当前位置: X-MOL首页全球导师 国内导师 › 董晓蕾

个人简介

教育经历 1998.9-2001.7,哈尔滨工业大学数学系,理学博士,导师:游宏教授 工作经历 2001.9-2003.7,上海交通大学数学系,博士后,联系导师:沈灏教授 2003.7-2014.12,上海交通大学计算机系,担任副教授(2004)、教授、博导(2009),组建上海交通大学密码学与SEC-X实验室(2003.9-2014.9) 2014.5-,华东师范大学软件工程学院,担任教授、博导,特聘教授,学校通识教育委员会委员、学院教学委员会委员 荣誉及奖励 研究成果“数论和现代密码算法”与“云安全的关键理论与方法研究”分别获得2001年度和2018年度教育部自然科学一等奖,“复杂密码系统的形式化安全理论与应用”和“信息安全协议新方法研究”分别获得2008年度和2015年度教育部自然科学奖二等奖,“密码学新理论和若干共性基础问题研究”获得2007年度上海市自然科学二等奖,“密码算法若干关键问题研究”获得2016年度全国党政密码科学技术二等奖。云计算安全的论文“Security and privacy for storage and computation in cloud computing”(Inf. Sci. 258: 371-386, 2014)入选“中国百篇最具国际影响力的学术论文”,后量子密码算法的论文“Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols”(Comput. J. 61(4): 545-560, 2018)获得国际高水平期刊The Computer Journal颁发的2019年Wilkes奖。 此外,“可证安全密码系统的若干理论与应用研究”(项目编号:60673079)获得国家自然科学基金委特优完成项目。还分别获得2009年和2014年上海交通大学优秀教师一等奖和特等奖,主编教材获得上海交通大学第十四届优秀教材特等奖。

研究领域

数论、密码学与网络安全

近期论文

查看导师最新文章 (温馨提示:请注意重名现象,建议点开原文通过作者单位确认)

Y. Yang, Xiaolei Dong, Z. Cao, J. Shen, S. Dou: IXT: Improved searchable encryption for multi-word queries based on PSI. Frontiers Comput. Sci. 17(5): 175811 (2023) J. Zhou, S. Chen, K.-K. R. Choo, Z. Cao, Xiaolei Dong: EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs. IEEE Trans. Mob. Comput. 22(3): 1491-1506 (2023) H. Hu, Z. Cao, Xiaolei Dong: Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Access 10: 87322-87332 (2022) Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, H. Bao, J. Shen: A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022) Z. Liu, Z. Cao, Xiaolei Dong, X. Zhao, T. Liu, H. Bao, J. Shen: EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022) Y. Guo, Z. Cao, Xiaolei Dong: Generalized Goldwasser and Micali's Type Cryptosystem. J. Comput. Sci. Technol. 37(2): 459-467 (2022) J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain. IEEE Trans. Cloud Comput. 10(1): 366-382 (2022) Y. Chen, T. Zhou, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks. IEEE Trans. Intell. Transp. Syst. 23(8): 11752-11766 (2022) G. Wang, Z. Cao, Xiaolei Dong: Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory. Comput. J. 64(8): 1264-1276 (2021) X. Zhao, Z. Cao, Xiaolei Dong, J. Shao: Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. Des. Codes Cryptogr. 89(2): 241-253 (2021) Y. Guo, F. Meng, L. Cheng, Xiaolei Dong, Z. Cao: Designated server-aided revocable identity-based keyword search on lattice. EURASIP J. Wirel. Commun. Netw. 2021(1): 174 (2021) N. Cao, Z. Cao, Xiaolei Dong, H. Wang: Improved RSA lossy trapdoor function and applications. Int. J. Inf. Comput. Secur. 14(3/4): 229-241 (2021) L. Chen, J. Zhou, Y. Chen, Z. Cao, Xiaolei Dong, K.-K. R. Choo: PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks. IEEE Internet Things J. 8(10): 7863-7873 (2021) M. Lou, Xiaolei Dong, Z. Cao, J. Shen: SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Networks 2021: 8884478:1-8884478:18 (2021) J. Zhou, K.-K. R. Choo, Z. Cao, Xiaolei Dong: PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2253-2270 (2021) J. Ning, Z. Cao, Xiaolei Dong, K. Liang, L. Wei, K.-K. R. Choo: CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) J. Qian, Z. Cao, Xiaolei Dong, J. Shen, Z. Liu, Y. Ye: Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid. IEEE Trans. Smart Grid 12(3): 2625-2637 (2021) J. Zhou, M. Zheng, Z. Cao, Xiaolei Dong: PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. Comput. Secur. 88 (2020) J. Chen, J. Zhou, Z. Cao, A. V. Vasilakos, Xiaolei Dong, K.-K. R. Choo: Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks. IEEE Internet Things J. 7(4): 2663-2678 (2020) H. Shen, J. Zhou, Z. Cao, Xiaolei Dong, K.-K. R. Choo: Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks. IEEE Internet Things J. 7(7): 6610-6622 (2020) J. Zhou, Z. Cao, Z. Qin, Xiaolei Dong, K. Ren: LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs. IEEE Trans. Inf. Forensics Secur. 15: 420-434 (2020) H. Wang, Xiaolei Dong, Z. Cao: Multi-Value-Independent Ciphertext-Policy Attribute Based Encryption with Fast Keyword Search. IEEE Trans. Serv. Comput. 13(6): 1142-1151 (2020) X. Zhao, Z. Cao, Xiaolei Dong, J. Shao, L. Wang, Z. Liu: New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. ACISP 2020: 408-424 Y. Wu, L. Yu, Z. Cao, Xiaolei Dong: Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation. ASIACRYPT (1) 2020: 662-693 X. Zhao, Z. Cao, Xiaolei Dong, J. Zheng: Anonymous IBE from Quadratic Residuosity with Fast Encryption. ISC 2020: 3-19 C. Fan, Xiaolei Dong, Z. Cao, J. Shen: VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage. TrustCom 2020: 285-292 H. Wang, Xiaolei Dong, Z. Cao, D. Li, N. Cao: Secure key-aggregation authorized searchable encryption. Sci. China Inf. Sci. 62(3): 39111:1-39111:3 (2019) G. Wang, Z. Cao, Xiaolei Dong: Improved Fault-Tolerant Aggregate Signatures. Comput. J. 62(4): 481-489 (2019) N. Cao, Z. Cao, Z. Liu, Xiaolei Dong, X. Zhao: All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application. Comput. J. 62(8): 1148-1157 (2019) J. Zhou, Z. Cao, Xiaolei Dong, T. Vasilakos: GTSIM-POP: Game theory based secure incentive mechanism and patient-optimized privacy-preserving packet forwarding scheme in m-healthcare social networks. Future Gener. Comput. Syst. 101: 70-82 (2019) D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving outsourced image feature extraction. J. Inf. Secur. Appl. 47: 59-64 (2019) H. Wang, Xiaolei Dong, Z. Cao: Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw. Appl. 12(1): 32-42 (2019) J. Zhou, Y. Zhang, Z. Cao, Xiaolei Dong: PPSAS: Lightweight Privacy-preserving Spectrum Aggregation and Auction in Cognitive Radio Networks. ICDCS 2019: 1127-1137 D. Li, Xiaolei Dong, Z. Cao, H. Wang: Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. SCIENCE CHINA Information Sciences 61(3): 032112:1-032112:9, 2018. S. Chen, P. Zeng, K. R. Choo, Xiaolei Dong: Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.Comput. J. 61(4): 545-560, 2018. H. Wang, Xiaolei Dong, Z. Cao, D. Li: Secure and Efficient Attribute-Based Encryption with Keyword Search. Comput. J. 61(8): 1133-1142, 2018. H. Zhang, Z. Cao, Xiaolei Dong, J. Shen: Proof of Multicopy via Proof of File Position in Cloud. Fundam. Inform. 157(1-2): 141-151, 2018. J. Ning, Z. Cao, Xiaolei Dong, L. Wei: White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Sec. Comput. 15(5): 883-897, 2018. J. Ning, Z. Cao, Xiaolei Dong, K. Liang, H. Ma, L. Wei: Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Information Forensics and Security 13(1): 94-105, 2018. M. Zheng, J. Zhou, Z. Cao, Xiaolei Dong: PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing. ICICS 2018: 215-231. Y. Liang, Z. Cao, Xiaolei Dong, J. Shen: Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption. ICICS 2018: 377-392. J. Zhou, Z. Cao, Xiaolei Dong, A. V. Vasilakos: Security and Privacy for Cloud-Based IoT: Challenges. IEEE Communications Magazine 55(1): 26-33, 2017. X. Zhang, Xiaolei Dong, J. Wu, Z. Cao, C. Lyu: Fault Activity Aware Service Delivery in Wireless Sensor Networks for Smart Cities. Wireless Communications and Mobile Computing2017 (2017) Xiaolei Dong, J. Zhou, and Z. Cao. Efficient Privacy-preserving Temporal and Spacial Data Aggregation for Smart Grid Communications, Concurrency and Computation: Practice and Experience, 28(4): 1145-1160, 2016. J. Gong, Xiaolei Dong, Z. Cao and J. Chen. Almost-tight Identity Based Encryption against Selective Opening Attack. The Computer Journal, 59(11): 1669-1688, 2016. D. Li, Xiaolei Dong, Z. Cao: Secure and privacy-preserving pattern matching in outsourced computing. Security and Communication Networks 9(16): 3444-3451, 2016. J. Ning, Z. Cao, Xiaolei Dong and L. Wei. Traceable and Revocable CP-ABE with shorter ciphertexts. SCIENCE CHINA Information Sciences, 59(11): 119102:1-119102:3, 2016. W. Jia, H. Zhu, S. Du, Xiaolei Dong, and Z. Cao. CPPA: Cloud Based Privacy Preserving Aggregation Architecture in Multi-Domain Wireless Networks. Security and Communication Networks, 9(13): 1905-1915, 2016. J. Zhou, Z. Cao, Xiaolei Dong. Secure and efficient fine-grained multiple file sharing in cloud-assisted crowd sensing networks. Peer-to-Peer Networking and Applications, 9(4): 774-794, 2016. J. Gong, J. Chen, Xiaolei Dong, Z. Cao, S. Tang. Extended Nested Dual System Groups, Revisited. PKC 2016(1): 133-163, 2016. J. Gong, Xiaolei Dong, J. Chen, Z. Cao: Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting. ASIACRYPT (2) 2016: 624-654 J. Zhou, Z. Cao, Xiaolei Dong: PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. ESORICS (1) 2016: 135-153. J. Ning, Z. Cao, Xiaolei Dong, J. Gong, J. Chen: Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569. Xiaolei Dong. Advances of Privacy Preservation in Internet of Things. Journal of Computer Research and Development, 52(10): 2341-2352, 2015 (in Chinese) J. Zhou, Xiaolei Dong, Z. Cao. Research progress of ciphertext access control and privacy protection. Bulletin of Chinese Association for Cryptologic Research (CACR), 4(6): 19-21, 26, 2015 (in Chinese). X. Zhang, Xiaolei Dong, N. Xiong, J. Wu, and X. Li. Fault-aware Flow Control and Multi-path Routing in VANETs, Peer-to-Peer Networking and Applications, 8(6): 1090-1107, 2015. J. Zhou, Xiaolei Dong, Z. Cao, and A. V. Vasilakos. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6): 1299-1314, 2015. J. Ning, Xiaolei Dong, Z. Cao, L. Wei, and X. Lin. White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Transactions on Information Forensics and Security, 10(6): 1274-1288, 2015. J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. Security and Privacy in Cloud-assisted Wireless Wearable Communications: Challenges, Solutions and Future Directions. IEEE Wireless Communications, 22(2): 136-144, 2015. J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. PPDM: Privacy – preserving Protocol for Dynamic Medical Text Mining and Image Feature Extraction from Secure Data Aggregation in Cloud-assisted e-Healthcare Systems, IEEE Journal of Selected Topics in Signal Processing, 9(7): 1332-1344, 2015. J. Zhou, X. Lin, Xiaolei Dong, and Z. Cao. PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System. IEEE Transactions on Parallel and Distributed Systems, 26(6): 1693-1703, 2015. J. Zhou, Z. Cao, Xiaolei Dong, N. Xiong, and A. V. Vasilakos. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks, Information Sciences, 314: 255-276, 2015. J. Zhou, Z. Cao, Xiaolei Dong, and X. Lin. TR-MABE: White-Box Traceable and Revocable Multi-authority Attribute-based Encryption and Its Applications to Multi-level Privacy-preserving e-Healthcare Cloud Computing Systems, IEEE INFOCOM 2015, Hong Kong, 26 April - 1 May, 2015. IEEE, 2398-2406, 2015. J. Ning, Xiaolei Dong, Z. Cao, L. Wei. Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS 2015(2): 270-289, 2015. J. Zhou, Z. Cao, Xiaolei Dong, X. Lin. EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function. IEEE ICC 2015: 7444-7449, 2015. L. Wei, H. Zhu, Z. Cao, Xiaolei Dong, W. Jia, Y. Chen, and A. V. Vasilakos. Security and privacy for storage and computation in cloud computing. Information Sciences, 258: 371-386, 2014. W. Jia, H. Zhu, Z. Cao, Xiaolei Dong, and C. Xiao. Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid. IEEE Systems Journal, 8(2): 598-607, 2014. Z. Li, Xiaolei Dong, and Z. Cao. The equation x^r=a over finite fields, Journal of Cryptologic Research, 1(6): 602-616, 2014 (in Chinese). J. Ning, Z. Cao, Xiaolei Dong, L. Wei, and X. Lin. Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS 2014 (2), Lecture Notes in Computer Science 8713, 55-72, 2014. Xiaolei Dong, J. Zhou, K. Alharbi, X. Lin, and Z. Cao. An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid, IEEE Globecom 2014, Austin, Texas, USA, December 8-12, 2014. IEEE, 4720-4725, 2014. H. Zhang, Z. Cao, Xiaolei Dong, and J. Shen. 4P_VES: a Collusion - Resistant Accountable Virtual Economy System, ICICS 2014, Hong Kong, December 16-17, 2014.

学术兼职

国际期刊Security and Communication Networks (John Wiley)副编辑(Associate Editor )以及KSII Transactions on Internet and Information Systems编委。密码学和网络安全等方面著名国际会议的TPC member,包括:Globecom、BODYNETS、Pairing等

推荐链接
down
wechat
bug