Xiaohui Liang

Department of Computer Science and Engineering

Shanghai Jiao Tong University

Shanghai 200240, P.R.China

Email: liangxh127@sjtu.edu.cn

MSN: xh_liang_127@hotmail.com

Phone: +86 13636388906


EDUCATION

  • 09/2002 - 06/2006 Shanghai Jiao Tong University(SJTU), Bachelor of Engineering Major in Computer Science and Engineering
  • 09/2006 - Present Shanghai Jiao Tong University(SJTU), Graduate of Engineering Major in Computer Science and Engineering, Trusted Digital Technology Lab

Research Interests

  • My research mainly focuses on applied cryptography and network security.

Academic Experiences

  • 11/2008 - 11/2008 Tokyo, Japan, National Institute of Information and Communications Technology(NICT), Visiting Student, Security Foundation Group.
  • 07/2005 - 09/2005 Beijing, China, Microsoft Research Asia(MSRA). Visiting Student,Wireless and Networking Group.
  • 07/2004 - 06/2006 Shanghai, China, Trusted Digital Technology(TDT) Lab, SJTU. Undergraduate Student Research Assistant.

Publications

(Reverse chronological order)

  • Xiaohui Liang, Zhenfu Cao, Huang Lin and Dongsheng Xing, Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption, ASIACCS 2009, Sydney, Australia, 10-12 March 2009, accepted.

  • Xiaohui Liang, Zhenfu Cao, Huang Lin and Jun Shao, Attribute Based Proxy Re-encryption with Delegating Capabilities, ASIACCS 2009, Sydney, Australia, 10-12 March 2009, accepted.

  • Huang Lin, Zhenfu Cao, Xiaohui Liang and Jun Shao. Secure threshold multi authority attribute based encryption without a central authority, INDOCRYPT 2008, Kharagpur, India, December 14-17, 2008. PDF

  • Xiaohui Liang, Zhenfu Cao, Rongxing Lu, and Liuquan Qin, Efficient and secure protocol in fair document exchange, Computer Standards & Interfaces, Volume 30, Issue 3, March 2008, Pages 167-176 . PDF

  • Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, and Xiaohui Liang, New (t, n) threshold directed signature scheme with provable security, Information Sciences, Volume 178, Issue 3, 1 February 2008, Pages 756-765. PDF

  • Rongxing Lu, Zhenfu Cao, Zhenchuan Chai, and Xiaohui Liang, A Simple User Authentication Scheme for Grid Computing, International Journal of Network Security, 7(2): 202-206, 2008. PDF

  • Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, and Xiaohui Liang, A simple deniable authentication protocol based on the Diffie-Hellman algorithm, International Journal of Computer Mathematics, 85(9): 1315-1323, September 2008. PDF

  • Jun Shao, Zhenfu Cao, Licheng Wang and Xiaohui Liang. Proxy re-signature schemes without random oracles. INDOCRYPT 2007, Lecture Notes in Computer Science, Volume 4859: 197-209, 2007. PDF

  • Xiaohui Liang, Zhenfu Cao, Jun Shao and Huang Lin, Short Group Signature without Random Oracles, ICICS 2007, Lecture Notes in Computer Science, Volume 4861: 69-82, 2008. PDF

  • Xiaohui Liang, Zhenfu Cao, Chai Zhenchuan and Lu Rongxing, ID-based Threshold Blind Signature scheme from Bilinear Pair, ChinaCrypt2006, pp.244 - 252, 2006. PDF

Seminar Presentations

  • Fast and proven secure blind identity-Based signcryption from pairing.PDF
  • Security of blind discrete log signatures against interactive attacks.PDF
  • Survey on group signatures in standard model and some open questions.PDF
  • Chosen-Ciphertext(Plaintext) security transformation between schemes.PDF
  • Non-interactive proof system for bilinear group.PDF
  • Notes on Gentry's identity based encryption CCA-secure without random oracle.PDF
  • Introduction of Revocation in cryptography. PDF

Conference List

ACM SIGCOMM 2009 2009-01-23
Information Hiding 2009 (IH'09) 2009-02-01
18th USENIX Security Symposium 2009-02-04
PODC 2009 2009-02-04
22nd IEEE Computer Security Foundations Symposium (CSFW 2009) 2009-02-06
15th International Conference on Computing and Combinatorics (COCOON 2009) 2009-02-09
14th Australasian Conference on Information Security and Privacy (ACISP 2009) 2009-02-09
36th International Colloquium on Automata, Languages and Programming (ICALP 20 09) 2009-02-10
Crypto 2009 2009-02-13
IEEE Conference on Computational Complexity (CCC 2009) 2009-02-13
SOSP 2009 2009-03-02
MOBICOM 2009 2009-03-05
VLDB: Very Large Data Bases 2009 2009-03-13 (5:00pm GMT)
Asiacrypt 2009 2009-05-29
Some photos here, have fun!