教授名录

教授名录

当前位置 :  首页 > 教师队伍 > 教授名录

谢琪

来源 : 数学学院     作者 : 学院     浏览量:5850     时间 : 2021-08-11

谢琪

谢琪

(English Version)


      姓名:谢琪

  职称:教授

  邮箱qixie68@126.com

  招收研究生专业

数学(硕士、博士),密码、网络空间安全、计算机科学与技术等

  个人简介

2005年在浙江大学获得应用数学博士学位,2007.7-2010.10浙江大学计算机应用博士后,2009.9-2010.9年英国伯明翰大学计算机学院访问教授,20126-8月香港城市大学计算机学院访问教授,分别于2002年和2006年破格晋升副教授和教授。曾任杭州师范大学研究生处副处长、信息科学与工程学院(杭州国际服务工程学院)副院长、执行院长、院长,目前为数学学院院长兼党委副书记、博士生导师

浙江省商用密码学会理事长,浙江省万人计划领军人才,浙江省高等学校教学名师,获浙江省优秀教师、马云卓越教学奖,入选2021年、2022年、2023年、2024年全球前2%顶尖科学家“终身科学影响力”榜单和2024年度全球前2%顶尖科学家“年度科学影响力”榜单

  研究兴趣

主要研究兴趣为应用密码学、网络安全等,包括认证与密码协商协议的分析与设计、数字签名的分析与设计、物联网安全(包括车联网安全、智慧医疗安全)、及区块链安全与隐私的应用等主持国家自然科学基金面上项目、中国博士后基金(一等资助)、浙江省自然科学基金重点及一般项目等省部级、国家级项目10余项;参与国家973计划、国家科技部网络空间安全重大专项、十二五国家密码发展基金、国家自然科学基金和省自然科学基金等省部级及以上项目6项;获党政机要密码科技进步奖三等奖1项(省部级)。担任ISPEC2012ACM ASIACCS2013国际会议共同主席,为40多个SCI国际期刊审阅稿件。

  发表的部分论文

[1] Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6):1382-1392.

[2] Qi Xie, Zixuan Ding, Qingyun Xie, Xiao Tan, Debiao He and Wen Tang. Blockchain-based traffic accident handling protocol without third-party for VANETs, IEEE Internet of Things Journal, vol.11, no.19, pp. 31068-31079, 2024, DOI 10.1109/JIOT.2024.3414453.

[3] Qi Xie, Yuanyuan Zhao, Qingyun Xie, Xiumei Li, Debiao He, Kefei Chen. A Multi-server Authentication Protocol with Integrated Monitoring for IoMT-based Healthcare System", IEEE Internet of Things Journal, 12(2): 2265-2278, JANUARY 15, 2025, DOI: 10.1109/JIOT.2024.3469629

[4] Qingyun Xie and Qi Xie. Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System, IEEE Internet of Things Journal, 11(8): 15038 – 15042,2024. 10.1109/JIOT.2023.3334708

[5] Qi Xie, Zixuan Ding and Panpan Zheng, "Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs," in IEEE Transactions on Intelligent Transportation Systems, 24(7): 7318-7327, 2023. doi: 10.1109/TITS.2023.3253710, 2023.

[6] Ding Zixuan, Xie, Qi. Provably secure and lightweight three-factor authentication scheme for industrial medical CPS. Journal of Information Security and Applications, 792023103656, 2023. https://doi.org/10.1016/j.jisa.2023.103656

[7] Qi Xie, Zixuan Ding, Wen Tang, Debiao He, Xiao Tan. Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs, IEEE Transactions on Vehicular Technology, 72(12): 15200-15212, 2023. 10.1109/TVT.2023.3289175, 2023

[8] Huige Wang; Kefei Chen; Qi Xie; Qian Meng. Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 833-844, Jan.-Feb. 2025, doi: 10.1109/TDSC.2024.3418984.

[9] Qi Xie, Zixuan Ding. Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. Scientific Reports, (2025) 15:6461, https://doi.org/10.1038/s41598-025-90219-5.

[10] Bin Hu, Wen Tang, Qi Xie, A Two-factor Security Authentication Scheme for Wireless Sensor Networks in IoT Environments, Neurocomputing 500 (2022) 741–749. doi: https://doi.org/10.1016/j.neucom. 2022.05.099

[11] Lidong Han, Guangwu Xu, Qi Xie. Comment on an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage, IEEE Transactions on Information Forensics and Security. 2023, 18: 3934-3935. DOI 10.1109/TIFS.2023.3271272

[12] Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie, PBIDM: Privacy-preserving blockchain-based identity management system for Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 19(2): 1524-1534 (2023). DOI: 10.1109/TII.2022.3206798, 2022.

[13] Yi Yang, Debiao He, Pandi Vijayakumar, Brij B Gupta, Qi Xie. An Efficient Identity-based Aggregate Signcryption Scheme with Blockchain for IoT-enabled Maritime Transportation System. IEEE Transactions on Green Communications and Networking, 2022, 6 (3), pp.1520-1531

[14] Qi Xie. A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012; 25(1):4754.

[15] Xie Qi. Provably secure convertible multi-authenticated encryption scheme, IET Information Security, 2012, 6( 2): 6570.

[16] Guilin Wang, Jiangshan Yu and Qi Xie. Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks, IEEE Transactions on Industrial Informatics, 9(1): 294-302 (2013).

[17] Qi Xie, Guilin Wang, Fubiao Xia and Deren Chen. Self-Certified Proxy Convertible Authenticated Encryption: Formal Definitions And A Provably Secure Scheme. Concurrency and Computation: Practice and Experience,2014, 26(5): 1038-1051.

[18] Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Information Technology And Control, 2013, Vol.42, No.3231-237.

[19] Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao and Na Dong. A practical anonymous authentication protocol for wireless roaming, Security and Communication Networks. 7(8): 1264-1273 (2014) .

[20] Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu. Robust anonymous two-factor authentication scheme for roaming service in global mobility network, Wireless Personal Communications, 2014, 74(2): 601-614.

[21] Qi Xie, Jianmin Zhao, Xiuyuan Yu. Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement Scheme. Nonlinear Dynamics, 2013, Volume 74, Issue 4, pp 1021-1027.

[22] Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong and Duncan S. Wong. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks, International Journal of Distributed Sensor Networks, vol. 2014, Article ID 325734, 7 pages, 2014.

[23] Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu. Improvement of a Uniqueness-and-Anonymity Preserving User Authentication Scheme for Connected Health Care, Journal of Medical Systems, (2014) 38:91.

[24] Qi Xie, Bin Hu, Na Dong, Duncan S. Wong. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems, PLoS ONE 9(7): e102747. doi:10.1371/journal.pone.0102747 (2014).

[25] Xie, Q., Li, K., Tan, X. et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP Journal of Wireless Commmunication and Networkings, 2021, 119 (2021).

[26] Qi Xie, Jun Zhang, Na Dong. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems, Journal of Medical Systems.2013 Apr;37(2):1-8.

[27] Qi Xie. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme, Scientia Iranica (2012) 19 (6), 18561860.

[28] Qi Xie, Zhixiong Tang, Kefei Chen. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks, Computers and Electrical Engineering, 2017(59): 218-230.

[29] Xie Qi, Hu Bin, Chen Ke-Fei, Liu Wen-Hao and Tan Xiao. Chaotic maps and biometrics based anonymous three-party authenticated key exchange protocol without using passwords. Chinese Physics B, Vol. 24, No. 11 (2015) 110505

[30] Qi Xie, Bin Hu, Ting Wu. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card. Nonlinear Dynamics, 2015, 79(4 ): 2345-2358

[31] Qi Xie, Zhixiong Tang. Biometrics based authentication scheme for session initiation protocol. SpringerPlus, (2016) 5: 1045-1058.

[32] Qi Xie, Xiao Tan, Bin Hu, Guilin Wang, Duncan S. Wong, Kefei Chen, and XiuYuan Yu. Probably Secure Anonymous Authenticated Key Agreement Protocols with Enhanced Security Models, Science, 360(6387):27-28, 2018APR 27

[33] Qi Xie, Lingfeng Hwang, Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city, Neurocomputing 347 (2019): 131-138.

[34] Qi Xie, Yanrong Lu, Xiao Tan,Zhixiong Tang, Bin Hu. Security and Efficiency Enhancement of an Anonymous Three-Party Password-Authenticated Key Agreement Using Extended Chaotic Maps. PLoS ONE, 2018, 13(10): e0203984.

[35] Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong. Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks, Wireless Personal Communications, (2017) 96:5881-5896.

[36] Xie Qi, Yu XiuYuan. Cryptanalysis of Tseng et al's authenticated encryption schemesApplied Mathematics and Computation, 2004, 158(1):1-5.

[37] Xie Qi. Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers. Applied Mathematics and Computation, 2005,168(2):776-782.

[38] Qi Xie, Zixuan Ding , and Bin Hu. A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. Security and Communication Networks, Volume 2021, Article ID 4799223, 12 pages.

[39] 谢琪,于秀源. 有指定秘书的(tn)门限群签名体制,高校应用数学学报,2005,20(2):156-160.

[40] 谢琪,吴吉义,王贵林,刘文浩,陈德人,于秀源。 云计算中基于可转换代理签密的可证安全的认证协议,中国科学:信息科学,2012,42(3): 303-313

[41] 谢琪,于秀源. 基于分组秘密共享的(tn)门限群签名体制, 计算机学报, 2005,28(2):209-213.



联系我们

地址:浙江省杭州市余杭塘路2318号勤园23号楼 
电话:0571-28867633 邮编:311121
版权所有 © 2021 杭州师范大学数学学院 
公安备案号:33011002011919  浙ICP备11056902号-1