General

Jing Xu
Research Professor
Email: xujing@tca.iscas.ac.cn
Telephone: 62661707
Address: 4# South Fourth Street, Zhong Guan Cun, Beijing,China 
Postcode: 100190

Research Areas

Applied Cryptography; Security Protocols

Education

Ph.D, 2002, Academy of Mathematics and Systems Science, Chinese Academy of Sciences

Experience

   
Work Experience
2003-2005, Graduate University of Chinese Academy of Sciences, Researcher
2005-2008, Graduate University of Chinese Academy of Sciences, Associate Professor
2008-2011, Institute of Software,Chinese Academy of Sciences, Associate Professor
2011- now, Chinese Academy of Sciences, Professor

Publications (Selected)

[1] X.Lan, J.Xu, Z.F.Zhang, W.T.Zhu, "Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3", IEEE Transactions on Dependable and Secure Computing, accepted for publication.

[2]X.Y. Li, J. Xu, Z.F. Zhang, D.G. Feng, H.G. Hu, “Multiple Handshakes Security of TLS 1.3 Candidates", Proceedings of IEEE Symposium on Security and Privacy (Oakland) 2016, pp.486-505, 2016.

[3] J. Xu, X.X. Hu, Z.F. Zhang, “Round-Optimal Password-based Group Key Exchange Protocols in the Standard Model”,13th International Conference on Applied Cryptography and Network Security (ACNS), pp. 42-61, 2015.

[4] X.X. Hu, J. Zhang, Z.F. Zhang, J. Xu, “Universally Composable Anonymous Password Authenticated Key Exchange”, Science China Information Sciences, 2017.

[5] J. Xu, W.T. Zhu, “A Generic Framework for Anonymous Authentication in Mobile Networks”, Journal of Computer Science and Technology, 28(4), pp.732-742, 2013.

[6] M.J. Duan, J. Xu, “Identity Based Strong Designated Verifier Signature Scheme Without Pairing”, Security and Communication Networks, 6(7), pp.902-911, 2013.

[7] J. Xu, W.T. Zhu, D.G. Feng, “An Efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks”,Computer Communications, 34(3), pp.319-325, 2011.

[8] J. XuW.T. Zhu, W.T. Jin, “A Generic Framework for Constructing Cross-Realm C2C-PAKA Protocols Based on the Smart Card”, Concurrency and Computation: Practice and Experience, 23, pp.1386-1398, 2011.

[9] T. Zhou, J. Xu, “Provable Secure Authentication Protocol with Anonymity for Roaming Service in Global Mobility Networks”, Computer Networks, 55(1), pp.205-213, 2011.

[10] J. Xu, W.T. Zhu, D.G. Feng, “An Improved Smart Card Based Password Authentication Scheme with Provable Security”, Computer Standards & Interfaces, 31(4), pp. 723-728, 2009.

[11] J. Xu, D.G. Feng, “Security Flaws in Authentication Protocols with Anonymity for Wireless Environments”, ETRI Journal31(4), pp.460-462, 2009.

[12] M.J. Duan, J. Xu, An Efficient Location-Based Compromise-Tolerant Key Management Scheme for Sensor Networks, Information Processing Letters, 111(11), pp.503-507, 2011.

[13] J. Xu, D.G. Feng, “Comments on the SM2 Key Exchange Protocol”, International Conference on Cryptography and Network Security (CANS 2011), LNCS 7092, pp.160-171, Springer-Verlag Berlin Heidelberg, 2011.

[14] J. Xu, Z.F. Zhang, D.G. Feng, “Identity Based Threshold Proxy Signature”, Chinese journal of Electronics, 15(1), pp.183-186, 2006.

[15] J. Xu, D.G. Feng, “An Efficient Signature Scheme with Tight Reduction”, Chinese journal of Electronics, 16(2), pp.202-205, 2007.

[16] W.T. Jin, J. Xu, “An Efficient and Provably Secure Cross-Realm C2C-PAKA protocol With Smart Cards”, International Conference on Cryptology and Network Security (CANS2009), LNCS 5888, pp.299-314, Springer-Verlag Berlin Heidelberg, 2009.

[17] J. Xu, W.T. Zhu, D.G. Feng, “A Smart Card Based Generic Construction for Anonymous Authentication in Mobile Networks”, International Conference on Security and Cryptography (SECRYPT 2011)pp. 269-274, July 2011.

[18] D.G. Feng, J. Xu, “A New Client-to-Client Password-Authenticated Key Agreement Protocol”, 2009 International Workshop on Coding and Cryptology, IWCC 2009, LNCS 5557, pp.63-76, Springer, 2009.

[19] D.G. Feng, J. Xu, Xiaofeng Chen, “A Forward Secure Direct Anonymous Attestation Scheme”, WSEAS Transactions On Communications, 8 (10), pp.1076-1085, 2009.

[20] J. Xu, W.T. Zhu, D.G. Feng, “Improvement of a Fingerprint-Based Remote User Authentication Scheme”, International Journal of Security and Its Applications2(3), pp.73-80, 2008.

[21] J. Xu, Z.F. Zhang, D.G. Feng, “Constructing Optimistic Fair Exchange Protocols via ID-based Proxy Signatures”, Journal of Software, 18(3), pp.746-754, 2007.

[22] J. Xu, W.T. Zhu, D.G. Feng, “Analysis and Improvement of Two Password Authentication Schemes Using Smart Cards”, 2008 International Conference on Security Technology, pp.117-120, 2008.

[23] J. Xu, D.G. Feng, “ID-based Aggregate Signatures from Bilinear Pairings”, the 4th International Conference on Cryptology and Network Security (CANS2005), LNCS 3810, pp.110-120, Springer-Verlag Berlin Heidelberg, 2005.

[24] J. Xu, Z.F. Zhang, D.G. Feng, “ID-based Proxy Signature Using Bilinear Pairings”, ISPA 2005, LNCS3759, pp.359-367, Springer-Verlag Berlin Heidelberg, 2005.   

[25] J. Xu, Z.F. Zhang, D.G. Feng, “A Ring Signature Scheme Using Bilinear Pairings”, WISA 2004, LNCS 3325, pp.160-170, Springer-Verlag Berlin Heidelberg, 2004.

[26] Z.F. Zhang, Duncan S.Wong, J. Xu, D.G. Feng, “Certificateless Public-Key Signature: Security Model and Efficient Construction”, International Conference on Applied Cryptography and Network Security ACNS06, LNCS 3989pp.293-308, Springer-Verlag Berlin Heidelberg, 2006.

[27] Z.F. Zhang, D.G. Feng, J. Xu, “Efficient ID-based Optimistic Fair Exchange with Provable Security”, Seventh International Conference on Information and Communications Security (ICICS 2005), LNCS 3783, pp.14-26, Springer-Verlag Berlin Heidelberg, 2005.