Faculty

Xue Qingshui Associate Professor

MainPage: [Click here]

Office Telephone: +86-21-3420-4642

Office Address: SEIEE-3-509

Email: xue-qsh@cs.sjtu.edu.cn

Lab:

  • Research
  • Education
  • Work Experience
  • Teaching Assignment
  • Publications
  • Project Fund
  • Awards
  • Academic Service
Proxy cryptography
Position-based cryptography
Applied cryptography
Ph.D., Computer Science,2005
Shanghai Jiao Tong University, Shanghai, China
M.Sc., Computer Science,2000
Shandong University, Jinan, China 
B.S., Computer Science, 1995
Shandong Normal University, Jinan, China
2005.7-2010.8, Associate Professor, School of Techniques, Shanghai Jiao Tong University
2010.9-         , Associate Professor, Department of Computer Science and Engineering, Shanghai Jiao Tong University
 

1.       Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Multi-Proxy Multi-Signature Binding Positioning Protocol, The 10th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2015), August 10-12, 2015, Qufu, Shandong, China

2.       Fengying Li and Qingshui Xue, Research on community resident autonomous learning based on virtual learning, EEE’15 (The 2015 International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government), July 27-30, 2015, Las Vegas, USA

3.       Qingshui Xue, Fengying Li and Zhenfu Cao, Proxy Multi-Signature Binding Positioning Protocol, in the Proceedings of IEEE/CIC ICCC 2014 (Symposium on Privacy and Security in Commutations), IEEE Xplore, 13-15 October, 2014, Shanghai, China, pp. 166-170

4.       Qingshui Xue, Fengying Li and Zhenfu Cao, Threshold proxy signature based on position, SECURWARE 2014 (The Eighth International Conference on Emerging Security Information, Systems and Technologies), November 16-20, 2014, Lisbon, Portugal. pp. 151-156

5.       Qingshui Xue, Fengying Li and Zhenfu Cao, positioning-protocol-based digital signature, WICON 2014 (The 8th International Wireless Internet Conference - Symposium on Wireless and Vehicular Communication), November 13-14, 2014 Lisbon, Portugal

6.       Fengying Li, Qingshui Xue and Haixia Li, Research on energy expenditure and strategy of MOOC, Modern Distance Education Research, 2014 (in Chinese)

7.       Fengying Li, Qingshui Xue, Jianping Xu, Fuzzy-Identity-Authentication-Based MOOC Online Examination Learner Identity Authentication Pattern and Solution, MEHS 2014 (International Symposium Modern on Education and Human Sciences), 25rd-26th,October,2014, Zhangjiajie,China

8.       Fengying Li, Jianping Xu, Qingshui Xue, Research on Authentication Technology Based on Proxy in Mobile Learning, MEHS 2014 (International Symposium Modern on Education and Human Sciences), 25rd-26th,October,2014, Zhangjiajie,China

9.       Li Fengying, Qi Yuxin & Xue Qingshui. Research on Security of Virtual Learning Community Based on Big DataCollaboration Learning System Based on Threshold Proxy Signature, Journal of Distance Education, 76-82, 2013.4

10.     Li Fengying, Xue Qingshui & Zhang Jiping. The Model and Solution of Privacy Protection for Mobile Learning Based on Authentication, Modern Distance Education Research, 72-77, 2013.3

11.     Li Fengying, Xue Qingshui & Wu Weimin, Collaboration learning research based on threshold proxy signature, e-Education Research, 66-70, 2013.10

12.     Lin Juan, Xue Qingshui & Cao Zhenfu. Proxy-based Immediate Attribute Revocation KP-ABE, Computer Engineering, 2013

13.     Qingshui Xue, Fengying Li and Zhenfu Cao, Bilinear-pairings Based Designated-verifier Multi-proxy Multi-signature Scheme, ICCASM 2010 (2010 International Conference on Computer Application and System Modeling), Taiyuan, China. October 22-24, 2010

14.     Qingshui Xue, Fengying Li and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on DLP. http://www.paper.edu.cn, 2010

15.     Qingshui Xue, Fengying Li and Zhenfu Cao, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem. http://www.paper.edu.cn, 2010

16.     Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009,[WORLDCOMP’09 (The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing)],Las Vegas, Nevada, USA, July 13-16, 2009 

17.     Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. An ECDLP-based Threshold Proxy Signature Scheme Using Self-certified Public Key System, MobiSec 2009, June 3-5, 2009, Turin, Italy, (LNICST), 2009, pp. 58-70

18.     Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, , Journal of Computational and Applied Mathematics, 195( 2006 ), pp. 229-241

19.     Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemesJournal of Communication and Computer, Vol 2, No 1, pp.17-25, 2005

20.     Qingshui Xue, Zhenfu Cao and Haifeng Qian, A generalized proxy signature scheme based on the RSA cryptosystem, PDCAT ‘04 (The Fifth International Conference on Parallel and Distributed Computing, Applications and Technologies), LNCS 3320, 8-10 December, 2004, Singapore, pp. 662-665 

21.     Qingshui Xue and Zhenfu Cao, A nonrepudiable multi-proxy multi-signature scheme, IEEE SympoTIC’04 Proceeding (Symposium on Trends in Communications), Bratislava, Slovakia, 24-26 October 2004, pp. 102-105

22.     Qingshui Xue, Zhenfu Cao and Haifeng Qian, Cryptanalysis of New Digital Nominative Proxy Signature Schemes for Mobile Communication, 2004 Global Mobile Congress,  Shanghai, Oct.11-13, 2004, DELSON GROUP, pp. 302-306

23.     Qingshui Xue and Zhenfu Cao, A New Proxy Blind Signature Scheme with Warrant, 2004 IEEE Conference on Cybernetics and Intelligent Systems (CIS and RAM 2004), December 1 to 3, 2004, Singapore

24.     Qingshui Xue, Zhenfu Cao and Feilong Tang, An improved threshold proxy signature scheme based on the RSA cryptosystem, PDPTA’04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 901-907

25.     Qingshui Xue and Zhenfu Cao, A threshold proxy signature scheme using self-certified public keys, ISPA’2004(Second International Symposium on Parallel and Distributed Processing and Applications), LNCS, Hong Kong, China, 13-15 Dec. 2004

26.     Qingshui Xue and Zhenfu Cao, Improvement of Multi-proxy Signature Scheme, The 4th International Conference on Computer and Information Technology (IEEE CIT2004), Wuhan, China, 14-16 September 2004, IEEE Computer Society Press

27.     Qingshui Xue, Zhenfu Cao, and Haifeng Qian, Bilinear Pairings-based Threshold Proxy Signature Schemes with Known SignersDCABES 2004 2004 International Symposium on Distributed Computing and Application to Business, Engineering and science,Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 950-955

28.     Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemesDCABES 2004 2004 International Symposium on Distributed Computing and Application to Business, Engineering and science,Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 944-949

29.     Qingshui Xue, Zhenfu Cao and Haifeng Qian, Generalization of Proxy Signature Based on the RSA Cryptosystem, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 913-917

30.     Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 918-922

31.     Fengying Li and Qingshui Xue, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem, EEEE 2010 (2010 Second International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 423-426

32.     Fengying Li and Qingshui Xue, Online Oral Defense System Based on Threshold Proxy Signature, EEEE 2010 (2010 Second International Conference on E-Learning,  E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 427-431

33.     Fengying Li, Qingshui Xue and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on ECDLP, CollaborateCom 2010 (The 6th International Conference on  Collaborative Computing: Networking, Applications and Worksharing), Chicago, Illinois, USA, October 9-12, 2010

34.     Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, Science in China Series F-Information Sciences, pp.612-622, 2004

35.     Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, science in China Series E-Technological sciences 346),pp. 711-720, 2004 (in Chinese) 

36.     Feilong Tang, Minglu Li, Jian Cao and Qingshui Xue, A Model That Coordinates Short-lived and Long-lived Transactions for Web Services, PDPTA‘04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 908-914.

37.     Fengying Li, Qingshui Xue, Jiping Zhang and Zhenfu Cao, About the Security for HW Threshold Proxy Signature Scheme with self-certified Public Key System, CHINACOM 2009 (Int‘l Conference on Communications and Networking), August 26-28, 2009, Xi’an, China

38.     Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao. A Model of Bilinear-pairings Based Designated-verifier Proxy Signature Scheme, The Third International Workshop on Trusted Collaboration, 2008 (TrustCol-2008), Orlando, FL, USA, November 13-16, LNICST, 2008, pp. 416-424 

39.     Fengying Li, Qingshui Xue, Zhenfu Cao. Bilinear-pairings Based Designated-verifier Multi-proxy Signatue Scheme, IT Revolutions 2008, Venice, Italy, December 17-19, IEEE Xplore Publishing, 2008

40.     Fengying Li, Qingshui Xue, Zhenfu Cao. Crypanalysis of Kuo and Chen‘s Threshold Proxy Signature Scheme Based on the RSA. (ITNG 2007): 2-4 Apr. 2007, Las Vegas, Nevada, USA., pp. 815-818 

41.     Haifeng Qian; Zhenfu Cao; Lichen Wang; Qingshui Xue. Efficient non-interactive deniable authentication protocolsCIT 2005 (The Fifth International Conference on Computer and Information Technology). 21-23 Sept. 2005, Shanghai, China IEEE Computer Society, pp. 673 – 679

42.     Zhenfu Cao, Qingshui Xue, Strengthen research on cryptology and improve security consciousness, Computer Education, 2005 (in Chinese)

43.     Haifeng Qian, Zhenfu Cao and Qingshui Xue, Efficient Pairing-Based Threshold proxy Signature Scheme with Known Signers, Informatica, Vol. 16, No. 2, pp. 261-274, 2005

 

IEEE Transactions on Parallel and Distributed Systems (TPDS) Reviewer
FUNDAMENTA INFORMATICAE Reviewer
Security and Communication Network Reviewer
P2P Networking & Applications Reviewer
Journal of Computer Science and Technology Reviewer
Information Security Journal Reviewer
International Journal of Communication Systems Reviewer
Chinese Journal of Electronics Reviewer
Journal of Computer Research and Development Reviewer
Journal Of Software Reviewer
Chinese Journal of Computers Reviewer
Journal of Electronics & Information Technology Reviewer
ISCIRA Reviewer
ICINA2011 Reviewer
ICNECS2011 Reviewer
VTC2011-Fall (TrackChair) Reviewer
IWSSN2011 Reviewer
ISEEIP2012 Reviewer

Contact webmaster@cs.sjtu.edu.cn

Copyright @ 2013 SJTU Computer Science & Engineering All Rights Reserved