基本信息

薛锐 男 博导 中国科学院信息工程研究所
电子邮件: xuerui@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号B2 座
邮政编码: 100093
电子邮件: xuerui@iie.ac.cn
通信地址: 北京市海淀区闵庄路甲89号B2 座
邮政编码: 100093
研究领域
密码学与安全协议, 安全协议分析的形式化方法.
招生信息
每年招收直博生1- 2 名. 只招收数学专业的学生(不要求密码学的基础) , 只招收有志于将来从事理论科学研究的学生
招生专业
083900-网络空间安全
招生方向
密码理论与技术,密码协议理论与技术
教育背景
1996-09--1999-07 北京师范大学数学系 博士
学历
-- 研究生
学位
-- 博士
出国学习工作
1994-1995 德国 Passau 大学数学与信息系
2005-2006 美国 Purdue University 计算机系
2006-2007 美国 UIUC 计算机系
2005-2006 美国 Purdue University 计算机系
2006-2007 美国 UIUC 计算机系
工作经历
社会兼职
2019-02-01-今,信工所, 工会主席
2018-04-02-今,信息安全国家重点实验室, 副主任
2017-12-10-今,密码学会密码应用工作委员会, 副主任
2015-12-01-今,中国保密协会隐私保护专业委员会, 秘书长
2015-01-01-今,密码学会安全协议专委会, 副主任
2015-01-01-2018-12-31,软件学报, 责任编委
2014-07-01-2017-06-30,计算机研究与发展, 编委
2013-06-01-2017-12-01,信息安全国家重点实验室, 副主任
2012-01-01-2014-12-31,软件学报, 责任编委
2012-01-01-今,北京交通大学, 兼职教授
2010-05-03-今,解放军信息工程大学, 兼职教授
2018-04-02-今,信息安全国家重点实验室, 副主任
2017-12-10-今,密码学会密码应用工作委员会, 副主任
2015-12-01-今,中国保密协会隐私保护专业委员会, 秘书长
2015-01-01-今,密码学会安全协议专委会, 副主任
2015-01-01-2018-12-31,软件学报, 责任编委
2014-07-01-2017-06-30,计算机研究与发展, 编委
2013-06-01-2017-12-01,信息安全国家重点实验室, 副主任
2012-01-01-2014-12-31,软件学报, 责任编委
2012-01-01-今,北京交通大学, 兼职教授
2010-05-03-今,解放军信息工程大学, 兼职教授
教授课程
公钥密码学理论密码学算法数论与公钥密码算法数论与公钥密码习题课现代密码学科学前沿进展名家系列讲座III应用密码学
专利与奖励
1. 中国科学院大学朱李月华优秀教师(2016)
2. 全国网络空间安全优秀教师(2018)
专利成果
( 1 ) 一种适用于联盟链的支持身份可追踪的高效匿名认证方法和系统, 发明专利, 2019, 第 3 作者, 专利号: 申请号:201910255663.0( 2 ) 一种基于分布式属性签名的区块链医疗数据管理方法, 发明专利, 2019, 第 3 作者, 专利号: 201910114188.5( 3 ) 一种安全协议形式化验证方法, 发明专利, 2013, 第 1 作者, 专利号: 201010578947.2( 4 ) 一种基于强RSA假设的数字签名方法, 发明专利, 2012, 第 2 作者, 专利号: 201010569909.0
出版信息
发表论文
[1] Shimin Li, Xin Wang, Rui Xue. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. The Computer Journal[J]. 2022, 65(4): 1020-1028, https://academic.oup.com/comjnl/article-abstract/65/4/1020/6281302?redirectedFrom=fulltext&login=true.[2] Jinyong Chang, Maozhi Xu, Rui Xue. Public auditing protocol with dynamic update and privacy-preserving properties in fog-to-cloud-based IoT applications. Peer-to-Peer Networking and Applications[J]. 2022, 15(4): 2021-2036, [3] Ji, Yanyan, Shao, Bilin, Chang, Jinyong, Xu, Maozhi, Xue, Rui. Identity-based remote data checking with a designated verifier. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS[J]. 2022, 11(1): http://dx.doi.org/10.1186/s13677-022-00279-5.[4] 曹书蛟, Rui Xue. The (Im)Possibility on Constructing Verifiable Random Functions.. The Computer Journal[J]. 2022, 65(7): 1826-1845, [5] Ji, Yanyan, Chang, Jinyong, Ren, Qiaochuan, Xu, Maozhi, Xue, Rui. Secure medical data management with privacy-preservation and authentication properties in smart healthcare system. COMPUTER NETWORKS[J]. 2022, 212: http://dx.doi.org/10.1016/j.comnet.2022.109013.[6] Cao, Shujiao, Xue, Rui. Being a permutation is also orthogonal to one-wayness in quantum world: Impossibilities of quantum one-way permutations from one-wayness primitives. THEORETICAL COMPUTER SCIENCE[J]. 2021, 855: 16-42, http://dx.doi.org/10.1016/j.tcs.2020.11.013.[7] Chang, Jinyong, Shao, Bilin, Ji, Yanyan, Xu, Maozhi, Xue, Rui. Secure network coding from secure proof of retrievability. SCIENCE CHINA-INFORMATION SCIENCES[J]. 2021, 64(12): 248-249, http://dx.doi.org/10.1007/s11432-020-2997-0.[8] Sun, You, Xue, Rui, Zhang, Rui, Su, Qianqian, Gao, Sheng. RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain. ACM TRANSACTIONS ON INTERNET TECHNOLOGY[J]. 2021, 21(1): http://dx.doi.org/10.1145/3430502.[9] Chengjun Lin, Rui Xue, Xinyi Huang. Linearly Homomorphic Signatures with Designated Combiner.. 15th International Conference, ProvSec 2021[J]. 2021, [10] Zhang, Rui, Xue, Rui, Liu, Ling. Security and Privacy for Healthcare Blockchains. IEEE Transactions on Services Computing[J]. 2021, https://ieeexplore.ieee.org/document/9445631.[11] Li, Yi, Wu, Meng, Ye, Xiaochun, Li, Wenming, Xue, Rui, Wang, Da, Zhang, Hao, Fan, Dongrui. An efficient scheduling algorithm for dataflow architecture using loop-pipelining. INFORMATION SCIENCES[J]. 2021, 547: 1136-1153, http://dx.doi.org/10.1016/j.ins.2020.09.029.[12] Li, Shimin, Wang, Xin, Xue, Rui. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications. COMPUTER JOURNAL. 2021, http://dx.doi.org/10.1093/comjnl/bxab042.[13] Han, Chunling, Xue, Rui. Differentially private GANs by adding noise to Discriminator's loss. COMPUTERS & SECURITY[J]. 2021, 107: http://dx.doi.org/10.1016/j.cose.2021.102322.[14] Li, Shimin, Liang, Bei, Mitrokotsa, Aikaterini, Xue, Rui. Homomorphic signcryption with public plaintext-result checkability. IET INFORMATION SECURITY[J]. 2021, 15(5): 333-350, https://doaj.org/article/08d9de667e9146a4808ee07608cba1f8.[15] Kelly Yun, Rui Xue. Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning With Errors Assumption. International Conference on Information Security and Cryptology(INSCRYPT 2020)[J]. 2020, [16] Li, Menghao, Wang, Pei, Wang, Wei, Wang, Shuai, Wu, Dinghao, Liu, Jian, Xue, Rui, Huo, Wei, Zou, Wei. Large-Scale Third-Party Library Detection in Android Markets. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING[J]. 2020, 46(9): 981-1003, [17] Wang, Xin, Li, Shimin, Xue, Rui, Zhou, J, Luo, X, Shen, Q, Xu, Z. Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 463-481, [18] Chunlin Han, Rui Xue. Private Global Generator Aggregation from Different Types of Local Models. International Conference on Security and Privacy in Communication Networks(SecureComm 2020)[J]. 2020, [19] Liu, Muhua, Wu, Ying, Xue, Rui, Zhang, Rui. Verifiable outsourcing computation for modular exponentiation from shareable functions. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS[J]. 2020, 23(1): 43-55, https://www.webofscience.com/wos/woscc/full-record/WOS:000512937700004.[20] Lin, ChengJun, Xue, Rui, Yang, ShaoJun, Huang, Xinyi, Li, Shimin. Linearly Homomorphic Signatures from Lattices. COMPUTER JOURNAL[J]. 2020, 63(12): 1871-1885, https://www.webofscience.com/wos/woscc/full-record/WOS:000606839100007.[21] Su, Qianqian, Zhang, Rui, Xue, Rui, Li, Pengchao. Revocable Attribute-Based Signature for Blockchain-Based Healthcare System. IEEE ACCESS[J]. 2020, 8: 127884-127896, https://doaj.org/article/602acd6994744474b61bd5dcef13dac9.[22] You Sun, Rui Zhang, Rui Xue, Qianqian Su, Pengchao Li. A Reputation Based Hybrid Consensus for E-Commerce Blockchain. 27th International Conference on Web Services (ICWS 2020:1-16)null. 2020, [23] Su, Qianqian, Zhang, Rui, Xue, Rui. Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. COMPUTER JOURNAL[J]. 2020, 63(8): 1271-1284, https://www.webofscience.com/wos/woscc/full-record/WOS:000582318200012.[24] Chang, Jinyong, Ji, Yanyan, Shao, Bilin, Xu, Maozhi, Xue, Rui. Certificateless Homomorphic Signature Scheme for Network Coding. IEEE-ACM TRANSACTIONS ON NETWORKING[J]. 2020, 28(6): 2615-2628, http://dx.doi.org/10.1109/TNET.2020.3013902.[25] Wang Xueqing, Wang Biao, Liang Bei, Xue Rui. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版). 2019, 62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[26] Su, Qianqian, Zhang, Rui, Xue, Rui, Sun, You, Miller, J, Stroulia, E, Lee, K, Zhang, LJ. An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain. WEB SERVICES - ICWS 2019null. 2019, 11512: 110-125, [27] Jinyong Chang, Yanyan Ji, Maozhi Xu, Rui Xue. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. Future Generation Computer Systems. 2019, 91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.[28] Rui Xue. Cocks' Identity-Based Encryption in the Standard Model,via Obfuscation Techniques.. IWSEC 2019. 2019, [29] Zhang, Rui, Xue, Rui, Liu, Ling. Security and Privacy on Blockchain. ACM COMPUTING SURVEYS[J]. 2019, 52(3): http://dx.doi.org/10.1145/3316481.[30] Wang, Xin, Li, Shimin, Xue, Rui, Attrapadung, N, Yagi, T. Cocks' Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper). ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2019null. 2019, 11689: 273-283, [31] Chang, Jinyong, Ji, Yanyan, Xu, Maozhi, Xue, Rui. General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2019, 91: 416-425, http://dx.doi.org/10.1016/j.future.2018.08.039.[32] Xueqing WANG, Biao WANG, Bei LIANG, Rui XUE. A more compact multi-id identity-based FHE scheme in the standard model and its applications. 中国科学:信息科学(英文版). 2019, 62(3): 186-188, http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[33] 薛锐, 彭长根, 田有亮. 理性密码协议专栏序言(中英文). 密码学报[J]. 2019, 83-86, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849574849484857.[34] Wang, Xueqing, Wang, Biao, Liang, Bei, Xue, Rui. A more compact multi-id identity-based FHE scheme in the standard model and its applications. SCIENCE CHINA-INFORMATION SCIENCES. 2019, 62(3): http://lib.cqvip.com/Qikan/Article/Detail?id=7001689513.[35] Chang, Jinyong, Ma, Hui, Zhang, Anling, Xu, Maozhi, Xue, Rui. RKA Security of Identity-Based Homomorphic Signature Scheme. IEEE ACCESS[J]. 2019, 7: 50858-50868, https://doaj.org/article/a64fcdb62d14468580928f33d82fd7a7.[36] Wu, Ying, Liu, MuHua, Xue, Rui, Zhang, Rui. Attribute-based multi-function verifiable computation. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE[J]. 2018, 78: 995-1004, http://dx.doi.org/10.1016/j.future.2017.02.030.[37] Xueqing Wang, Rui Xue, Biao Wang. CCA1 secure FHE from PIO, revisited. Springer. 2018, http://oa.las.ac.cn/oainone/service/browseall/read1?ptype=JA&workid=JA201904020981853ZK.[38] 王学庆, 王彪, 薛锐. 具有短密文的多身份全同态加密构造框架. 信息安全学报[J]. 2018, 3(5): 54-63, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849564853484853.[39] Li, Shimin, Liang, Bei, Xue, Rui, Susilo, W, Yang, G. Private Functional Signatures: Definition and Construction. INFORMATION SECURITY AND PRIVACYnull. 2018, 10946: 284-303, [40] Wang, Biao, Wang, Xueqing, Xue, Rui, Huang, Xinyi. Matrix FHE and Its Application in Optimizing Bootstrapping. COMPUTER JOURNAL[J]. 2018, 61(12): 1845-1861, https://www.webofscience.com/wos/woscc/full-record/WOS:000453394000008.[41] Han, Chunling, Xue, Rui, Zhang, Rui, Wang, Xueqing. A new audio steganalysis method based on linear prediction. MULTIMEDIA TOOLS AND APPLICATIONS[J]. 2018, 77(12): 15431-15455, https://www.webofscience.com/wos/woscc/full-record/WOS:000436433200044.[42] Rui Xue. Leveled FHE with Matrix Message Space. he 13th China International Conference on Information Security and Cryptology (INSCRYPT 2017. 2018, [43] Rui Xue. Identity-Based Functional Encryption for Quadratic Functions from Lattices. 20th International Conference on Information and Communications Security. 2018, [44] Xue, Rui, Wang, Xueying, Xu, Shihong, Liu, Yifan, Feng, Chengcheng, Zhao, Chunyan, Liu, Qinghua, Li, Jun. Expression profile and localization of vitellogenin mRNA and protein during ovarian development in turbot (Scophthalmus maximus). COMPARATIVE BIOCHEMISTRY AND PHYSIOLOGY B-BIOCHEMISTRY & MOLECULAR BIOLOGY[J]. 2018, 226: 53-63, http://dx.doi.org/10.1016/j.cbpb.2018.08.002.[45] Wang, Xueying, Liu, Qinghua, Xu, Shihong, Xiao, Yongshuang, Wang, Yanfeng, Feng, Chengcheng, Xue, Rui, Zhao, Haixia, Song, Zongcheng, Li, Jun. Transcriptome Dynamics During Turbot Spermatogenesis Predicting the Potential Key Genes Regulating Male Germ Cell Proliferation and Maturation. SCIENTIFIC REPORTS[J]. 2018, 8(1): http://www.irgrid.ac.cn/handle/1471x/2486215.[46] Wang Xueqing, Wang Biao, Xue Rui, Qing S, Mitchell C, Chen L, Liu D. Two Efficient Tag-Based Encryption Schemes on Lattices. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017null. 2018, 10631: 118-131, [47] Zhang, Rui, Xue, Rui, Liu, Ling. Searchable Encryption for Healthcare Clouds: A Survey. IEEE TRANSACTIONS ON SERVICES COMPUTING[J]. 2018, 11(6): 978-996, http://dx.doi.org/10.1109/TSC.2017.2762296.[48] Rui Xue, Xueying Wang, Shihong Xu, Yifan Liu, Chengcheng Feng, Chunyan Zhao, Qinghua Liu, Jun Li. Expression profile and localization of vitellogenin mRNA and protein during ovarian development in turbot (Scophthalmus maximus). Comparative Biochemistry and Physiology, Part B. 2018, 226: 53-63, http://dx.doi.org/10.1016/j.cbpb.2018.08.002.[49] Chunling Han, Rui Xue, Rui Zhang, Xueqing Wang. A new audio steganalysis method based on linear prediction.. Multimedia Tools Appl.[J]. 2018, [50] Wang, Xin, Liang, Bei, Li, Shimin, Xue, Rui, Chen, L, Manulis, M, Schneider, S. On Constructing Pairing-Free Identity-Based Encryptions. INFORMATION SECURITY (ISC 2018)null. 2018, 11060: 308-327, [51] 薛锐, 彭长根, 黄欣沂, 刘吉强, 禹勇. 面向隐私保护的新型技术与密码算法专题前言. 软件学报[J]. 2018, 29(7): 1827-1829, http://lib.cqvip.com/Qikan/Article/Detail?id=675582148.[52] Rui Xue. A More Compact Multi-id Identity-based FHE Scheme in the Standard Model and Its Applications.. SCIENCE CHINA Information Sciences. 2018, [53] Rui Xue. Large-scale Third-party Library Detection in Android Markets.. IEEE Transactions on Software Engineering(TSE). 2018, [54] Zhang, Rui, Xue, Rui, Liu, Ling, Zheng, Lijuan, Altintas, I, Chen, S. Oblivious Multi-Keyword Search for Secure Cloud Storage Service. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017)null. 2017, 269-276, http://dx.doi.org/10.1109/ICWS.2017.42.[55] Chen, Xiaoquan, Xue, Rui, Wu, Chuankun. Timely address space rerandomization for resisting code reuse attacks. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE[J]. 2017, 29(16): https://www.webofscience.com/wos/woscc/full-record/WOS:000406232100001.[56] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.[57] Li, Menghao, Wang, Wei, Wang, Pei, Wang, Shuai, Wu, Dinghao, Liu, Jian, Xue, Rui, Huo, Wei, IEEE. LibD: Scalable and Precise Third-party Library Detection in Android Markets. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE)null. 2017, 335-346, [58] Wu, Ying, Zhang, Rui, Xue, Rui, Liu, Ling, Altintas, I, Chen, S. Multi-Client Verifiable Computation Service for Outsourced Data. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017)null. 2017, 556-563, http://dx.doi.org/10.1109/ICWS.2017.65.[59] Wang, Qiuyan, Ding, Kelan, Lin, Dongdai, Xue, Rui. A kind of three-weight linear codes. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES[J]. 2017, 9(3): 315-322, https://www.webofscience.com/wos/woscc/full-record/WOS:000396435500001.[60] 陈小全, 薛锐. 程序漏洞:原因、利用与缓解——以C和C++语言为例. 信息安全学报[J]. 2017, 2(4): 41-56, http://lib.cqvip.com/Qikan/Article/Detail?id=673577078.[61] 王欣, 薛锐. 对于一个新的CCA安全的密码方案的分析. 密码学报[J]. 2017, 4(2): 106-113, [62] 王贞灵, 薛锐, 陈驰, 田雪, 顾广宇. 多源异构数据的云平台安全态势评估系统. 网络新媒体技术[J]. 2017, 6(3): 8-13, http://lib.cqvip.com/Qikan/Article/Detail?id=672292002.[63] 王学庆, 薛锐. 标准模型下适应性安全的BF-IBE方案. 密码学报[J]. 2017, 4(1): 38-48, [64] Ying Wu, Rui Zhang, Rui Xue, Ling Liu. Multi-Client Verifiable Computation Service of Polynomials on Outsourced Data. ICWSnull. 2017, [65] Rui Zhang, Rui Xue, Ling Liu. Searchable Encryption for Healthcare Clouds: A Survey.. IEEE Transactions on Services Computing, 1939, PP(99):1-1[J]. 2017, [66] Wang Zhenling, Xue Rui, Chen Chi, Shen Peisong, Destech Publicat Inc. A Real-time Security Situation Assessment System Designed for Cloud Platform. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016)null. 2016, 300-308, [67] Zhang, Rui, Xue, Rui, Yu, Ting, Liu, Ling. Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data. ACM TRANSACTIONS ON INTERNET TECHNOLOGY[J]. 2016, 16(3): https://www.webofscience.com/wos/woscc/full-record/WOS:000382684800007.[68] Rui Xue. Timely address space rerandomization for resisting code reuse attacks. Concurrency and Computation: Practice and Experience.. Timely address space rerandomization for resisting code reuse attacks. Concurrency and Computation: Practice and Experience. Wiley Publishing. 2016, [69] 薛锐. 安全协议形式化分析技术与验证工具发展研究. 密码学--学科发展报告. 2016, [70] Rui Xue. Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.. ICISC 2016: 239-253. 2016, [71] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Separations in circular security for arbitrary length key cycles, revisited. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(18): 5392-5400, https://www.webofscience.com/wos/woscc/full-record/WOS:000398221800041.[72] Chang, Jinyong, Dai, Honglong, Xu, Maozhi, Xue, Rui. Security analysis of a TESLA-based homomorphic MAC scheme for authentication in P2P live streaming system. SECURITY AND COMMUNICATION NETWORKS[J]. 2016, 9(16): 3309-3313, https://www.webofscience.com/wos/woscc/full-record/WOS:000389250100022.[73] 薛锐, 任奎, 张玉清, 李晖, 刘吉强, 赵波, 祝烈煌. 云计算安全研究专刊前言. 软件学报[J]. 2016, 1325-1327, http://lib.cqvip.com/Qikan/Article/Detail?id=669126880.[74] Xu, Jian, Zhou, Fucai, Jiang, Zhihao, Xue, Rui. Dynamic proofs of retrievability with square-root oblivious RAM. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING[J]. 2016, 7(5): 611-621, https://www.webofscience.com/wos/woscc/full-record/WOS:000383132800002.[75] Liu Muhua, Wu Ying, Xue Rui, Dunkelman O, Sanadhya SK. Verifiable Computation for Randomized Algorithm. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016null. 2016, 10095: 99-118, [76] Zhang, Rui, Xue, Rui, Yu, Ting, Liu, Ling, ReiffMarganiec, S. PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data. 2016 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS)null. 2016, 428-435, http://dx.doi.org/10.1109/ICWS.2016.62.[77] 徐剑, 李明洁, 周福才, 薛锐. 基于用户鼠标行为的身份认证方法. 计算机科学[J]. 2016, 43(2): 148-154, http://lib.cqvip.com/Qikan/Article/Detail?id=668293762.[78] Rui Xue. A Generic Construction of Homomorphic MAC for Multi-File Transmission in Network Coding.. 2015, [79] Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue. An Approach for Mitigating Potential Threats in Practical SSO Systems. Inscryptnull. 2015, [80] Rui Zhang, Rui Xue. Efficient Keyword Search for Public-Key Setting. MILCOM 2015null. 2015, [81] Chang, Jinyong, Xue, Rui. Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions. SECURITY AND COMMUNICATION NETWORKS[J]. 2015, 8(8): 1525-1536, https://www.webofscience.com/wos/woscc/full-record/WOS:000353887000009.[82] 章睿, 薛锐, 林东岱. 海云安全体系架构. 中国科学. 信息科学[J]. 2015, 45(6): 796-816, [83] Chang, Jinyong, Xue, Rui, Zhang, Anling. The KDM-CCA Security of the Kurosawa-Desmedt Scheme. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2015, E98A(4): 1032-1037, https://www.webofscience.com/wos/woscc/full-record/WOS:000359466100012.[84] Wang, Qiuyan, Ding, Kelan, Xue, Rui. Binary Linear Codes With Two Weights. IEEE COMMUNICATIONS LETTERS[J]. 2015, 19(7): 1097-1100, https://www.webofscience.com/wos/woscc/full-record/WOS:000357793600004.[85] 薛锐, 吴迎, 刘牧华, 张良峰, 章睿. 可验证计算研究进展. 中国科学. 信息科学[J]. 2015, 45(11): 1370-1388, http://www.corc.org.cn/handle/1471x/2239679.[86] Chang, Jinyong, Xue, Rui. On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES[J]. 2014, E97A(11): 2267-2271, https://www.webofscience.com/wos/woscc/full-record/WOS:000351567000026.[87] Chen, Danyang, Zhou, Yongbin, Han, Yang, Xue, Rui, He, Qing. On hardening leakage resilience of random extractors for instantiations of leakage-resilient cryptographic primitives. INFORMATION SCIENCES[J]. 2014, 271: 213-223, http://dx.doi.org/10.1016/j.ins.2014.02.149.[88] Zhang, Rui, Liu, Ling, Xue, Rui. Role-based and time-bound access and management of EHR data. SECURITY AND COMMUNICATION NETWORKS[J]. 2014, 7(6): 994-1015, http://dx.doi.org/10.1002/sec.817.[89] Rui Xue. Practical Key-Dependent Message Chosen-Ciphertext Security Based on Decisional Composite Residuosity and Quadratic Residuosity Assumptions.. Security and Communication Networks, DOI: 10.1002/sec.1101. 2014, [90] Rui Xue. General Construction of Chameleon All-But-One Trapdoor Functions and Their Applications.. Journal of Software. Vol. 9(10), pp. 2557-2563, October. 2014, [91] 雷新锋, 宋书民, 刘伟兵, 薛锐. 计算可靠的密码协议形式化分析综述. 计算机学报[J]. 2014, 37(5): 993-1016, http://lib.cqvip.com/Qikan/Article/Detail?id=49658516.[92] Chang, Jinyong, Xue, Rui, Obaidat, MS, Holzinger, A, Samarati, P. KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT)null. 2014, 299-306, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000410374700032.[93] 常金勇, 薛锐, 史涛. ElGamal加密方案的KDM安全性. 密码学报[J]. 2014, 235-243, http://lib.cqvip.com/Qikan/Article/Detail?id=77778866504849524851484852.[94] Rui Xue. iBigTable: practical data integrity for bigtable in public cloud.. CODASPY 13. 2013, [95] LIU Xiao-fei, SUN Wei-min, LI Ze-qin, BAI Rui-xue, LI Jing-xiao, SHI Zi-han, GENG Hong-wei, ZHENG Ying, ZHANG Jun, ZHANG Gen-fa. Over-Expression of ScMnSOD,a SOD Gene Derived from Jojoba, Improve Drought Tolerance in Arabidopsis. 农业科学学报:英文版[J]. 2013, 1722-1730, http://lib.cqvip.com/Qikan/Article/Detail?id=47699707.[96] Yu Ping, Xue Rui. Toward real-life implementation of signature schemes from the strong rsa assumption. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 3-12, http://ir.iscas.ac.cn/handle/311060/15690.[97] Rui Xue. Multi-Central-Authority Attribute-Based Signature. ISISE2012,. 2012, [98] Xie Xiang, Xue Rui, Zhang Rui. Inner-product lossy trapdoor functions and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2012, 188-205, http://ir.iscas.ac.cn/handle/311060/15745.[99] Rui Xue. A Framework Based on Time and Space for Analyzing Denial of Service Attacks. ISISE2012. 2012, [100] Yue Qinggang, Liu Feng, Xue Rui. Some improvements to the cost-based framework for analyzing denial of service attacks. Trusted Systemsnull. 2012, 84-101, http://ir.iscas.ac.cn/handle/311060/15738.[101] Rui Xue. IK-CPA security implies IE-CCA security in the Random Oracle Model.. 2011, [102] Rui Xue. Computational soundness about formal encryption in the presence of secret shares and key cycles(simplified version).. 2011, [103] Rui Xue. Efficient threshold encryption from lossy trapdoor functions. Post-Quantum Cryptography. 2011, [104] Yu Ping, Xue Rui. A short signature scheme from the rsa family. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)null. 2011, 307-318, http://124.16.136.157/handle/311060/14375.[105] 薛锐, 雷新锋. 安全协议:信息安全保障的灵魂——安全协议分析研究现状与发展趋势. 中国科学院院刊[J]. 2011, 26(3): 287-296, http://lib.cqvip.com/Qikan/Article/Detail?id=37802746.[106] Xia Fubiao, Wang Guilin, Xue Rui. On the invisibility of designated confirmer signatures. Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011null. 2011, 268-276, http://124.16.136.157/handle/311060/14255.[107] BhargavSpantzel, Abhilasha, Squicciarini, Anna Cinzia, Xue, Rui, Bertino, Elisa. Multifactor Identity Verification Using Aggregated Proof of Knowledge. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS[J]. 2010, 40(4): 372-383, https://www.webofscience.com/wos/woscc/full-record/WOS:000278814200002.[108] 黄卿, 王亚弟, 韩继红, 李大海. 密码协议安全性质研究. 计算机工程与设计[J]. 2010, 3604-3607, http://lib.cqvip.com/Qikan/Article/Detail?id=35043330.[109] Huang Danqing, Xue Rui, Liu Feng, Peng Jianhua, Zhao Zhenju, Ji Dongyao. Formal verification of hmqv using asm-spv. Proceedings - 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010null. 2010, 486-489, http://124.16.136.157/handle/311060/8772.[110] Zhao Zhenju, Liu Feng, Peng Jianhua, Huang Danqing, Xue Rui, Zhang Zhenfeng. Some improvements on model checking coreasm models of security protocols. Proceedings - 2nd International Symposium on Data, Privacy, and E-Commerce, ISDPE 2010null. 2010, 66-71, http://124.16.136.157/handle/311060/8910.[111] Lu, ZhongLin, Wang, XueRui, Liu, BianBian, Wang, RuiYao. Palladacycles with C,N-bidentate and N,C,N '-tridentate ligands: Structures, spectral study and catalytic methanolysis of P = S pesticides. JOURNAL OF ORGANOMETALLIC CHEMISTRY[J]. 2010, 695(19-20): 2191-2200, https://www.webofscience.com/wos/woscc/full-record/WOS:000280847000005.[112] Rui Xue. A Model Checker for Security Protocols.. IIHMS 2010. 2010, [113] Rui Xue. Universal Designated-Verifier Partially Blind Signatures for E-Commerce. International Journal of Computer and Applications. 2010, [114] 曹天杰, 林东岱, 薛锐. WWW的信息监控研究. 通讯和计算机:中英文版[J]. 2005, 2(6): 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=23310215.[115] 薛锐. 完备布尔代数理论的计算复杂性. 北京师范大学学报:自然科学版[J]. 1999, 35(3): 303-, http://lib.cqvip.com/Qikan/Article/Detail?id=3801479.[116] 薛锐. 原子布尔代数理论的计算复杂性. 北京师范大学学报:自然科学版[J]. 1998, 34(4): 445-, http://lib.cqvip.com/Qikan/Article/Detail?id=3297024.[117] 薛锐. 有限可换主理想环上广义模理论T(Q)的模型可归约性. 数学研究与评论[J]. 1998, 18(4): 618-, http://lib.cqvip.com/Qikan/Article/Detail?id=3297435.[118] 薛锐. Zw-模初等理论探讨. 北京师范大学学报. 自然科学版[J]. 1989, 8-,
发表著作
(1) 密码协议分析的逻辑分析方法, The Logical Methods to Analysis of Security Protocols, 科学出版社, 2013-03, 第 2 作者(2) 公钥加密理论, The Public-Key Encryption Theory, 科学出版社, 2016-06, 第 1 作者
软件著作权
(1) ASM-SPV AnB2IF 协议语言转换系统 V1.0. 登记号: 2013SR043545. 2013年2月26日
(2) 多中央权威的基于属性签名系统 V1.0. 登记号: 2013SR049259. 2013年2月26日
(2) 多中央权威的基于属性签名系统 V1.0. 登记号: 2013SR049259. 2013年2月26日
国际会议委员
ProvSec 2012,InTrust 2012,INTRUST 2011,AsiaPKC 2013,ISPEC 2015,AsiaCCS 2016,INTRUST 2015,ICICS 2015,ATIS 2016,PSBD 2017,ATIS2017