English Version

English Version

Prof. Qi Xie

来源 : 杭州师范大学 数学学院     作者 : 学院     浏览量:47     时间 : 2022-01-07


Prof. Qi Xie

Prof. Qi Xie

School of Mathematics

Hangzhou Normal University
No.2318 Yuhangtang Road, Hangzhou 311121, Zhejiang, P R China.

E-mail:qixie68@126.com; qixie@hznu.edu.cn

QI Xie,Director of Key Laboratory of Cryptography of Zhejiang Province, Dean of  School of Mathematics. His research area is applied cryptography and information technology education, including digital signatures, authentication and key agreement protocols, and instructional design etc. He has published over 80 research papers in international journals and conferences, and served as general co-chairs of ISPEC2012 and ACM ASIACCS2013, and a reviewer for over 30 international journals.

Education and profession
  • 2021.7--     School of Mathematics, Hangzhou Normal University.

  • 2007.6-2009.6: Graduate School, Hangzhou Normal University. 

  • 1997.3-2021.6: School of Information Science and Engineering, Hangzhou Normal University.
  • 2012.6-2012.8: Visiting Scholar, School of Computer Science, City University of Hong Kong.
  • 2009.9-2010.9: Visiting Scholar, School of Computer Science, University of Birmingham, UK.
  • 2007.7-2010.11: Postdoctor, School of Computer Science, Zhejiang University, Hangzhou, Zhejiang, P R China..
  • 2001.3-2005.3: Ph.D., Applied Mathematics, Zhejiang University, Hangzhou, Zhejiang, P RChina. Ph.D. dissertation:“Research on some group signatures and special group signatures”. Supervised by Prof. Xiuyan Yu.
  • 1994.9-1997.3: M.S., Operations Research and Cybernetics, Shanghai University, Shanghai, P RChina.
  • 1986.9-1990.8: B.S., Department of Mathematics, Hangzhou Normal University, Hangzhou, Zhejiang, P R China.

Selected Projects

  • 2021-2025: “Research on Key Cryptographic Technologies for the Data Security and Privacy Protection in Blockchain System Based on Chinese Commercial Cryptography Standard”, SubProject of NSFC-Key projects of joint fund for regional innovation and development, (No. U21A20466).

  • 2018-2020:Research on privacy and fine-grained access control of publicly auditable cloud storage system”, National Natural Science Foundation of China (No. 61702152) (participation).

  • 2017-2021: “Research on new data protection cipher algorithm”, National Key R&D Program of China, (No. 2017YFB0802000) (participation).

  • 2013-2017: “Application of related mathematical problems in Cryptanalysis and design”, National Basic Research Program of China (973 Program) (No. 2013CB834205) (participation).
  • 2012-2016: “Research on authentication mechanisms with privacy protection in cloud computing”, Key Project of Natural Science Foundation of Zhejiang province (No. LZ12F02005).
  • 2011-2013: “Research on some provably secure authentication and key exchange protocols”, National Natural Science Foundation of China (No. 61070153)
  • 2008-2010: “Research on Mutual Authentication Protocols without Verification Tables”, China Postdoctoral Science Foundation funded (No. 20080440200).
  • 2008-2010: “Research on Trusted Authentication Protocols”, Natural Science Foundation of Zhejiang province (No. Y1080831).
  • 2005-2007: “Research on non-repudiation authenticated encryption group signatures for specified recipients”, Natural Science Foundation of Zhejiang province ( No.Y105067).
  • 2002-2005: “Studies and applications of some questions in the number theory related with the information security”, National Natural Science Foundation of China (No.10271037) (participation).
  • 2004-2006: “Irrational, continued fraction and pseudorandom numbers”, Natural Science Foundation of Zhejiang province (No. M103060) (participation).

Selected Papers

[1] Qi Xie. A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012; 25(1):4754.

[2] Xie Qi. Provably secure convertible multi-authenticated encryption scheme, IET Information Security, 2012, 6( 2): 6570.

[3] Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6):1382-1392.

[4] Guilin Wang, Jiangshan Yu and Qi Xie. Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks, IEEE Transactions on Industrial Informatics, 9(1): 294-302 (2013).

[5] Qi Xie, Guilin Wang, Fubiao Xia and Deren Chen. Self-Certified Proxy Convertible Authenticated Encryption: Formal Definitions And A Provably Secure Scheme. Concurrency and Computation: Practice and Experience,2014, 26(5): 1038-1051.

[6] Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Information Technology And Control, 2013, Vol.42, No.3231-237.

[7] Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao and Na Dong. A practical anonymous authentication protocol for wireless roaming, Security and Communication Networks. 7(8): 1264-1273 (2014) .

[8] Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu. Robust anonymous two-factor authentication scheme for roaming service in global mobility network, Wireless Personal Communications, 2014, 74(2): 601-614.

[9] Qi Xie, Jianmin Zhao, Xiuyuan Yu. Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement Scheme. Nonlinear Dynamics, 2013, Volume 74, Issue 4, pp 1021-1027.

[10] Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong and Duncan S. Wong. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks, International Journal of Distributed Sensor Networks, vol. 2014, Article ID 325734, 7 pages, 2014.

[11] Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu. Improvement of a Uniqueness-and-Anonymity Preserving User Authentication Scheme for Connected Health Care, Journal of Medical Systems, (2014) 38:91.

[12] Qi Xie, Bin Hu, Na Dong, Duncan S. Wong. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems, PLoS ONE 9(7): e102747. doi:10.1371/journal.pone.0102747 (2014).

[13] Xie, Q., Li, K., Tan, X. et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP Journal of Wireless Commmunication and Networkings, 2021, 119 (2021).

[14] Qi Xie, Jun Zhang, Na Dong. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems, Journal of Medical Systems.2013 Apr;37(2):1-8.

[15] Qi Xie. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme, Scientia Iranica (2012) 19 (6), 18561860.

[16] Qi Xie, Zhixiong Tang, Kefei Chen. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks, Computers and Electrical Engineering, 2017(59): 218-230.

[17] Xie Qi, Hu Bin, Chen Ke-Fei, Liu Wen-Hao and Tan Xiao. Chaotic maps and biometrics based anonymous three-party authenticated key exchange protocol without using passwords. Chinese Physics B, Vol. 24, No. 11 (2015) 110505

[18] Qi Xie, Bin Hu, Ting Wu. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card. Nonlinear Dynamics, 2015, 79(4 ): 2345-2358

[19] Qi Xie, Zhixiong Tang. Biometrics based authentication scheme for session initiation protocol. SpringerPlus, (2016) 5: 1045-1058.

[20] Qi Xie, Xiao Tan, Bin Hu, Guilin Wang, Duncan S. Wong, Kefei Chen, and XiuYuan Yu. Probably Secure Anonymous Authenticated Key Agreement Protocols with Enhanced Security Models, Science, 360(6387):27-28, 2018APR 27

[21] Qi Xie , Lingfeng Hwang , Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city, Neurocomputing 347 (2019): 131-138.

[22] Qi Xie, Yanrong Lu, Xiao Tan,Zhixiong Tang, Bin Hu. Security and Efficiency Enhancement of an Anonymous Three-Party Password-Authenticated Key Agreement Using Extended Chaotic Maps. PLoS ONE, 2018, 13(10): e0203984.

[23] Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong. Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks, Wireless Personal Communications, (2017) 96:5881-5896.

[24] Xie Qi, Yu XiuYuan. Cryptanalysis of Tseng et al's authenticated encryption schemesApplied Mathematics and Computation, 2004, 158(1):1-5.

[25] Xie Qi. Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers. Applied Mathematics and Computation, 2005,168(2):776-782.

[26] Qi Xie , Zixuan Ding , and Bin Hu. A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. Security and Communication Networks, Volume 2021, Article ID 4799223, 12 pages.


电话:0571-28867633 邮编:311121
版权所有 © 2021 杭州师范大学数学学院 
公安备案号:33011002011919  浙ICP备11056902号-1