李继国 简历
1970年12月生,福建师范大学计算机与网络空间安全学院教授/博导(闽江学者特聘教授)。2003年毕业于哈尔滨工业大学计算机科学与技术学院,获工学博士学位。2003年11月-2018年10月,在河海大学从事教学科研工作。曾先后应邀在澳大利亚卧龙岗大学、美国德州大学(圣安东尼奥分校)网络空间安全研究所访问学习。主要研究方向:密码学理论与技术、网络信息安全、云计算安全等。目前作为项目负责人主持或完成5项国家及多项部省级项目。在IEEE TIFS, IEEE TMC, IEEE TC, IEEE TDSC, IEEE TII, IEEE IoT, IEEE TCC,IEEE TSC, IEEE SJ, IEEE TETC、JoCS及计算机学报、软件学报、电子学报、通信学报、计算机研究与发展等国内外学术期刊上发表学术论文160多篇,其中SCI收录论文100多篇,JCR 一区40余篇,论文Google引用4000余次,ESI高被引论文7篇,出版信息安全教材2部,获授权国家发明专利30多项。获得2004年度江苏省高校“青蓝工程”优秀青年骨干教师培养人选,2008年入选河海大学首批优秀创新人才计划,2009年入选江苏省“六大人才高峰”第六批高层次人才项目资助计划。获得2010年江苏省优秀硕士学位论文指导教师。2019年入选“闽江学者奖励计划”特聘教授。入选爱思唯尔2020中国高被引学者(计算机科学与技术学科)。近年来指导研究生有1人获省优秀硕士学位论文,8人获得校优秀博士和硕士学位论文。
主要研究方向:密码学理论与技术、信息安全、云计算安全以及无线传感器网络安全等。
欢迎数学、网安、计算机等专业的学生报考本人硕士和博士研究生,希望自己的研究生具备如下能力: (1) 对科研感兴趣,能继续攻读博士学位。(2) 有良好的数学基础和编程能力。(3) 具有良好的英语读写能力。(4) 具有良好的团队精神和合作能力。
联系方式: Email:ljg1688@163.com,lijiguo@fjnu.edu.cn,电话:17302555826
教育经历(从大学本科开始,按时间倒排序):
2000/7 - 2003/11,哈尔滨工业大学,计算机软件与理论,信息安全,博士,
导师:李建中,曹珍富
1998/9 - 2000/7,哈尔滨工业大学,基础数学,密码学,硕士,导师:曹珍富
1992/9 - 1996/7,黑龙江大学,应用数学,学士
工作经历(科研与学术工作经历,按时间倒序排序):
2013/2 - 2014/1,Institute for Cyber Security in the University of Texas at San Antonio(美国),访问学者
2006/9 - 2007/3,School of Computer Science and Software Engineering, Centre for Computer and Information Security Research (CCISR) University of Wollongong(澳大利亚),访问学者
2009/5 - 2018/9,河海大学,计算机与信息学院,三级教授/博导
2003/11 河海大学,计算机与信息学院,破格副教授
1996/9 - 1998/9,齐齐哈尔大学,数学系,助教/讲师
学术奖励
1. 李继国,入选爱思唯尔2020中国高被引学者(计算机科学与技术学科)。
2. 李继国,福建省教育厅,2019年入选“闽江学者奖励计划”特聘教授。
3. 李继国,江苏省学位委员会,2010年江苏省优秀硕士学位论文指导教师。
4. 李继国,江苏省人力资源和社会保障厅,2009年入选江苏省“六大人才高峰”第六批高层次人才项目资助计划。
5. 李继国,河海大学,2008年入选河海大学首届优秀创新人才支持计划。
6. 李继国,江苏省教育厅,2004年度江苏省高校“青蓝工程”优秀青年骨干教师培养人选。
7. 李继国,联想研究院,2002年度联想呼唤少年英雄奖(全国6人)。
学术活动
目前为国家科技进步奖、国家自然科学基金、霍英东教育基金、教育部博士点基金和中国博士后基金等评审专家,中国密码学会会员,中国计算机学会会员,江苏省计算机学会计算机安全专业委员会常务委员,江苏省大数据专家委员会委员,江苏省高新技术企业认定专家,南京市三网融合工作专家委员会专家,南京市工业和信息化技术等专家,被邀请担任IEEE TII, IEEE TDSC, IEEE TPDS, IEEE TIFS, IEEE TSC,IEEE SJ, IEEE TCC,IEEE CL, IEEE Transactions on Emerging Topics in Computing, IEEE Transactions on Automation Science and Engineering, IEEE Transactions on Network and Service Management, ACM Transactions on Multimedia Computing, Communications and Applications (TOMM), Theoretical Computer Science, IET Information Security, Information Sciences, Journal of Systems and Software, The Computer Journal, Designs, Codes and Cryptography, Future Generation Computer System, Computers & Electrical Engineering, Computing and Informatics, Computers & Mathematics with Applications, Journal of Applied Mathematics, Security and Communication Networks, International Journal of Information Security, International Journal of Security and Networks, International Journal of Network Security, International Journal of Computer Mathematics, Journal of Information and Computer Security, Mathematical Problems in Engineering, Journal of Computer Science and Technology,International Journal of Communications, Network and System Sciences, International Journal of Computers and applications, The Scientific World Journal, Frontiers of Computer Science, Sensor Letter, Journal of Internet Technology,KSII Transactions on Internet and Information Systems,IETE Technical Review,Pervasive and Mobile Computing, SCIENCE CHINA Information Sciences, Engineering Science and Technology, an International Journal, Journal of Information Science and Engineering, International Journal of Communication Systems, Fundamenta Informaticae, Journal of Information Security and Applications, Alexandria Engineering Journal, Ad Hoc Networks, Computer Science and Information Systems, Transactions of Nanjing University of Aeronautics and Astronautics, Nonlinear Dynamics, Peer-to-Peer Networking and Applications, Cryptography, ACTA Press Journals, Transactions on Emerging Telecommunications Technologies, International Journal of Foundations of Computer Science, Information Processing Letters, PLOS ONE, IEEE Access, Journal of Computer Networks and Communications, ETRI Journal, Concurrency and Computation: Practice and Experience, Mobile Information Systems, Digital Signal Processing, Journal of Computer Security, Applied Computing and Informatics, Human-centric Computing and Information Sciences, Big Data Research, Neurocomputing, 中国科学、计算机学报、软件学报、电子学报、通信学报、中国通信、电子与信息学报、计算机研究与发展等100余学术期刊的特邀审稿人及CIS2010-2018, MINES 2010, SECRYPT 2012-2018, ICICS2013, NFSP2013, GC13 WS – BigSecurity 2013-2015, CSS 2014, ISPEC 2014-2015, Inscrypt 2014, ICIT 2014, 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data, NSS 2015, CS-2015, ICCCS2015, SSCC-2015, ProvSec 2016, BigSecurity'16, ISPEC 2016, Globecom'16,SAI'16, DPM 2016, ICCCS2016, BigSecurity'17, SSCC'17, ICCCS2017, ICACCI-2017, Globecom2017 CISS, INFOCOM18 WKSHPS BigSecurity'18, SAI-2018,SAI'20,SSCC-2020,IEEE TrustCom 2020, Globecom2021 CISS等国际会议的PC Member和Organizing Chair of ProvSec 2016。
主持或参加科研项目及人才计划项目情况(按时间倒序排序):
在研项目
1. 国家自然科学基金面上项目,62072104、云存储数据隐私保护与访问控制关键技术研究、2021/01-2024/12、在研、主持。
2. 国家自然科学基金面上项目,61972095、云存储数据完整性验证关键技术研究、2020/01-2023/12、在研、参加(排名第2)。
3. 福建省自然科学基金项目,2020J01159,云计算环境下属性基密码研究, 2020/08-2023/8、在研、主持。
4. 密码科学技术国家重点实验室开放课题, MM4FKT201911,泄露容忍公钥密码研究、2019/07-2021/6、在研、主持。
完成项目
1. 国家自然科学基金-通用技术基础研究联合基金,U1736112、容忍泄漏公钥密码关键技术研究、2018/01-2020/12、完成、主持。
2. 云计算环境下属性基密码关键技术研究,江苏省大数据安全与智能处理重点实验室开放课题,2018/01-2019/12、完成、主持。
3. 国家自然科学基金面上项目,61672207、云计算环境下属性基密码及其应用研究、2017/01-2017/12、完成、主持。
4. 江苏省自然科学基金项目,BK20161511,抗泄漏的公钥密码算法研究、2017/01-2019/12、完成、主持。
5. 中央高校基本科研业务费重点培育专项“云计算环境下公钥密码关键技术研究” (2016B10114),2017/01-2018/12、完成、主持。
6. 中美计算机科学研究中心开放课题“公钥密码及其在云计算中的应用研究”(KJR16039) 、2016/07-2017/12、完成、主持。
7. 中美计算机科学研究中心开放课题“新型公钥密码技术研究”、2017/01-2017/12、完成、主持。
8. 容忍泄漏公钥密码方案研究,广西密码学与信息安全重点实验室开放基金,2016/11-2018/11、完成、主持。
9. 国家自然科学基金面上项目,61272542、可证明安全的基于证书密码体制及其拓展研究、2013/01-2016/12、完成、主持。
10. 中国博士后基金项目“可证明安全的基于证书签名体制研究”(批准号:20100471373),2010.1~2011.3,完成、主持。
11. 江苏省“六大人才高峰”第六批高层次人才项目“新型公钥密码体制研究”(批准号:2009182),2010.1~2012.12,完成、主持。
12. 国家自然科学基金项目-主任基金“基于证书密码体制研究”(批准号:60842002),2009.1~2009.12,完成、主持。
13. 河海大学中央高校基本科研项目“可证明安全的基于证书签名体制研究”(批准号:B1020211),2009.7~2011.12,完成、主持。
14. 第二单位国家自然科学基金项目“高效无证书密码体制及其应用”(批准号:60673070),2007.1~2009.12,完成、主持。
15. 国家863项目“分布式可信计算系统研究”(批准号:2007AA01Z409),2007.7~2009.12,参加。
16. 国家自然科学基金项目“二次域密码、门限密钥托管及其应用”(批准号:60072018,该项目2003年结题,结题评价为优秀),2001.1~2003.12,参加。
17. 国家自然科学基金项目“密码系统与密码分析”(批准号:69772037),1998.1~2000.12,参加。
18. 黑龙江省自然科学基金项目“二次背包密码体制与二次密钥方案”,1997.1~1999.12,参加。
19. 江苏省公安厅项目“新型数字签名理论、应用及其关键技术研究”(200503002),2005.1~2006.12,主持。
教材/专著
[1] 李继国, 余纯武, 张福泰, 马春光等. 信息安全数学基础(信息安全系列), 武汉大学出版社, 2006.9
[2] 张福泰, 李继国, 王晓明, 林柏钢, 赵泽茂等. 密码学教程(信息安全系列), 武汉大学出版社, 2006.9
专利/著作权
申请密码与信息安全相关的发明专利60余项,已授权29项,获得软件著作权2项。
[1] 李继国, 郭宇燕, 张亦辰, 陈宁宇, 李非非. 一种基于身份的抗事后持续辅助输入泄漏加密系统及方法,申请日期:2017-01-12,授权号:ZL201710021759.1, 授权日期:2019-10-01
[2] 李继国, 李涛, 张亦辰, 王瑶, 李非非. 一种基于无证书批验证的车联网条件隐私保护方法与系统, 申请日期:2016-08-04,授权号:ZL 201610635508.8, 授权日期:2019-09-24
[3] 李继国,李涛,张亦辰,李非非,王瑶. 一种基于无证书聚合签名的车联网条件隐私保护方法与系统, 申请日期:2016-08-23,授权号:ZL201610706940.1, 授权日期:2019-09-10
[4] 李继国, 林啸楠, 张亦辰, 李非非, 王瑶. 一种可关键字搜索的外包密钥生成和解密的属性基系统及解密方法, 申请日期:2015-12-02,授权号:ZL 201510870146.6,授权日期:2019-7-12
[5] 李继国, 李涛, 张亦辰, 王瑶, 李非非. 基于无证书聚合签密的车联网条件隐私保护方法与系统, 授权号:ZL 201610622135.0, 申请日期:2016-08-01, 授权日期:2019-6-14
[6] 李继国,石岳蓉,陆阳,张亦辰. 一种隐私保护且支持用户撤销的基于属性加密方法和系统:申请日期:2015-7-6, 授权号:ZL 201510392617.7,授权日期:2019-04-30
[7] 李继国, 林啸楠, 张亦辰, 李非非, 王瑶. 一种关键字搜索的多授权中心外包属性基加密方法及系统, 申请日期:2016-8-1, 授权号: ZL 201610626408.9, 授权日期:2019-4-19
[8] 李继国,姚伟,张亦辰. 具有高效属性撤销的密文策略属性基加密方法. 申请日期:2015-7-14, 授权号:ZL 201510413994.4,授权日期:2019-01-11
[9] 李继国, 张乐, 陈超东. 一种无证书在线离线签密方法与系统, 申请日期:2015-03-04, 申请号:ZL 201410614542.8,授权日期:2018.10.23
[10] 李继国, 郭俊, 张亦辰, 李非非. 一种匿名消息认证系统及其消息签名方法, 授权号: ZL 201510815686.4, 授权日期:2018-8-28
[11] 李继国,姚伟,张亦辰,沙凤杰,林啸楠,汪梅萍. 一种具有高效用户撤销的密文策略属性基加密方法. 申请日期:2015-6-30, 授权号:ZL 201510375470.0,授权日期:2018-04-20
[12] 李继国,赵雪霞,张亦辰. 一种基于无证书条件代理重加密系统与方法:申请日期:2015-7-22, 授权号:ZL 201510434184.7,授权日期:2018-04-20
[13] 李继国,石岳蓉,陆阳,张亦辰,王瑶,李磊,沙凤杰,姚伟,林啸南,张全领,汪海萍,赵晶晶,郭俊,赵雪霞. 一种基于属性的加密方法和系统. 申请号:20140612226.7,授权号:ZL 20140612226.7,2017-10-10
[14] 李继国, 陈超东, 张乐. 一种基于身份的抗弹性泄漏加密方法和系统, 申请日期:2015-01-28, 授权号:ZL 201410614545.1,授权日期:2017-09-19
[15] 李继国,赵雪霞,张亦辰,陆阳,王瑶,李磊,沙凤杰,姚伟,林啸南,张全领,汪海萍,赵晶晶,郭俊,石岳蓉. 一种基于证书条件代理重加密方法和系统:申请日期:2014-11-04, 授权号:ZL 20140614744.2,授权日期:2017-06-16
[16] 李继国, 钱惠玲, 张亦辰, 滕美林. 一种多授权中心的加密方法:发明专利,申请日期:2013-7-2, 授权号:ZL 201310275133.5,授权日期:2017-02-08
[17] 陆阳, 李继国. 一种基于证书代理重加密方法及系统:发明专利,申请日期:2013-11-15,授权号:ZL201310572508.4,授权日期:2016-07-06
[18] 李继国, 钱惠玲, 张亦辰, 滕美林. 一种基于属性保护的多授权中心加密方法:发明专利,申请日期:2013-7-2, 授权号:ZL 201310276499.4,授权日期:2016-06-01
[19] 陆阳, 李继国. 一种基于短期证书的密钥封装方法, 申请日期:2013-5-22,授权号:ZL 201310196758.2,2016-03-02
[20] 李继国, 张亦辰, 汪鑫, 蒋勇, 钱惠玲, 滕美林, 蒋鑫, 郭宇燕. 基于离散对数的有向传递签名方法:发明专利,申请日期:2013-04-25, 授权号:ZL201310149352.9,授权日期:2016-04-27
[21] 李继国, 张亦辰, 蒋鑫, 黄丕全, 钱惠玲, 滕美林, 汪鑫, 郭宇燕. 免费接收者数量可控的广播加密方法:发明专利,申请日期:2013-04-25, 授权号:ZL201310149490.7,授权日期:2016-04-20
[22] 李继国, 王飞, 张亦辰, 于启红, 钱惠玲, 滕美林, 郭宇燕, 石岳蓉, 郭俊, 赵雪霞, 赵晶晶. 一种对诚实参与者公平的理性多秘密分享方法;专利授权号:ZL201310149090.6, 授权日期:2015-12-09
[23] 李继国, 许峰, 孙传明. 一种用于证明远程平台安全属性的远程证明方法. 专利授权号:ZL 201110386340.9, 授权日期:2014-11-19
[24] 李继国, 罗翀, 张亦辰. 一种隐藏得票数的电子投票方法. 专利授权号:ZL 201110425662.X, 授权日期:2014-09-10
[25] 李继国, 杨海珊, 张亦辰. 一种带标签的基于证书密钥封装方法及系统. 专利授权号:ZL 201110425754.8, 授权日期:2014-08-06
[26] 李继国, 王芝伟, 张亦辰. 基于证书的数字签名系统及签名方法. 专利授权号:ZL 201110426475.3, 授权日期:2014.09.10
[27] 李继国, 滕荟芸, 张亦辰. 基于证书的前向安全签名方法及系统. 专利授权号:ZL 201110425553.8, 授权日期:2014.04.16
[28] 李继国, 徐晨. 基于改进CURE聚类算法的无监督异常检测方法和系统. 专利授权号:ZL 200910027374.1, 授权日期:2012-11-21
[29] 李继国, 姜平进. 一种基于身份的数字签名方法. 专利授权号:ZL 200910027375.6, 授权日期:2011-08-03
[30] 李继国, 郭宇燕, 张亦辰, 陈宁宇, 李非非. 一种分层的基于属性的抗持续辅助输入泄漏加密系统及方法, 申请号:201710025695.2, 申请日期:2017-01-13
[31] 李继国, 郭宇燕, 张亦辰, 陈宁宇, 李非非. 一种基于证书的抗持续泄漏加密系统及方法, 申请号:201710037101.X, 申请日期:2017-01-19
[32] 李继国,沙凤杰,张亦辰,姚伟,林啸楠,汪海萍. 一种固定密文长度的可验证外包解密的属性基系统及方法. 申请号:201510154824.9
[33] 陆阳, 张全领, 李继国. 一种基于证书的两方认证密钥协商方法与系统, 受理号:201510247662.3
[34] 陆阳, 张全领,李继国. 一种分布式的基于(k,n)门限证书加密方法及系统, 申请号:201410387870.9
[35] 陆阳, 张全领,李继国. 一种n层CA结构的基于证书加密的方法及系统,申请号:201410387721.2
[36] 徐晨, 李继国. 基于数据挖掘的入侵检测系统V1.0. 计算机软件著作权登记证书. 编号:软著登字第0148688号. 登记号:2009SR021689.
[37] 李继国, 张亦辰. 基于属性的远程证明系统V1.0. 计算机软件著作权登记证书. 编号:软著登字第0450211号. 登记号:2012SR082175.
[38] 李继国, 张亦辰, 阎浩. 一种验证云存储中数据持有完整性的协议及其系统, 申请号: 201910039891.4, 申请日期:2019-01-16, 福州君诚知识产权代理有限公司
[39] 李继国, 阎浩, 张亦辰. 基于无证书的云存储中共享数据的完整性公开验证协议, 申请号: 201910039893.3, 申请日期:2019-01-16, 福州君诚知识产权代理有限公司
[40] 张亦辰, 李继国, 阎浩. 一种基于身份的多备份远程数据持有验证方法, 申请号: 2019102467567, 申请日期:2019-03-29, 福州元创专利商标代理有限公司
[41] 李继国, 阎浩, 张亦辰. 一种指定验证者的云存储中远程数据持有验证方法, 申请号: 2019102467529, 申请日期:2019-03-29, 福州元创专利商标代理有限公司
[42] 张亦辰,李继国. 一种隐藏访问结构的分布式密文策略属性基加密方法, 申请号: 2019103603056, 申请日期:2019/4/30, 福州元创专利商标代理有限公司
[43] 李继国,张亦辰. 一种可追踪的分层多授权密文策略属性基认证方法, 申请号: 2019103610577, 申请日期:2019/4/30, 福州元创专利商标代理有限公司
[44] 李继国,张亦辰,胡声洲. 一种媒介混淆的分布式多授权方密文策略属性基加密方法, 申请号: 2019103698198, 申请日期:2019/5/6, 福州元创专利商标代理有限公司
[45] 张亦辰,李继国,胡声洲. 一种基于多值访问结构的媒介混淆的多授权方属性基加密方法与系统, 申请号: 201910427208.4, 申请日期:2019/5/22, 福州市博深专利代理事务所
[46] 李继国,张亦辰,陈礼青. 一种私钥和密文长度固定的广播加密方法和系统, 申请号: 2019104317460, 申请日期:2019/5/23, 福州元创专利商标代理有限公司
[47] 李继国,张亦辰,王敏,章如愿,康曌哲. 一种抗关键词猜测攻击的可搜索属性基加密方法, 申请号: 2019114034487, 申请日期:2019/12/30, 福州元创专利商标代理有限公司
[48] 李继国,张亦辰,宁建廷,黄欣沂. 一种可防密钥滥用的属性基加密方法与系统, 申请号: 202010111296X, 申请日期:2020/2/24, 福州元创专利商标代理有限公司
[49] 李继国,张亦辰,陈礼青,杨书略,陈宇,易鹏. 一种基于证书广播加密方法和系统, 申请号: 201910118229.0, 申请日期:2020/2/26,福州君诚知识产权代理有限公司
[50] 李继国,张亦辰,陈礼青,杨书略,章如愿,康曌哲. 一种广播加密方法及系统, 申请号: 202010302855.5, 申请日期:2020/4/17,福州市博深专利代理事务所
[51] 易 鹏,李继国,张亦辰,陈宇,杨书略. 一种基于云计算下电力负荷特征数据均值聚类的方法与系统, 申请号: 202010347852.3, 申请日期:2020/4/28, 福州元创专利商标代理有限公司
[52] 李继国,张亦辰,陈礼青,杨书略,陈宇,易鹏. 一种匿名基于身份广播加密方法和系统, 申请号: 202010394088.5, 申请日期:2020/5/11, 福州君诚知识产权代理有限公司
[53] 李继国,张亦辰,陈礼青,杨书略,章如愿,康曌哲. 一种可传输个人消息的基于证书匿名广播加密方法和系统, 申请号: 202010393284.0, 申请日期:2020/5/11, 福州君诚知识产权代理有限公司
[54] 李继国,张亦辰,胡声洲,杨书略,章如愿,康曌哲. 一种无密钥托管的多授权属性基加密方法和系统, 申请号: 202010560307.2, 申请日期:2020/6/18, 福州君诚知识产权代理有限公司
[55] 李继国, 张亦辰,周李京,朱留富,章如愿,康曌哲. 一种多授权机构加密方法及系统,申请号: 202010805683.3, 申请日期:2020-08-12, 福州市博深专利代理事务所
[56] 李继国, 张亦辰,陈宁宇,朱留富,章如愿,康曌哲,杨书略. 一种可共享解密的加密方法及系统, 申请号: 202010805692.2, 申请日期:2020/8/12, 福州市博深专利代理事务所
[57] 李继国, 张亦辰,周李京,朱留富,章如愿,康曌哲. 一种去中心化的多授权机构属性基加密方法和系统,福州元创专利商标代理有限公司
[58] 李继国, 张亦辰,陈宁宇,朱留富,章如愿,康曌哲,杨书略. 一种高效的可验证共享解密属性基加密方法和系统,福州元创专利商标代理有限公司
[59] 李继国, 张亦辰,秦璐璐,朱留富,章如愿,康曌哲,杨书略. 具有指定条件关键字搜索功能的代理重加密方法和系统, 申请号: 202010864442.6, 申请日期:2020/8/25, 福州君诚知识产权代理有限公司
[60] 李继国, 张亦辰,陈宁宇,章如愿,康曌哲,朱留富,杨书略. 一种高效的文件分等级属性基加密方法和系统, 申请号: 202010864449.8, 申请日期:2020/8/25, 福州君诚知识产权代理有限公司
[61] 李继国, 陈宇,张亦辰,康曌哲,朱留富. 分布式属性基服务器辅助签名方法及系统,申请号: 2021105201577, 申请日期:2021/5/13, 福州元创专利商标代理有限公司
论文发表
在Journal of Computer Security、IEEE Transactions on Information Forensics and Security, IEEE Transactions on Computers, IEEE Transactions on Industrial Informatics, IEEE Transactions on Cloud Computing, IEEE Transactions on Dependable and Secure Computing, IEEE Internet of Things Journal, IEEE Transactions on Services Computing, IEEE Systems Journal, IEEE Transactions on Emerging Topics in Computing, IEEE Transactions on Broadcasting, Information Sciences, Journal of Systems and Software, The Computer Journal, Theoretical Computer Science, Future Generation Computer Systems, IET Information Security, Computers & Mathematics with Applications, JCST, Journal of Communications and Networks, International Journal of Network Security, Security and Communication Networks, Computing and Informatics, Concurrency and Computation Practice and Experience, International Journal of Computer Mathematics, International Journal of Information Security, KSII Transactions on Internet and Information Systems, Journal of Information Science and Engineering, International Journal of Communication Systems, Information Technology and Control, Fundamenta Informaticae, Soft Computing, Cluster Computing, 计算机学报,软件学报、电子学报、计算机研究与发展、电子与信息学报和通信学报等国内外核心权威学术期刊和EuroPKI’07, Infosecu’04等重要国际会议发表学术论文160余篇,其中SCI收录论文100余篇,一级学报26篇。ESI高被引论文7篇,JCR 一区40余篇,中国计算机学会推荐国际学术刊物A, B类期刊28篇,论文Google引用 4000余次。发表和录用的部分代表性研究成果列表如下:
[1] Qiuyun Tong,Yinbin Miao, Jian Weng, Ximeng Liu, Raymond Choo Kim-Kwang, Jiguo Li, Robert H. Deng. VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-owner Multi-user Settings, IEEE Transactions on Services Computing, accepted with minor revision, 20210327.
[2] Yang Lu, Jiguo Li, and Fen Wang. Pairing-Free Public Key Authenticated Encryption with Keyword Search against Adaptively-Chosen-Targets Adversaries. IEEE Transactions on Mobile Computing, DOI:10.1109/TMC.2021.3077508.
[3] 王化群, 刘哲, 何德彪, 李继国. 公有云中身份基多源IoT终端数据PDP方案, 通信学报,20210308,accepted
[4] Feng Wang, Li Xu, Jiguo Li, Kim-Kwang Raymond Choo. Lightweight public/private auditing scheme for resource-constrained end devices in cloud storage. IEEE Transactions on Cloud Computing, accepted, 2020.11.13, Digital Object Identifier: 10.1109/TCC.2020.3045806 (SCI, JCR一区)
[5] Ningyu Chen, Jiguo Li, Yichen Zhang and Yuyan Guo. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage. IEEE Transactions on Computers, accepted, 01-Nov-2020,DOI: 10.1109/TC.2020.3043950 (SCI, JCR一区,CCF A)
[6] Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang. ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack, Computer Standards and Interfaces, 7 September 2020, 74: 103471 (2021) https://doi.org/10.1016/j.csi.2020.103471 (SCI)
[7] Shengzhou Hu, Jiguo Li, Yang Lu, Yichen Zhang. Constant Ciphertext Size Multi-Authority Attribute-Based Scheme without Key Escrow. Journal of Internet Technology, 2020, DOI: 10.3966/160792642020112106007 (SCI)
[8] Yang Lu, Jiguo Li, Fen Wang, Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs. IEEE Transactions on Industrial Informatics, APRIL 2021, 17(4): 2696-2706. Digital Object Identifier: 10.1109/TII.2020.3006474(SCI, JCR一区)
[9] Liqing Chen, Jiguo Li, Yang Lu and Yichen Zhang, Adaptively Secure Certificate-based Broadcast Encryption and Its Application to Cloud Storage Service. Information Sciences, 2020, 538: 273-289. DOI: 10.1016/j.ins.2020.05.092 (SCI, JCR一区, CCF B)
[10] Liqing Chen, Jiguo Li, Yang Lu, and Yichen Zhang, Anonymous Certificate-based Broadcast Encryption with Personalized Messages. IEEE Transactions on Broadcasting, DECEMBER 2020, 66(4): 867-881. DOI: 10.1109/TBC.2020.2984974 (SCI, JCR一区)
[11] Jiguo Li, Hao Yan, and Yichen Zhang. Identity-based Privacy Preserving Remote Data Integrity Checking for Cloud Storage. IEEE Systems Journal, MARCH 2021,15(1): 577-585, DOI:10.1109/JSYST.2020.2978146 (SCI, JCR一区)
[12] Chen Shen, Yang Lu, Jiguo Li. Expressive Public-Key Encryption with Keyword Search: Generic Construction from KP-ABE and an Efficient Scheme over Prime-Order Groups. IEEE Access, DOI: 10.1109/ACCESS.2019.2961633
[13] Chenbin Zhao, Li Xu, Jiguo Li, Feng Wang, He Fang: Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage. IEEE Access 7: 160459-160471 (2019) (SCI, JCR一区)
[14] Yichen Zhang and Jiguo Li. Constant Size Ciphertext Distributed CP-ABE Scheme with Privacy Protection and Fully Hiding Access Structure. IEEE Access, Vol.7, 47982-47990,2019, DOI: 10.1109/ACCESS.2019.2909272 (SCI, JCR一区)
[15] Jiguo Li and Yichen Zhang, Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANET. Wireless Personal Communications, 2020, 111 : 255-1269. DOI: 10.1007/s11277-019-06912-y. (SCI)
[16] Lei Zhang, Hu Xiong, Qiong Huang, Jiguo Li(通信作者), Kim-Kwang Raymond Choo, Jiangtao Li. Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities. IEEE Transactions on Services Computing, DOI:10.1109/TSC.2019.2937764 (SCI, JCR一区)
[17] Yang Lu, Jiguo Li and Yichen Zhang. Privacy-Preserving and Pairing-Free Multi-Recipient Certificateless Encryption with Keyword Search for Cloud-Assisted IIoTs. IEEE Internet of Things Journal, APRIL 2020, 7(4): 2553-2562. DOI: 10.1109/JIOT.2019.2943379 (SCI, JCR一区)
[18] Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, and Debang Wang. Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Transactions on Cloud Computing, DOI:10.1109/TCC.2020.2975184 (SCI, JCR一区)
[19] Jiguo Li, Hao Yan, and Yichen Zhang. Efficient Identity-based Provable Multi-Copy Data Possession in Multi-Cloud Storage. IEEE Transactions on Cloud Computing, DOI: 10.1109/TCC.2019.2929045 (SCI, JCR一区)
[20] Yang Lu, Quanling Zhang, and Jiguo Li. A Certificate-Based AKA Protocol Secure Against Public Key Replacement Attacks. The International Arab Journal of Information Technology (IAJIT), 16(4): 754-765 (2019) (SCI)
[21] Jiguo Li, Shengzhou Hu, Yichen Zhang and Jinguang Han, A Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Mediated Obfuscation, Soft Computing, MAR 2020, 24 (3): 1869-1882. (SCI, JCR一区)
[22] Yang Lu, Jiguo Li. Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks. China Communications, 2019, 16(7): 156-173 (SCI)
[23] Yang Lu, Jiguo Li, Yichen Zhang. SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search, IEEE Access, 2019, 7(1): 40878-40892. DOI: 10.1109/ACCESS.2019.2905554 (SCI, JCR一区)
[24] Liqing Chen, Jiguo Li, Yichen Zhang. Adaptively Secure Efficient Broadcast Encryption with Constant-size Secret Keys and Ciphertext, Soft Computing, 2020, 24(6): 4589-4606. https://doi.org/10.1007/s00500-019-04219-5 (SCI, JCR一区)
[25] Jiguo Li, Ningyu Chen, and Yichen Zhang. Extended File Hierarchy Access Control Scheme with Attribute Based Encryption in Cloud Computing. IEEE Transactions on Emerging Topics in Computing, APRIL-JUNE 2021,9(2): 983-993. DOI: 10.1109/TETC.2019.2904637(SCI, JCR一区)
[26] Hao Yan, Jiguo Li, and Yichen Zhang. Remote data checking with designated verifier in cloud storage. IEEE Systems Journal, JUNE 2020, 14(2): 1788-1797. DOI: 10.1109/JSYST.2019.2918022, 2019/2/12 (SCI, JCR一区)
[27] Yang Lu, Jiguo Li, and Yichen Zhang. Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks. IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2019.2910113 (SCI, 中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR 一区)
[28] Yinbin Miao, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Jiguo Li, Hongwei Li, Jianfeng Ma. Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Transactions on Dependable and Secure Computing. 2021,18(3): 1080-1094. DOI: 10.1109/TDSC.2019. 2897675 (SCI, JCR一区, CCF A)
[29] Yinbin Miao, Ximeng Liu, Robert H. Deng, Hongjun Wu, Hongwei Li, Jiguo Li, Dapeng Wu, Hybrid Keyword-Field Search with Efficient Key Management for Industrial Internet of Things, in IEEE Transactions on Industrial Informatics. doi: 10.1109/TII.2018.2877146 (SCI, JCR一区)
[30] Yang Lu, Gang Wang, Jiguo Li. Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. Information Sciences, Dec. 2019, 479: 270-276. (SCI, CCF B)
[31] Yang Lu and Jiguo Li, Constructing designated server public key encryption with keyword search schemes withstanding keyword guessing attacks. International Journal of Communication Systems, 2019, 32: e3862. DOI: 10.1002/dac.3862 (SCI)
[32] Li Jiguo, Yu Qihong, Zhang Yichen. Hierarchical Attribute Based Encryption with Continuous Leakage-Resilience. Information Sciences, 2019, Vol. 484, 113–134. https://doi.org/ 10.1016/j.ins.2019.01.052 (SCI, IDS Number: 125NI, Impact Factor: 4.832 (2017), 5-Year Impact Factor: 4.732, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区, 高倍引)
[33] Yang Lu, Jiguo Li, Efficient Searchable Public Key Encryption against Keyword Guessing Attacks for Cloud-Based EMR Systems, Cluster Computing, 2019, 22(1): 285–299. DOI: 10.1007/s10586-018-2855-y (SCI)
[34] Jiguo Li, Liqing Chen, Yang Lu, and Yichen Zhang. Anonymous Certificate-based Broadcast Encryption with Constant Decryption Cost. Information Sciences, 2018, 454-455, 110–127. (SCI, IDS Number: 125NI, Impact Factor: 4.832 (2017), 5-Year Impact Factor: 4.732, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)
[35] Li Jiguo, Yu Qihong, Zhang Yichen. Key-policy attribute-based encryption against continual auxiliary input leakage. Information Sciences, 470 (2019) 175–188. DOI:10.1016/j.ins.2018.07.077 (SCI, IDS Number: 125NI, Impact Factor: 4.832 (2017), 5-Year Impact Factor: 4.732, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区, 高倍引)
[36] Jiguo Li, Hao Yan, and Yichen Zhang. Certificateless public integrity checking of group shared data on cloud storage. IEEE Transactions on Services Computing, JANUARY/FEBRUARY 2021, 14(1): 71-81. DOI: 10.1109/TSC.2018.2789893 (SCI&EI) (中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR 一区)
[37] Li Jiguo, Yu Qihong, Zhang Yichen. Identity-based broadcast encryption with continuous leakage resilience. Information Sciences, 429(3):177-193, 2018 https://doi.org/ 10.1016/j.ins.2017.11.008 (SCI, IDS Number: 125NI, Impact Factor: 4.832 (2017), 5-Year Impact Factor: 4.732, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)
[38] Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang and Futai Zhang. Continuous Leakage-Resilient Certificate-Based Encryption. Information Sciences, 2016, 355–356 (2016) 1–14 DOI:10.1016/j.ins.2016.03.032. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区,引用次数:10)
[39] Jiguo Li, Zhiwei Wang, Yichen Zhang. Provably Secure Certificate-Based Signature Scheme without Pairings. Information Sciences, 2013, 233(6): 313-320. DOI information: 10.1016/j.ins.2013.01.013 (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区,引用次数:37)
[40] Yang Lu, Jiguo Li (通信作者). A Provably Secure Certificate-Based Encryption Scheme against Malicious CA Attacks in the Standard Model. Information Sciences, 2016, 372: 745-757, 2016. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区,引用次数:4)
[41] Hao Yan, Jiguo Li (通信作者), Jinguang Han, Yichen Zhang. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage, IEEE Transactions on Information Forensics and Security, 2017, 12(1): 78-88. (SCI, Impact Factor: 2.441 (2015),中国计算机学会推荐国际学术刊物与会议(网络与信息安全)A类期刊, EI, JCR 一区,引用次数:6)
[42] Jiguo Li, Yao Wang and Yichen Zhang, Jinguang Han. Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Transactions on Services Computing, MAY/JUNE 2020, 13(3): 478-487. DOI: 10.1109/TSC.2017.2710190 (SCI&EI) (中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR 一区, 高倍引)
[43] Jinguang Han, Ye Yang, Joseph K. Liu, Jiguo Li, Kaitai Liang, Jian Shen. Expressive attribute-based keyword search with constant-size ciphertext. Soft Comput (2018) 22:5163–5177. https://doi.org/10.1007/s00500-017-2701-9 (SCI)
[44] Jiguo Li, Xiaonan Lin, Yichen Zhang and Jinguang Han. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Transactions on Services Computing, 2017, 10(5): 715-725. 10.1109/TSC.2016.2542813. (SCI&EI, Impact Factor: 3.049 (2014),中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊,JCR一区, 引用次数:128, 高倍引)
[45] Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Transactions on Services Computing, 2017, 10(5): 785-796. DOI: 10.1109/TSC.2016.2520932. (SCI&EI, Impact Factor: 3.049 (2014),中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊,JCR一区, 引用次数:134, 高倍引)
[46] Jiguo Li, Wei Yao, Jinguang Han, Yichen Zhang and Jian Shen. User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage, IEEE Systems Journal, June, 2018, 12(2): 1767-1777. DOI: 10.1109/JSYST.2017.2667679. (SCI, Impact Factor: 2.36 (2016),JCR一区, 引用次数:68, 高倍引)
[47] Lu Yang and Li Jiguo. A Pairing-Free Certificate-Based Proxy Re-encryption Scheme for Secure Data Sharing in Public Clouds. Future Generation Computer Systems, 2016, 62: 140-147. DOI: 10.1016/j.future.2015.11.012. (SCI, 影响因子:2.639, 中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊,中国计算机学会推荐国际学术刊物(计算机体系结构/并行与分布计算/存储系统)C类期刊, JCR一区, 引用次数:12)
[48] Jiguo Li, Xinyi Huang, Meixue Hong,Yichen Zhang. Certificate-based Signcryption with Enhanced Security Features. Computers and Mathematics with Applications. 2012, 64(6) : 1587-1601, (SCI, IDS Number: 012PD, Impact Factor: 1.697 (2014),5-Year Impact Factor: 2.170, JCR一区, 引用次数:66)
[49] Tao Li, Jiguo Li (通信作者), Jing Zhang. A Cryptanalysis Method based on Niche Genetic Algorithm. Applied Mathematics & Information Sciences, 2014, 8(1): 279-285 (IDS Number: AA9AQ, 2013 Impact Factor 1.232, SCI, JCR 一区, 引用次数:2)
[50] Yang Lu, Quanling Zhang, Jiguo Li. Comment on a Certificateless One-Pass and Two-Party Authenticated Key Agreement Protocol. Information Sciences, 369: 184-187, 2016. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区, 引用次数:1)
[51] Jian Shen, Anxi Wang, Chen Wang, Jiguo Li, and Yan Zhang, “Content-centric Group User Authentication for Secure Social Networks,” IEEE Transactions on Emerging Topics in Computing, 2017, DOI. 10.1109/TETC.2017.2779163. (SCI, EI, JCR 一区)
[52] Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon Yuen, Jiguo Li, Jie Cao. Accountable Mobile E-Commerce Scheme via Identity-based Plaintext-Checkable Encryption. Information Sciences, 2016, 345: 143-155. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区, 引用次数:8)
[53] Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu. An Efficient Short Certificate-based Signature Scheme. Journal of Systems and Software, 2012, 85(2): 314-322. DOI: http://dx.doi.org/10.1016/j.jss.2011.08.014 (SCI,IDS Number: 893WH, Impact Factor: 1.352 (2014),5-Year Impact Factor: 1.485, 中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊,JCR二区,引用次数:52)
[54] Qihong Yu, Jiguo Li (通信作者), Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang. Certificate-Based Encryption Resilient to Key Leakage, Journal of Systems and Software, 2016, 116, 101–112. DOI: 10.1016/j.jss.2015.05.066 (SCI,IDS Number: 893WH, Impact Factor: 1.352 (2014),5-Year Impact Factor: 1.485, 中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊,JCR二区,引用次数:12)
[55] Huiling Qian, Jiguo Li (通信作者), Yichen Zhang, Jinguang Han. Privacy Preserving Personal Health Record Using Multi-Authority Attribute-Based Encryption with Revocation. International Journal of Information Security, 2015, 14(6): 487-497. (SCI,EI 20144900283750, Impact Factor: 1.279 (2015-2016), JCR 二区,中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊,中国计算机学会推荐国际学术刊物与会议(信息安全)C类期刊,引用次数:32). DOI: 10.1007/s10207-014-0270-9.
[56] Yang Lu, Jiguo Li. A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. KSII Transactions on Internet and Information Systems, 2019, 13(3): 1502-1522.
[57] Yang Lu, Jiguo Li. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks. The Scientific World Journal, 2014, http://dx.doi.org/10.1155/2014/295419. (IDS Number: AH7JO, 2013 Impact Factor 1.219, SCI, JCR二区,引用次数:2)
[58] Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, and Yuexin Zhang. Provably Secure Certificate-based Key-Insulated Signature Scheme. Concurrency and Computation Practice and Experience, 2014, 26:1546-1560. DOI: 10.1002/cpe.3019 (IDS Number: AF4CM, 2013 Impact Factor 0.784, SCI, JCR 二区,引用次数:30)
[59] Li Jiguo, Cao Zhenfu and Zhang Yichen. Nonrepudiable Proxy Multi-Signature Schemes. Journal of Computer Science and Technology. 2003, 18(3): 399-402 (SCI, EI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊,JCR三区,引用次数:99)
[60] Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. The Computer Journal, 2016, 59(7): 1066-1075. (SCI, Impact Factor: 0.787 (2014),5-Year Impact Factor: 0.962,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊,JCR三区,引用次数:8)
[61] Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Constructions of Certificate-Based Signature Secure against Key Replacement Attacks. Journal of Computer Security, 2010,18(3): 421-449(EI, 中国计算机学会推荐国际学术刊物与会议(信息安全)B类期刊,引用次数:44)
[62] Jiguo Li, Haiting Du, Yichen Zhang. Certificate-based Key-Insulated Signature in the Standard Model. The Computer Journal, 2016, 59(7):1028-1039. (SCI, Impact Factor: 0.787 (2014),5-Year Impact Factor: 0.962,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊,JCR三区,引用次数:3)
[63] Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang and Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme. The Computer Journal, 2015, 58(4): 853-866. 10.1093/comjnl/bxt141 (SCI, IDS Number: CO4NL, Impact Factor: 0.787 (2014),5-Year Impact Factor: 0.962,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊,JCR三区,引用次数:8)
[64] Yang Lu, Jiguo Li, Jian Shen. Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. The Computer Journal, 2017, 60(12): 1729-1744. (SCI, IDS Number: CO4NL, Impact Factor: 0.787 (2014),5-Year Impact Factor: 0.962,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊,JCR三区)
[65] Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, and Jian Shen. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Security and Communication Networks, 2017, doi:10.1155/2017/ 3596205. (SCI&EI, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区,引用次数:5)
[66] Qihong Yu, Jiguo Li (通信作者), Yichen Zhang. Leakage-Resilient Certificate-Based Encryption, Security and Communication Networks, 2015, 8: 3346-3355, DOI:10.1002/sec.1258, 2015 (SCI&EI, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区,引用次数:10).
[67] Yuyan Guo, Jiguo Li (通信作者), Yichen Zhang, Jian Shen. Hierarchical Attribute-Based Encryption with Continuous Auxiliary Inputs Leakage. Security and Communication Networks, 2016, 9(18): 4852-4862. DOI: 10.1002/sec.1659. (SCI&EI, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区)
[68] Jiguo Li, Yuerong Shi, Yichen Zhang. Searchable Ciphertext-Policy Attribute-Based Encryption with Revocation in Cloud Storage, International Journal of Communication Systems, vol. 30, 2017, Art. no. e2942, doi: 10.1002/dac.2942. (SCI, Impact Factor: 1.106,JCR 三区,引用次数:22).
[69] Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Inputs Leakage. Security and Communication Networks, 9(10): 1016-1024 (2016). (SCI&EI, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区,引用次数:10)
[70] Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu. Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme. Journal of Communications and Networks. 2008, 10(1): 10-17. (SCI, 000254805800003,2014 Impact Factor 1.007, JCR三区,引用次数:26)
[71] Jiguo Li, Jingjing Zhao, Yichen Zhang. Certificateless Online/Offline Signcryption Scheme, Security and Communication Networks, 2015, 8:1979–1990. DOI: 10.1002/sec.1146 (SCI&EI, IDS Number: CK7EE, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区,引用次数:8).
[72] Lu Yang and Li Jiguo. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics. 2013, 90(12): 2603-2613 (SCI,IDS Number: 265DW, Impact Factor: 0.824 (2014), EI,JCR 三区,引用次数:4)
[73] Wan Zhongmei, Li Jiguo, Hong Xuan. Parallel key-insulated signature scheme without random oracles. Journal of Communications and Networks, 2013, 15(3): pp.252-257. (SCI, IDS Number: 187UL, 2014 Impact Factor 1.007, EI, JCR 三区,引用次数:3)
[74] Yang, Y., Han, J., Susilo, W., Yuen, T. H., & Li, J. ABKS-CSC: Attribute-based Keyword Search with Constant-size Ciphertexts. Security & Communication Networks. 2016, DOI: 10.1002/sec.1671 (SCI&EI, Impact Factor: 0.72 (2014),5-Year Impact Factor: 0.632, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊,JCR 三区,引用次数:1)
[75] Lu Yang and Li Jiguo. An Improved Certificate-based Signature Scheme without Random Oracles. IET Information Security, 2016, 10(2): 80-86. DOI: 10.1049/iet-ifs.2015. 0188. (SCI&EI, Impact Factor: 0.753 (2014),中国密码学会推荐学术刊物和国际会议目录(2016)B类期刊,中国计算机学会推荐国际学术刊物与会议(信息安全)C类期刊, JCR四区,引用次数:4)
[76] Yuyan Guo, Jiguo Li (通信作者), Yang Lu, Yichen Zhang, Futai Zhang. Provably Secure Certificate-Based Encryption with Leakage Resilience. Theoretical Computer Science, 711: 1-10 (2018), (SCI, IDS Number: 125NI, Impact Factor: 0.657 (2014), 5-Year Impact Factor: 0.747, 中国计算机学会推荐国际学术刊物与会议(计算机科学理论)B类期刊, EI, JCR 四区)
[77] Jiguo Li, Hong Yuan, Yichen Zhang. Cryptanalysis and Improvement for Certificateless Aggregate Signature. Fundamenta Informaticae, 157(1-2): 111-123 (2018). (SCI)
[78] Jiguo Li, Hong Yuan and Yichen Zhang, Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Advances in Mathematics of Communications, accepted, 2017/10/30 (SCI)
[79] Liqing Chen, Jiguo Li, and Yichen Zhang, Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service, KSII Transactions on Internet and Information Systems, 2019, 13(3):1523-1545 (SCI)
[80] Yang Lu, Quanling Zhang, Jiguo Li. A certificate-based AKA protocol secure against public key replacement attacks. International Arab Journal of Information Technology (SCI, to be published in September 2019, No. 5).
[81] Yang Lu, Gang Wang, Jiguo Li. On Security of a Secure Channel Free Public Key Encryption with Conjunctive Field Keyword Search Scheme. ITC 47(1): 56-62 (2018) (SCI)
[82] Yang Lu, Jiguo Li, Constructing Pairing-Free Certificateless Public Key Encryption with Keyword Search. Frontiers of Information Technology & Electronic Engineering. 2018, accepted (SCI)
[83] Shengzhou Hu, Jiguo Li, Yichen Zhang. Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. KSII Transactions on Internet and Information Systems, Vol. 12, No. 10, Oct. 2018, 5100-5119 (SCI)
[84] Jiguo Li, Shengzhou Hu, and Yichen Zhang, Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key, Security and Communication Networks. Volume 2018, Article ID 8738960, 10 pages, https://doi.org/10.1155/2018/8738960 (SCI)
[85] Yang Lu, Jiguo Li. Provably Secure Certificateless Proxy Signature Scheme in the Standard Model. Theoretical Computer Science, 2016, 639: 42-59. http://dx.doi.org/10.1016/j.tcs.2016.05.019 (SCI, IDS Number: 125NI, Impact Factor: 0.657 (2014), 5-Year Impact Factor: 0.747, 中国计算机学会推荐国际学术刊物与会议(计算机科学理论)B类期刊, EI, JCR 四区,引用次数:1)
[86] Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao. Certificate-Based Conditional Proxy Re-Encryption. Journal of Information Science and Engineering, 32(4): 813-830 (2016). (SCI&EI, JCR 四区,引用次数:16)
[87] Li Jiguo, Wang Haiping, Zhang Yichen, Shen Jian. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Transactions on Internet and Information Systems, 2016, vol. 10, no. 7, pp. 3339-3352, 2016. DOI: 10.3837/tiis.2016.07.026. (SCI, 2012 Impact Factor 0.560, JCR 四区,引用次数:4)
[88] Jiguo Li, Yanqiong Li and Yichen Zhang. Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Transactions on Internet and Information Systems, 2013, 7(8): 1972-1988. (SCI, 2012 Impact Factor 0.560, IDS Number: 245IL, EI, 20133716726219, JCR 四区,引用次数:3)
[89] Ji Yao, Jiguo Li (通信作者) and Yichen Zhang. Certificate-Based Encryption Scheme without Pairing. KSII Transactions on Internet and Information Systems, 2013, 7(6): 1480-1491. (SCI, IDS Number: 173ZF, 2012 Impact Factor 0.560, EI, JCR 四区,引用次数:11)
[90] Lu Yang and Li Jiguo. Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Transactions on Internet and Information Systems, 2014, 8(7): 2554-2571. (SCI,Impact Factor: 0.561 (2014),5-Year Impact Factor: 0.514,JCR 四区,引用次数:21)
[91] Yang Lu, Gang Wang, Jiguo Li, Jian Shen. New construction of short certificate-based signature against existential forgery attacks. KSII Transactions on Internet and Information Systems, 2017, 11(7): 3629-3647. (SCI,Impact Factor: 0.561 (2014),5-Year Impact Factor: 0.514,JCR 四区)
[92] Zhang Yichen, Li Jiguo (通信作者), Sun Chuanming. An Efficient Property-based Remote Attestation Scheme. China Communication, 2012,(10): 1-9 (SCI, IDS Number: 031VM, Impact Factor: 0.344 (2014), JCR 四区,引用次数:1)
[93] Jiguo Li, Na Qian, Yichen Zhang and Xinyi Huang. An Efficient Certificate-Based Designated Verifier Signature Scheme, Computing and Informatics, Vol. 36, 2015, 1001-1021, V 2017-Jan-13. (SCI)
[94] Li Jiguo, Liang Zhenghe, Zhu Yuelong and Zhang Yichen. Improvement of Some Proxy Signature Schemes. Chinese Journal of Electronics, 2005, 14(3): 407-411 (SCI, IDS Number: 945NP, Impact Factor: 0.319 (2014),EI,引用次数:8)
[95] Yang Lu, Jiguo Li. Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. Journal of Information Science and Engineering, 2014, 30(5): 1553-1568 (SCI&EI, IDS Number: AP8KV, Impact Factor: 0.414 (2014),JCR 四区,引用次数:8)
[96] Yichen Zhang, Jiguo Li (通信作者), Zhiwei Wang, Wei Yao. A New Efficient Certificate-Based Signature Scheme, Chinese Journal of Electronics, 2015, 24 (4): 776-782. (SCI,IDS Number: CT6IZ, Impact Factor: 0.319 (2014),5-Year Impact Factor: 0.340,引用次数:2)
[97] Yang Lu and Jiguo Li. Forward-Secure Identity-Based Encryption with Direct Chosen-Ciphertext Security in the Standard Model. Advances in Mathematics of Communications, 2017, 11(1): 161-177 (SCI&EI)
[98] Tao Li, Jiguo Li. Leakage-Resilient Traceable Identity-Based Signature Scheme, Journal of Computational and Theoretical Nanoscience 01/2016; 13(1). DOI:10.1166/jctn.2016.4889, accepted. (SCI&EI)
[99] Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li. Hierarchical Trust Level Evaluation for Pervasive Social Networking, IEEE Access, 5: 1178-1187 (2017). (SCI)
[100] Yang Lu, Gang Wan, Jiguo Li, Jian Shen. Efficient designated server identity-based encryption with conjunctive keyword search. Annales des Télécommunications 72(5-6): 359-370 (2017) (SCI&EI)
[101] Yang Lu, Quanling Zhang, Jiguo Li and Jian Shen. An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Information Technology and Control, 2017, 46(3): 345-359. DOI: http://dx.doi.org/10.5755/j01.itc.46.3.14968. (SCI)
[102] Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li. Outsourced Data Modification Algorithm with Assistance of Multi-Assistants in Cloud Computing. International Journal of Sensor Networks, IJSNet 24(1): 62-73 (2017), DOI:10.1007/978-3-319-48671-0_35. (SCI, 2015: 0.454, 5-Year Impact Factor: 0.637)
[103] Wan Zhong-Mei, Weng Jian, Lai Xue-Jia, Liu Sheng-Li, Li Ji-Guo. On the relation between identity-based proxy re-encryption and mediated identity-based encryption. Journal of Information Science and Engineering, 2011,27(1):243-259 (SCI&EI, Impact Factor: 0.414 (2014),JCR 四区,引用次数:5)
[104] Lu Yang, Zhang Quanling and Li Jiguo. An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications, 9(3), 353-373, 2015. (SCI,IDS Number: CQ2TF, Impact Factor: 0.476 (2014),5-Year Impact Factor: 0.749, JCR四区,引用次数:3)
[105] ZHOU Yajian, PAN Anwei, LI Jiguo. An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks, China Communications, 2010,(10):7-17 (SCI, Impact Factor: 0.344 (2014), JCR 四区,引用次数:10)
[106] Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI’07, LNCS 4582, 2007,110-125.(中国计算机学会推荐国际学术刊物与会议(信息安全)C类会议,EI,引用次数:160)
[107] Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li. Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing. ICCCS (1) 2016: 389-408
[108] Lu Yang, Zhang Quanling and Li Jiguo. Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols. In Proc. of 14th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2015. (EI)
[109] Xunjun Chen, Yuelong Zhu, Jiguo Li, Yamin Wen, Zheng Gong. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-based Supply Chains. Information, 2015, 6(2): 258-274 (EI)
[110] Huaqun Wang, Jiguo Li. Certificate-Based Remote Data Integrity Checking in Public Clouds. COCOON2015, LNCS 9198, 375-386, 2015. (EI)
[111] Lu Yang and Li Jiguo. Efficient Constructions of Certificate-Based Key Encapsulation Mechanism. International Journal of Internet Protocol Technology, 2014, 8(2/3): 96-106 (EI).
[112] Jiguo Li, Xuexia Zhao, and Yichen Zhang. Certificate-Based Conditional Proxy Re-Encryption. M.H. Au et al. (Eds.): NSS 2014, LNCS 8792, pp. 299–310, 2014 (EI, 引用次数:16).
[113] Huiling Qian, Jiguo Li (通信作者) and Yichen Zhang. Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013, S. Qing et al. (Eds.): ICICS 2013, LNCS 8233, pp. 363–372, 2013. (中国计算机学会推荐国际学术刊物与会议(信息安全)C类会议,EI, 引用次数:23)
[114] Jiguo Li, Yanqiong Li and Yichen Zhang. Forward Secure Certificateless Proxy Signature Scheme. J. Lopez, X. Huang, and R. Sandhu (Eds.): NSS 2013, LNCS 7873, pp. 350-364, 2013. (EI, 20133716723893, 引用次数:7)
[115] Lu Yang and Li Jiguo. Constructing Pairing-Free Certificate-Based Encryption. International Journal of Innovative Computing, Information and Control, 2013, 9(11): 4509-4518. (EI, 引用次数:3)
[116] Yang Lu, Jiguo Li. Generic Construction of Forward-Secure Identity-Based Encryption. JCP 7(12): 3068-3074 (2012) (EI, 引用次数:4)
[117] Lu Yang and Li Jiguo. Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption. In 2012 Fourth International Symposium on Information Science and Engineering, Shanghai, China, pp. 199-202, 2012. (EI, 引用次数:1)
[118] Jiguo Li, Yichen Zhang and Huiyun Teng. A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. Y. Xiang et al. (Eds.): CSS 2012, LNCS 7672, pp. 362-376. Springer, Heidelberg (2012). (EI, 引用次数:8)
[119] Haiting Du, Jiguo Li (通信作者), Yichen Zhang, Tao Li, and Yuexin Zhang. Certificate-based Key-Insulated Signature. Y. Xiang et al. (Eds.): ICDKE 2012, LNCS 7696, pp. 206-220, 2012. (EI, 引用次数:8)
[120] Lu Yang and Li Jiguo. Constructing Certificate-Based Encryption Secure against Key Replacement Attacks. ICIC Express Letters, Part B: Applications, 2012, 3(1): 195-200. (EI, 引用次数:5)
[121] Zhongmei Wan Xuejia Lai, Jian Weng and Jiguo Li. Certificateless Strong Key-Insulated Signature. ICIST 2011, pp.270-276
[122] Lu Yang and Li Jiguo. A Practical Forward-Secure Public Key Encryption Scheme. Journal of Networks, 2011, 6 (9): 1254-1261 (EI, 引用次数:6)
[123] Zhongmei Wan, Jian Weng, Jiguo Li. Security Mediated Certificateless Signatures Without Pairing. Journal of Computers. 2010, 5(12): 1862-1869 (EI, 引用次数:6)
[124] Wang Aiqin, Li Jiguo (通信作者), Wang Zhijian. A Provably Secure Proxy Signature Scheme from Bilinear Pairings. Journal of Electronics. 2010, 27(3): 298-304. (引用次数:6)
[125] Lu Yang and Li Jiguo. Forward-Secure Certificate-Based Encryption and its Generic Construction. Journal of Networks, 2010, 5(5): 527-534. (EI, 引用次数:8)
[126] Lu Yang, Li Jiguo, Constructing efficient certificate-based encryption scheme with pairing in the standard model, Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp 234-237 (EI, 引用次数:2)
[127] Lu Yang and Li Jiguo. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles. In the 3rd International Symposium on Electronic Commerce and Security Workshops, pp. 22-25, 2010. (EI, 引用次数:2)
[128] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption. The Fifth International Conference on Information Assurance and Security, Xian, China, pp.57-60, 2009. (EI, 引用次数:2)
[129] Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption: Definition and Generic Construction. In the 2009 International Conference on e-Business and Information System Security, Wuhan, China, pp.30-34, 2009. (EI, 引用次数:2)
[130] Weijia Jiang, Jiguo Li (通信作者). Authenticated Tree Based Group Key Agreement. CIS2009, 251-255. (EI, 引用次数:1)
[131] Jiguo Li, Lizhong Xu and Yichen Zhang. Provably Secure Certificate-based Proxy Signature Schemes. Journal of Computers. 2009, 4(6): 444-452 (EI, 引用次数:42)
[132] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption. Journal of software. 2009, 4(3): 210-217 (EI, 引用次数:6)
[133] Lu Yang and Li Jiguo. Generic Construction of Certificate-based Encryption in the Standard Model. In the Second International Symposium on Electronic Commerce and Security, Nanchang, China, pp.25-29, 2009. (EI, 引用次数:6)
[134] Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption: Definition and Concrete Construction. 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, vol1, 278-282. (EI, 引用次数:6)
[135] Yang Lu, Jiguo Li, and Junmo Xiao. Constructing Efficient Certificate-based Encryption with Paring. Journal of Computers. 2009, 4 (1): 19-26. (EI, 引用次数:39)
[136] Lu Yang, Li Jiguo and Xiao Junmo. Generic Construction of Certificate-based Encryption. In the 9th International Conference for Young Computer Scientists, Zhangjiajie, China, pp. 1589-1594, 2008 (EI&ISTP, 引用次数:27)
[137] Lu Yang, Li Jiguo and Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. In the 2008 International Symposium on Electronic Commerce and Security, Guangzhou, China, pp. 296-300, 2008. (EI, 引用次数:14)
[138] Lu Yang and Li Jiguo. A General and Secure Certificate-based Encryption Construction. In the 3rd ChinaGrid Annual Conference, Dunhuang, China, pp. 182-189, 2008.(EI, 引用次数:4)
[139] Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-Certified Public Key. International Journal of Network Security, 2007, 2(4): 193-200(EI, 20131316142523,引用次数:38)
[140] Li Jiguo, Zhang Yichen, and Zhijian Wang. Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006, 480-483 (ISTP, EI,引用次数:6)
[141] Li Jiguo, Zhang Yichen, Zhu Yuelong. A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key. Wuhan University Journal of Natural Sciences, 2005, 10(1): 219-222 (EI,引用次数:20)
[142] Li Jiguo, Zhang Yichen, Zhu Yuelong. Security Analysis and Improvement of Some Proxy Signature Schemes. Infosecu’2004, ACM, 27-32 (引用次数:11)
[143] Jiguo Li, Yichen Zhang, Yuelong Zhu. Security on Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks. Proceedings of ICCC2004, 2004, 1584-1586 (ISTP)
[144] LI Jiguo, LI Jianzhong, CAO Zhenfu and Zhang Yichen. Convertible Proxy Signcryption Scheme. Journal of Harbin Institute of Technology. 2004, 11(2): 209-213 (EI,引用次数:6)
[145] Li Jiguo, Cao Zhenfu and Zhang Yichen. Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology. 2002, 9(2): 145-148 (EI,引用次数:68)
[146] 李继国, 张亦辰, 卫晓霞. 可证安全的基于证书广播加密方案. 电子学报,2016, 44(5): 1101-1110 (EI).
[147] 李继国,石岳蓉,张亦辰. 隐私保护且支持用户撤销的属性基加密方案. 计算机研究与发展, 2015, 52(10): 2281-2292 (EI,引用次数:3)
[148] 李艳琼,李继国 (通信作者),张亦辰. 标准模型下安全的无证书签名方案. 通信学报, 2015, 36(4): 2015098-1-2015098-10. (EI,引用次数:4)
[149] 禹勇, 李继国, 伍玮, 黄欣沂. 基于身份签名方案的安全性分析. 计算机学报, 2014, 37(5): 1025-1029 (EI,引用次数:5)
[150] 陆阳, 李继国. 标准模型下高效安全的基于证书密钥封装机制. 计算机研究与发展, 2014, 51(7): 1497-1505. (EI,引用次数:1)
[151] 陆阳, 李继国. 标准模型下前向安全公钥加密方案的新构造. 通信学报. 2014, 35(2): 33-39. (EI,引用次数:4)
[152] 李继国, 杨海珊, 张亦辰. 标准模型下安全的基于证书密钥封装方案. 电子学报, 2012, 40 (8): 1577-1583(EI, 20124215582349,引用次数:7).
[153] 李继国, 钱娜, 黄欣沂, 张亦辰. 基于证书强指定验证者签名方案. 计算机学报, 2012, 35 (8): 1579-1587 (EI, 20124415622447,引用次数:14).
[154] 李继国, 杨海珊, 张亦辰. 带标签的基于证书密钥封装方案. 软件学报, 2012, 23(8): 2163-2172(EI, 20123815454316,引用次数:3).
[155] 李继国, 孙 刚, 张亦辰. 标准模型下可证安全的本地验证者撤销群签名方案. 电子学报, 2011, 39 (7): 1618-1623 (EI,引用次数:8)
[156] 李继国, 孙 刚, 张亦辰. 实用的本地验证者撤销群签名方案. 通信学报, 2011,32 (10): 67-77. (EI,引用次数:5)
[157] 李继国,曹珍富,李建中. 代理签名的现状与进展. 通信学报. 2003, 24(10): 114-124 (引用次数:163)
[158] 曹珍富, 李继国 (通信作者), 李建中. 一个新的具有指定接收者(t,n)门限签名加密方案. 通信学报. 2003, 24(5): 8-13 (引用次数:34)
[159] LI Jiguo, LI Jianzhong, CAO Zhenfu and Zhang Yichen. Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent. Journal of Software(软件学报英文版). 2003,14(12): 2021-2027 (EI,引用次数:31
[160] 李继国, 曹珍富, 李建中. 具有指定接收组(t,n)门限共享验证签名加密方案. 电子学报. 2003, 31(7): 1086-1088 (EI,引用次数:19)
[161] 李继国, 曹珍富, 张亦辰, 李建中. 代理多重签名方案的密码分析与修改. 高技术通讯. 2003, 13(4): 1-5 (EI,引用次数:76)
[162] 周亚建, 徐晨, 李继国. 基于改进CURE聚类算法的无监督异常检测方法. 通信学报.2010,31(7):18-23. (EI,引用次数:25)
[163] 李继国, 姜平进. 标准模型下可证安全的基于身份的高效签名方案. 计算机学报, 2009,11(11):2130-2136 (EI,引用次数:55)
[164] 王爱芹, 李继国, 马春光, 王志坚. 一种基于身份的代理盲签名方案的安全性分析. 通信学报, 2006, 27, (12A): 16-19.
[165] 曹珍富, 李继国 (通信作者). 基于ElGamal体制的门限密钥托管方案. 计算机学报. 2002,25(4): 346-350 (EI,引用次数:39)
[166] 李继国, 曹珍富. 一个门限代理签名方案的改进. 计算机研究与发展. 2002, 39 (11): 1513-1518(EI,引用次数:111)
版权所有 © 联系地址:福建省网络安全与密码技术重点实验室(福建师范大学) |
邮编:350007 联系电话:0591-83456050转406 |
访问量:
158962020年11月04日
|