李晖教授
2018年10月26日 15:58  点击:

李晖 教授,博士生导师

博士学科:网络空间安全  密码学

硕士学科:网络空间安全  密码学 

工作单位:网络与信息安全学院

 

联系方式:

电子邮箱:lihui@mail.xidian.edu.cn

办公电话:(02981891867

办公地点:南校区行政辅楼214

 

个人简介:

李晖,博士生导师,现任西安电子科技大学网络与信息安全学院执行院长。ACM SIGSAC CHINA主席, 中国密码学会理事、安全协议专委会委员,中国中文信息学会大数据安全与隐私保护专委会副主任,中国电子学会信息论分会委员,IEEE学会会员。 1990年获得复旦大学无线电电子学理学学士学位, 1993年和1998年分别获得西安电子科技大学通信与电子系统工学硕士和工学博士学位,2009年在加拿大滑铁卢大学进行为期6个月的访问研究。主要的研究方向是密码信息安全、信息论与编码理论。

国家重点研发计划项目负责人, 主持863计划、国家科技支撑计划、新一代宽带移动通信国家重大专项、国家自然科学基金重点与面上项目、国防预研等项目15项,移动互联网安全陕西省创新团队负责人,获得国家级教学成果二等奖2,陕西省教学成果特等奖1,二等奖4项,陕西省优秀教材奖1项;省部级科技进步奖一等奖2项,二等奖3项,三等奖1项,2003年获得陕西省青年科技奖,2010年获陕西省教学名师奖,2017年获中央网信办网络安全优秀教师奖,2018年入选陕西省特支计划教学名师项目。获发明专利授权20余项,申请发明专利20项。论文170余篇。

 

主要研究方向

1.      云计算中的密码理论与安全协议

2.      移动互联网的隐私保护

3.      信息论与编码理论

 

 

科学研究:

一、目前研究团队承担的科研项目:

1)     网络信息安全方向:

  安全电子凭据服务及其监管关键技术,国家重点研发计划,2017.7-2020.122017YFB0802700

  互联网环境下隐私保护与取证,国家重点研发计划, 2017.7-2020.122017YFB0802201

  泛在网安全搜索基础理论与技术,国家自然科学基金重点项目,2018.01-2022.1261732022

  移动互联网服务及隐私保护的理论与关键技术研究, 广东省联合基金项目,2015.1-2018.12U1401251

  云计算环境下群组数据共享的隐私保护研究,国家自然科学基金面上项目,2013.1201661272457

  移动感知服务中的隐私保护关键技术研究,陕西省自然科学基础研究计划重大基础研究项目,2016.1-2018.122016ZDJC-04

  可信路径与跨域认证技术,863计划,2012-20142012AA013102

 

2)     信息论与编码方向:

  高移动性宽带无线通信网络重点理论基础研究,973计划项目,2012-20162012CB316100

 

二、已完成的项目:

  面向IMT-Advanced协作中继的网络编码技术,新一代移动通信重大专项,2011-2012

  网络编码的安全问题研究,博士点基金项目,2011-2013

  宽带移动网络安全体系结构及关键技术,新一代移动通信国家重大科技专项,

  云计算中数据安全理论与关键技术,中央高校基本科研业务费重点项目,2012-2014

  基于云计算的网络安全技术,新一代移动通信重大专项,2012-2013

  移动互联网流量端到端管理和优化,新一代移动通信重大专项,2012-2013

  社区电子服务系统安全支撑体系 ,国家科技支撑计划项目

  移动自组织网络分布式PKI关键技术研究,国家自然科学基金面上项目

  公众移动网络P2P安全技术,科技部863探索导向类项目

  网络安全管理与监控系统,广东省教育部联合项目

  XML安全认证协议研究,国家自然科学基金面上项目

  密码算法和安全协议自动化检测工具开发及测评系统构建,863目标导向类项目

  可信移动互联网络关键理论与应用研究,国家自然科学基金重点项目

  Turbo码实用编译码算法研究,国家自然科学基金项目

 

论文发表(部分):

Conference paper

1)     2018年:

  K Fan, J Wang, X Wang, H Li, Y YangSecure, efficient and revocable data sharing scheme for vehicular fogsPeer-to-Peer Networking and Applications 11 (4), 766-7772018

  K Fan, W Wang, W Jiang, H Li, Y YangSecure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoVPeer-to-Peer Networking and Applications 11 (4), 723-7342018

  Q Han, C Li, H Li, Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things, Future Generation Computer Systems 83, 269-277,2018

  S Ding, C Li, H LiA Novel Efficient Pairing-free CP-ABE Based on Elliptic Curve Cryptography for IoTIEEE Access2018

  K Fan, X Wang, K Suto, H Li, Y YangSecure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud ComputingIEEE Network 32 (3), 52-572018

  K Fan, W Jiang, H Li, Y YangLightweight RFID Protocol for Medical Privacy Protection in IoTIEEE Transactions on Industrial Informatics 14 (4), 1656-16652018

  X Liu, H Zhu, R Lu, H LiEfficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classificationPeer-to-Peer Networking and Applications 11 (2), 334-3472018

  F Shan, H Li, F Li, Y Guo, B NiuHAC: Hybrid Access Control for Online Social NetworksSecurity and Communication Networks 2018

 

2)     2015

  Kai Fan, Deng Hai, Lang  Wang, Hui Li, Yinyang Yang, Ciphertext retrieval in super-peer p2p network, GLOBECOM 2015

  Boyang Wang, Ming Li, Haitao Wang, Hui LI, Circular Range Search on Encrypted Spatial Data, IEEE CNS 2015

  Jin Cao ; Hui Li; Maode Ma ,  GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks, ICC 2015

  Jin Cao ; Hui Li ; MaodeMa ; Fenghua Li, UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks ,ICC 2015

  Shunrong Jiang ; Xiaoyan Zhu; Ripei Hao; Haotian Chi; Hui Li ; Liangmin WangLightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare, ICC 2015

  Weihao Li ; Ben Niu; Hui Li; Fenghua Li, Privacy-Preserving Strategies in Service Quality Aware   Location-Based Services, ICC 2015

  Wenhai Sun, Xuefeng Liu; Wenjing Lou,Thomas Hou, Hui Li, Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data, IEEE INFOCOM 2015

  Ben Niu; Qinghua Li; Xiaoyan Zhu; Guohong Cao; Hui Li , Enhancing Privacy through Caching in   Location-Based Services,  IEEE INFOCOM 2015

  Niu, Ben ; Zhu, Xiaoyan; Li, Weihao; Li, Hui; Wang, Yingjuan; Lu, Zongqing  A personalized two-tier cloaking scheme for privacy-aware location-based services, ICNC 2015, p 94-98,March 26, 2015

 

3)     2014

  Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIA CCS '14, Tokoyo, Japan

  Boyang Wang ; Ming Li ; Sherman S. M. Chow ; Hui Li, A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys, 2th IEEE Conference on Communications and Network Security, 2014.10, San FransicoUSA

  Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy, 10th International Conference on Security and Privacy in Communication NetworksBeijing, China

  Niu, Ben ;Zhu, Xiaoyan; WeihaoLiLi, Hui, EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs, IEEE MASS 2014, Philadelphia, USA,2014.10

  Niu, Ben ; Li, Qinghua; Zhu, Xiaoyan; Li, Hui, A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services, ICCCN, September 25, 2014, Shanghai, China

  Zhu, Hui ; Huang, Rong; Liu, Ximeng; Li, Hui, SPEMR: A new secure personal electronic medical record scheme with privilege separation, 2014 IEEE International Conference on Communications Workshops, ICC 2014, p 700-705, 2014,

  Zhu, Xiaoyan ; Chi, Haotian; Jiang, Shunrong; Lei, Xiaosan; Li, Hui, Using dynamic pseudo-IDs to protect privacy in location-based services, 2014 IEEE International Conference on Communications, ICC 2014, p 2307-2312, 2014,

  Zhu, Hui; Huang, Cheng; Li, Hui, MPPM: Malware propagation and prevention model in online SNS, 2014 IEEE International Conference on Communications Workshops, ICC 2014,Sydney, NSW, Australia

  Zhu, Xiaoyan; Liu, Jie; Jiang, Shunrong; Chen, Zengbao; Li, Hui, Efficient Weight-based Private Matching for proximity-based mobile social networks, 2014 IEEE International Conference on Communications, ICC 2014Sydney, NSW, Australia,2014

  Lai, Chengzhe;  Li, Hui; Lu, Rongxing; Jiang, Rong; Shen, Xuemin, SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, 2014 IEEE International Conference on Communications, ICC 2014, p 1011-1016, 2014

  Niu B, Zhang Z, Li X and Li H, Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services, in Proc. of IEEE ICC 2014

  Sun W, Yu S, Lou W, Hou T Y, and Li H, Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud, in Proc. of IEEE INFOCOM 2014

  Niu B, Li Q, Zhu X, Cao G and Li H, Achieving k-anonymity in Privacy-Aware Location-Based Services, in Proc. of IEEE INFOCOM 2014, Toronto, Canada

  Zhang, Yinghui ; Zheng, Dong; Chen, Xiaofeng; Li, Jin; Li, Hui, Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts, Lecture Notes in Computer Science, v 8782, p 259-273, 2014

 

4)     2013

  Niu B, Zhu X, Lei X, Zhang W, and Li H, EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services, in Proc. of IEEE GLOBECOM 2013

  Niu B, Zhu X, Liu J, Li Z, and Li H, Weight-aware Private Matching Scheme for Proximity-Based Mobile Social Networks," in Proc. of IEEE GLOBECOM 2013

  Zhu X, Chi H, Niu B, Zhang W, Li Z, and Li H, Mobicache: When k-anonymity meets cache, in Proc. of IEEE GLOBECOM 2013

  Niu B, Zhu X, Zhang T, Chi H, and Li H, P-match: Priority-aware Friend Discovery for Proximity-Based Mobile Social Networks, in Proc. of IEEE MASS, pp.351-355, 2013

  Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li, Storing Shared Data on the Cloud via Security-Mediator, ICDCS 2013

  Boyang Wang, Hui Li, Ming Li, Privacy Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics, ICC 2013.

  Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Thomas Hou and Hui Li, Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, ASIACCS 2013

  Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test,  ASIACCS 2013, distinguished paper award

  Boyang Wang, Baochun Li, Hui Li, Public Auditing for Shared Data with Efficient User Revocation in the Cloud, INFOCOM 2013, Apr.15-19, Turin, Italia.

  Ben Niu, Xiaoyan Zhu, Hui Li, An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems, IEEE WCNC 2013

  Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li, plus:$ Privacy-Preserving Pseudo-Location Updating System in Location-Based Services, IEEE WCNC 2013

 

Journal Paper

1)     2015

  Liu, X.; Sun, W.; Quan, H.; Lou, W.; Zhang, Y.; Li, H. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys, IEEE Transactions on Services Computing, online

  Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui,  Modelling information dissemination under privacy concerns in social media, Physica A: Statistical Mechanics and its Applications, v 449, p 53-63, May 1, 2016

  Zhu, Hui; Gao, Lijuan; Li, Hui, Secure and privacy-preserving body sensor data collection and query scheme, Sensors (Switzerland), v 16, n 2, February 1, 2016

  Zhu, Hui; He, Xiaoying; Liu, Ximeng; Li, Hui, PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system, International Journal of em[ant]bedded Systems, v 8, n 1, p 78-86, 2016

  Niu, Ben;(Zhu, Xiaoyan; Li, Qinghua ; Chen, Jie; Li, Hui*, A novel attack to spatial cloaking schemes in location-based services, FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCEVol.49,p125-132,2015

  Wang, Yong; Wu, Hao;Tang, Liyang; Li, Hui, The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS9(3):956-970,2015

  Lv, Xixiang ;  Mu, Yi; Li, Hui, Key management for Smart Grid based on asymmetric key-wrapping, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS,92(3): 498-512,2015

  Lai, Chengzhe; Li, Hui; Li, Xiaoqing; Cao, Jin, A novel group access authentication and key agreement protocol for machine-type communication, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 26(3):414-431,2015

  Li, Chen; Chen, Le; Lu, Rongxing; Li, Hui, Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding", IEEE TRANSACTIONS ON COMPUTERS, 64(3): 882-883,2015

  Zhu, Hui; Xue, Yingfang;Chen, Xiaofeng;Li, Qiang; Li, Hui, V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service, MOBILE INFORMATION SYSTEMS, 1-9,2015

  Wang B, Li B, Li H, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Service Computing, 8(1): 92-106,2015

 

2014

  Sun W, Wang B, Cao N, Li M, Lou W, Y Hou Y, Li H,Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(11): 3025-3035, 2014

  Wang, Boyang; Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing, Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud, JOURNAL OF COMMUNICATIONS AND NETWORKS,16(6): 592-599

  Zhang, Yinghui; Chen, Xiaofeng; Li, Jin;Li, Hui, Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks, COMPUTER NETWORKS, 75:192-211,series A,2014

  Li, Chen ; Lu, Rongxing;Li, Hui; Chen, Le;Li, Xiaoqing, Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding", IEEE COMMUNICATIONS LETTERS, 18(12): 2129-2132,2014

  Cao J, Ma M, Li H, Zhang Y,A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications Surveys & Tutorials, Vol.16, No.1, pp.283-302, 2014

  Xiang, Xinyin ; Li, Hui; Wang, Mingyu; Liu, Zhenhua, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 11(7):1780-1787, 2014

  Wang B, Li B, Li H, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing, 2(1): 43-56, 2014

  Lv X, Mu Y, Li H, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 9(1): 5-13, 2014

  Chengzhe Lai ; Hui Li; Xiaohui Liang; Rongxing Lu; Kuan Zhang; Xuemin Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet of Things Journal, 1(1): 46-57, 2014

  Wang, Boyang; Li, Hui; Liu, Xuefeng, SecureMatch: Privacy-preserving group matching in social networks for large groups, Journal of Computational Information Systems, 10(2):665-672, 2014

  Han, Qi ; Zhang, Yinghui; Chen, Xiaofeng; Li, Hui; Quan, Jiaxiang, Efficient and robust identity-based handoff authentication for EAP-based wireless networks, Concurrency Computation Practice and Experience, 26(8):1561-1573, 2014

  Li, Xiaoqing ; Li, Hui; A survey on data dissemination in VANETs, CHINESE SCIENCE BULLETIN, 59(32): 4190-4200

 

2013

  Lv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Zhang, Yaoyu An novel three-party authenticated key exchange protocol using one-time keyJournal of Network and Computer Applications, v 36, n 1, p 498-503, January 2013

Lai C, Li H, Lu R, Shen XS ,SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks, Computer Networks, Vol.57, No.17, pp.3492-3510, 2013

上一篇:
陈晓峰教授
下一条:
马建峰教授