电子邮件: xujing@iscas.ac.cn
通信地址: 北京市海淀区中关村南四街4号
邮政编码: 100190
研究领域
应用密码学、安全协议、数据安全
招生信息
招生专业
招生方向
可信计算与信息保障
工作经历
工作简历
社会兼职
2022-12-09-2026-12-09,中国密码学会安全协议专业委员会, 副主任
2020-02-27-2024-02-27,密码学报, 编委
2019-12-17-2023-12-01,中国密码学会区块链专业委员会, 委员
2014-05-01-2018-05-01,中国密码学会青年工作委员会, 委员
教授课程
专利、奖励与标准
奖励信息
专利成果
国家标准
(1)GB/T 30275-2013,信息安全技术 鉴别与授权 认证中间件框架与接口规范
(2)GB/T 30269.601-2016,信息技术 传感器网络 第601部分:信息安全:通用技术规范
出版信息
代表性学术论文
(1)Multiple Handshakes Security of TLS 1.3 Candidates, IEEE Symposium on Security & Privacy(四大安全顶会), 2016, 通讯作者
(2)Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocols. IEEE Transactions on Information Forensics and Security (CCF-A), 2020,通讯作者
(3)Horcrux: Synthesize, Split, Shift and Stay Alive Preventing Channel Depletion via Universal and Enhanced Multi-hop Payments, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2025, 通讯作者
(4)Dumbo: Faster Asynchronous BFT Protocols, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2020, 第 4 作者
(5)Speeding Dumbo: Pushing Asynchronous BFT Closer to Practice, Network and Distributed System Security Symposium (NDSS,四大安全顶会), 2022, 第 4作者
(6)Accountable Proxy Re-encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2021, 通讯作者
(7)Sidechains with Fast Cross-chain Transfers, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2022, 通讯作者
(8)Investigating the Multi-Ciphersuite and Backwards- Compatibility Security of the Upcoming TLS 1.3, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2019, 通讯作者
(9)Escaping from Consensus: Instantly Redactable Blockchain Protocols in Permissionless Setting, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2023, 通讯作者
(10)Sidechains with optimally succinct proof, IEEE Transactions on Dependable and Secure Computing (CCF-A), 2024, 通讯作者
(11)Dumbo-NG:Breaking down Asynchronous BFT Consensus to Approach the Physical Limit, ACM Conference on Computer and Communications Security (CCS,四大安全顶会), 2022, 第 4 作者
(12)Generic Traceable Proxy Re-Encryption and Accountable Extension in Consensus Network, ESORICS (CCF-B), 2019, 通讯作者
(13)Non-transferable Proxy Re-encryption,The Computer Journal (CCF-B), 2019, 第3作者
(14)Interopera: An Efficient Cross-Chain Trading Protocol,The Computer Journal (CCF-B), 2022, 通讯作者
(15)Modular Security Analysis of OAuth 2.0 in the Three-Party Setting. IEEE European Symposium on Security and Privacy (EuroS&P), 2020, 通讯作者
(16)Universally composable anonymous password authenticated key exchange, Science China Information Sciences (CCF-A), 2017, 第4作者
(17)Round-Optimal Password-based Group Key Exchange Protocols in the Standard Model,13th International Conference on Applied Cryptography and Network Security (ACNS), 2015, 第1作者
(18)Efficient Identity Based Strong Designated Verifier Signature Schemes, Security and Communication Networks, 2013,第2作者
(19)Revisiting the Security of Qian et al. Revised Tree-LSHB+ Protocol, Wireless Personal Communications, 2019,第2作者
(20)A Generic Framework for Anonymous Authentication in Mobile Networks, Journal of Computer Science and Technology,2013,第1作者
(21)Comments on the SM2 Key Exchange Protocol, International Conference on Cryptography and Network Security,2011,第1作者
(22)Provable Secure Authentication Protocol with Anonymity for Roaming Service in Global Mobility Networks, Computer Networks, 2011,第2作者
(23)An Efficient Location-Based Compromise-Tolerant Key Management Scheme for Sensor Networks, Information Processing Letters,2011,第2作者
(24)An Efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks, Computer Communications,2011,第1作者
(25)A Generic Framework for Constructing Cross-Realm C2C-PAKA Protocols Based on the Smart Card, Concurrency and Computation: Practice and Experience,2011,第1作者
(26)Certificateless Public-Key Signature: Security Model and Efficient Construction, ACNS, 2006, 第 3 作者
(27)Identity Based Strong Designated Verifier Signature Scheme Withou Pairing, Security and Communication Networks,2013,第2作者