晨,李继国.基于改进CURE聚类算法的无监督异常检测方法.通信学报.2010,31(7):18-23.(EI) [70]Wang Aiqin,Li Jiguo, Wang Zhijian. A Provably Secure Proxy Signature Scheme from Bilinear Pairings. Journal of Electronics. 2010,27(3):298-304. [71]Lu Yang andLi Jiguo. Forward-Secure Certificate-Based Encryption and its Generic Construction. Journal of Networks, 2010, 5(5): 527-534.(EI) [72] Lu Yang,Li Jiguo, Constructing efficient certificate-based encryption scheme with pairing in the standard model,Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp 234-237(EI) [73]Lu Yang andLi Jiguo. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles. In the 3rd International Symposium on Electronic Commerce and Security Workshops, pp. 22-25, 2010. (EI) [74] Lu Yang,Li Jiguoand Xiao Junmo. Forward-secure Certificate-based Encryption. The Fifth International Conference on Information Assurance and Security, Xian,China, pp.57-60, 2009. [75]Lu Yang,Li Jiguoand Xiao Junmo. Forward-secure Certificate-based Encryption: Definition and Generic Construction. In the 2009 International Conference on e-Business and Information System Security,Wuhan,China, pp.30-34, 2009. (SCI,IDSNumber:BLZ43, EI) [76]Weijia Jiang,Jiguo Li. Authenticated Tree Based Group Key Agreement. CIS2009, 251-255. [77]李继国,姜平进.标准模型下可证安全的基于身份的高效签名方案.计算机学报,2009,11(11):2130-2136 [78]Jiguo Li, Lizhong Xu and Yichen Zhang. Provably Secure Certificate-based Proxy Signature Schemes. Journal of Computers.2009, 4(6):444-452(EI) [79] Lu Yang,Li Jiguoand Xiao Junmo. Threshold Certificate-based Encryption. Journal of software. 2009, 4(3): 210-217(EI) [80] Lu Yang andLi Jiguo. Generic Construction of Certificate-based Encryption in the Standard Model. In the Second International Symposium on Electronic Commerce and Security,Nanchang,China, pp.25-29, 2009. [81] Lu Yang,Li Jiguoand Xiao Junmo. Threshold Certificate-based Encryption: Definition and Concrete Construction. 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, vol1, 278-282. [82]Yang Lu,Jiguo Li, and Junmo Xiao. Constructing Efficient Certificate-based Encryption with Paring. Journal of Computers. 2009, 4 (1): 19-26. (EI) [83]Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu. Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme. Journal of Communications and Networks. 2008, 10(1): 10-17. (SCI, 000254805800003) [84] Lu Yang,Li Jiguoand Xiao Junmo. Generic Construction of Certificate-based Encryption. In the9th International Conference for Young Computer Scientists,Zhangjiajie,China, pp. 1589-1594, 2008(EI&ISTP) [85]Lu Yang,Li Jiguoand Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. In the 2008 International Symposium on Electronic Commerce and Security,Guangzhou,China, pp. 296-300, 2008.(EI) [86]Lu Yang andLi Jiguo. A General and Secure Certificate-based Encryption Construction. In the 3rd ChinaGrid Annual Conference,Dunhuang,China, pp. 182-189, 2008.(EI) [87]Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI’07, LNCS 4582, 2007,110-125.(EI) [88]Jiguo Li,Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-Certified Public Key. International Journal of Network Security, 2007, 2(4): 193-200(EI, 20131316142523) [89]王爱芹,李继国,马春光,王志坚.一种基于身份的代理盲签名方案的安全性分析.通信学报, 2006, 27, (12A): 16-19. [90] Li Jiguo, Zhang Yichen, and Zhijian Wang. Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006, 480-483 (ISTP, EI) [91]李继国,余纯武,张福泰,马春光等.信息安全数学基础(信息安全系列),武汉大学出版社, 2006.9 [92] 张福泰,李继国,王晓明,林柏钢,赵泽茂等.密码学教程(信息安全系列),武汉大学出版社, 2006.9 [93] Li Jiguo, Liang Zhenghe, Zhu Yuelong and Zhang Yichen. Improvement of Some Proxy Signature Schemes. Chinese Journal of Electronics, 2005, 14(3): 407-411 (SCI,945NP, EI) [94] Li Jiguo, Zhang Yichen, Zhu Yuelong. A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key.WuhanUniversityJournal of Natural Sciences, 2005, 10(1): 219-222 (EI) [95] Li Jiguo, Zhang Yichen, Zhu Yuelong. Security Analysis and Improvement of Some Proxy Signature Schemes. Infosecu’2004, ACM, 27-32 [96]Jiguo Li, Yichen Zhang, Yuelong Zhu. Security on Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks. Proceedings of ICCC2004, 2004, 1584-1586 (ISTP) [97] LI Jiguo, LI Jianzhong,CAO Zhenfuand Zhang Yichen. Convertible Proxy Signcryption Scheme. Journal of Harbin Institute of Technology. 2004, 11(2): 209-213 (EI) [98] 李继国,曹珍富,李建中.代理签名的现状与进展.通信学报. 2003, 24(10): 114-124 [99] 曹珍富,李继国,李建中.一个新的具有指定接收者(t,n)门限签名加密方案.通信学报. 2003, 24(5): 8-13 [100] LI Jiguo, LI Jianzhong,CAO Zhenfuand Zhang Yichen. Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent. Journal of Software(软件学报英文版). 2003,14(12): 2021-2027 (EI) [101] 李继国,曹珍富,李建中.具有指定接收组(t,n)门限共享验证签名加密方案.电子学报. 2003, 31(7): 1086-1088 (EI) [102] 李继国,曹珍富,张亦辰,李建中.代理多重签名方案的密码分析与修改.高技术通讯. 2003, 13(4): 1-5 (EI) [103] Li Jiguo,Cao Zhenfuand Zhang Yichen. Nonrepudiable Proxy Multi-Signature Schemes. Journal of Computer Science and Technology. 2003, 18(3): 399-402 (SCI, EI) [104] Li Jiguo,Cao Zhenfuand Zhang Yichen. Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology. 2002, 9(2): 145-148 (EI) [105] 曹珍富,李继国.基于ElGamal体制的门限密钥托管方案.计算机学报. 2002,25(4): 346-350 (EI) [106] 李继国,曹珍富.一个门限代理签名方案的改进.计算机研究与发展. 2002, 39 (11): 1513-1518(EI)
部分软件著作权及授权专利如下: [1]徐晨,李继国.基于数据挖掘的入侵检测系统V1.0.计算机软件著作权登记证书.编号:软著登字第0148688号.登记号:2009SR021689. [2]李继国,姜平进.一种基于身份的数字签名方法.专利授权号:ZL 200910027375.6 [3]李继国,徐晨.基于改进CURE聚类算法的无监督异常检测方法和系统.专利授权号:ZL 200910027374.1 [4] 李继国,许峰,孙传明.一种用于证明远程平台安全属性的远程证明方法.专利授权号:ZL201110386340.9. [5] 李继国,罗翀,张亦辰.一种隐藏得票数的电子投票方法.专利授权号:ZL201110425662.X. [6]李继国,杨海珊,张亦辰.一种带标签的基于证书密钥封装方法及系统.专利授权号:ZL201110425754.8. [7]李继国,王芝伟,张亦辰.基于证书的数字签名系统及签名方法.专利授权号:ZL201110426475.3. [8]李继国,滕荟芸,张亦辰.基于证书的前向安全签名方法及系统.专利授权号:ZL201110425553.8. [9]李继国,王飞,张亦辰,于启红,钱惠玲,滕美林,郭宇燕,石岳蓉,郭俊,赵雪霞,赵晶晶.一种对诚实参与者公平的理性多秘密分享方法;申请日期:2013-4-25,授权号:ZL201310149090.6,授权日期:2015-12-09 [10] 李继国,钱惠玲,张亦辰,滕美林.一种基于属性保护的多授权中心加密方法:发明专利,授权号:ZL 201310276499.4,授权日期:2016-06-01 [11] 陆阳,李继国.一种基于短期证书的密钥封装方法,授权号:ZL 201310196758.2,2016-03-02 [12] 李继国,张亦辰,蒋鑫,黄丕全,钱惠玲,滕美林,汪鑫,郭宇燕.免费接收者数量可控的广播加密方法:发明专利,申请日期:2013-04-25,授权号:ZL201310149490.7,授权日期:2016-04-20 [13] 李继国,张亦辰,汪鑫,蒋勇,钱惠玲,滕美林,蒋鑫,郭宇燕.基于离散对数的有向传递签名方法:发明专利,申请日期:2013-04-25,授权号:ZL201310149352.9,授权日期:2016-04-27 [14] 陆阳,李继国.一种基于证书代理重加密方法及系统:发明专利,申请日期:2013-11-15,授权号:ZL ZL201310572508.4,授权日期:2016-07-06 |