李西明

李西明
姓名李西明性别
研究生导师类型硕士生导师研究方向暂无
职务暂无职称副教授
所属组织机构                                                                            暂无                                            
办公地点606办公电话85280320-606
电子邮箱liximing  AT  scau.edu.cn;   liximing_cn AT 163.com个人主页暂无
中文个人简介


912.gif

教育、研究背景方面:

1992.9-1996.7 山东工业大学,自动化系,获工学学士学位;

2002.9-2005.7 暨南大学,信息学院,获工学硕士学位;

2007.9-2011.6 华南农业大学,信息学院,获工学博士学位;

2012.3-2013.8 以色列国本固里安大学自然科学学院,获得以色列政府“杰出博士后研究者项目”资助,博士后研究。

2014.6-2014.7 以色列国本固里安大学,获得本固里安大学资助,访问学者。

 

工作方面:

1996/07 -- 2002/09,聊城师范学院,教育工程系、通信工程系,助教。

2005/07 – 2015/06  华南农业大学,现代教育技术中心,工程师、高级工程师。

2015/07  - 现在   华南农业大学,数学与信息学院,高级工程师、副教授

 

研究方向:

1)  云计算及大数据应用技术;

2)  分布式数据存储和检索技术体系;

3)  云空间上的加密存储和搜索技术。

主持、参与的项目:

1)   基于大数据的工程建设水环境影响评价研究,广东省水利水电技术中心,横向课题,2017.8-2018.8,李西明主持

2)   信息论安全的实用化的云计算技术研究,教育部留学归国人员启动基金,2015.1-2016.12,李西明主持

3)   物联网感知层信息安全软件平台的研究与实现,广东省科技计划项目,2011.1-2014.12,李西明排名第2位(校内主持)。

4)   Wetoband云平台工具软件开发,横向项目, 2014.8-2015.7 李西明主持。

5)   公钥可搜索加密技术的研究,横向课题,2015.11-2016.12,李西明排名第4位。

6)   面向土地资源管理与服务的大数据开放型应用示范,广东省前沿与关键技术创新项目, 2015.10.192018.12.31,李西明排名第7。 

7)   软件工厂开发模式及企业应用研究 技术服务,横向课题,2015.09.012016.08.31,李西明排名第2位。

8)   关于高效的抗泄漏数字签名的设计的研究,国家自然科学基金,2015.1-2018.12,李西明排名第4位。

9)   多用户环境下的可搜索公钥加密研究,国家自然科学基金, 2015.1-2017.12,李西明排名第3位。

10)  建设用地整治监测与评价关键技术研究与示范,国家公益性专项,2014.05.102016.12.31 ,李西明排名第5位。

11)  Ad Hoc网络基于Markov进化算法的QoS组播路由优化算法研究,广东省自然科学基金,2014.1-2015.12, 李西明排名第3位。

12)  村镇建设用地再开发县市省三级互通互联与公共服务技术研究,国土资源部,2013.01.01—2016.06.30,李西明排名第3位。

13)  基于IPv6的下一代绿色无线智慧校园应用示范,国家发展与改革委员会项目,2012.06--2013.12,李西明排名第5位。

14)  隐私保护的函数策略加密体制的研究,国家自然科学基金, 2012.8-2016.12, 李西明排名第5位。

15)  基于格的安全多方计算协议研究, 国家自然科学基金,2012.1-2014.12,李西明排名第4位。

16)  安全高效的并发签名的研究,教育部,2012.1-2014.12,李西明排名第5位。

17)  指定确认者签名的研究,广东人才培养计划,2012.1-2013.12,李西明排名第4位。


发表论文

(1)    Shlomi Dolev, Ephraim Korach, Ximing Li, Yin Li, Galit Uzana. Magnifying computing gaps: Establishing encrypted communication over unidirectional channels. Theoretical Computer Science.Volume 636, 11 July 2016, Pages 1726.

(2)     Sun Shuyi, Hu Yueming, Li Ximing, Long  Shaoqiu, Guo Yubin ,B/S Based Design and Implementation of the Land Requisition and Reserves  Management System of Villages and Towns Construction Land,International Conference on Material, Energy and Environment Engineering (ICM3E 2016) ,Guangzhou.

(3)    Ma Haoxiang, Hu Yueming, Li Ximing,  Long Shaoqiu, Guo Yubin,Design and Implementation of Three Old Reform Information Service  Operational Sub-system,The 2016 2nd International Forum on Engineering Materials and Manufacturing Technology (IFEMMT 2016), Guangzhou.

(4)    Kai Lv, Yueming Hu , Ximing Li,Design and Implementation of Examination and Approval Management for Urban Regeneration in the Pearl River Delta,International Conference on Service Science, Technology and Engineering 2016, Suzhou.

(5)    Zhong Yingqiang, Hu Yueming, Li Ximing, Lv Kai,B/S Based Design and Implementation of the Regulation Information System of Villages and Towns Construction Lands Market,2016 2nd International Conference on Advances in Computer Engineering and Applications (ICACEA),Xian

(6)    Hillel Avni, Shlomi Dolev, Niv Gilboa andXiming Li. SSSDB: Database with Private Information Search, ALGOCLOUD 2015, Greece.

(7)    Shlomi Dolev, Niv Gilboa, and Ximing Li*. 2015. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract. In Proceedings of the 3rd International Workshop on Security in Cloud Computing (SCC '15).

(8)    李西明,杨波*,郭玉彬,姚金涛、一种新的基于指纹的密钥隐藏方案,计算机研究与发展,第51卷,第三期,2013(EI收录)

(9)    Guo, Yubin, Liankuan Zhang, Fengren Lin andXiming Li*. (2013). A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database. Journal Of Computers, 8(6), 1427-1432. (EI收录)

(10)  Guo, Yubin, Zeye Cai, Zewei Lin andXiming Li*. "Design and Implementation of a Flexible Workflow Management System." Journal of Software , 8.12 (2013): 3060-3065. (EI收录)

(11)  Shlomi Dolev, Nova Findina and Ximing Li*、Nested Merkle's Puzzles Against Sampling Attacks, The 8th China International Conference on Information Security and Cryptology, 北京

(12)  Sun, Weiwei, Yang, Bo*  and Ximing Li. Non-interactive equivocable commitment from Lossy encryption. Journal of Convergence Information Technology, v 7, n 8, p 389-397, May 2012 (EI收录)

(13)   Weiwei Sun, Bo Yang*, Qiong Huang, Sha Ma, and Ximing Li. Multi-committer Threshold Commitment Scheme from Lattice. The 10th Pacific Asia Workshop on Intelligence and Security Informatics, Springer, LNCS 7299, pp. 162-175 (2012),大会报告(EI收录)

(14)  李西明,杨波,郭玉彬.生物特征安全概略构造:理论与实践,武汉理工大学学报,第33卷,第7期,147-151页,2011

(15)  李西明*,郭玉彬、指纹模板量化特性研究,计算机工程与设计,第32卷,第5期,1589-1592页,2011

(16)  Ximing Li,Yang Bo*,Zhang Ming Wu、Provably semi-statically secure broadcast signcryption scheme with small ciphertext,ICIC Express Letters,第5卷,第3期,803-808页,2011.3(EI收录)

(17)  李西明,杨波*、构造高性能的指纹密钥提取器,计算机科学,第38卷,第3期, 107-110页,2011

(18)  Ximing Li,Yang Bo*,Guo Yu Bin. Provably secure group based broadcast encryption on lattice Journal of Information and Computational Science,第8卷,第2期, 179-193页,2011 (EI收录)


 

发明专利

序号

时间

专利名称

排名

申请号

授权号

9

2017-04

一种基于散列表方法的多公共云上的存储及其检索方法

1

201710220954.7


8

2016-06

一种基于RFID电子标签的农产品追溯方法

 

4

201610432743.5


7

2016-09

一种圆形二维码及其编码方法和应用

3

201610831079.1


6

2016-08

一种基于多公共云的分布式数据存储方法和检索方法

1

201610649229.7


5

2016-07

一种基于多二维码模式识别的自动化管理技术

1

201610566928.5


4

2016-06

一种动态可配置的模块化生成的信息发布平台

1

201610411992.6


3

2016-03

基于加密关键字搜索的双向匿名可信网络借贷系统及方法

1

201610173164.3


2

2015-10

基于二维码的匿名的快递信息安全系统

1

201510873921.3


1

2015-08

基于公共云的安全的分布数据管理方法

1

201510476859.4

 


0

2014.10.30

Accumulating Automata and     Cascaded Equations Automata for Non Interactive and Perennial Secure     Multi-Party Computation

3


WO/2014/174516



地址:

广东省广州市天河区五山街483号华南农业大学数信学院606办,510642

邮件:

liximing AT scau.edu.cn

liximing_cn AT 163.com

博客:

http://blog.sina.com.cn/netmousescau


英文个人简介


Ximing Li

Senior Engineer

 

Education

Ximing Li received Ph.D. degree on cryptography from College of Informatics, South China Agricultural University, Guangzhou, Guangdong, China, in 2011. his Ph.D. advisor is Prof. Yang Bo. With advisor Prof. Weiping Liu in Jinan University, Guangzhou, Guangdong, China, he got his Master Degree on Communication and Information system in 2005.

He has visited Prof. Shlomi Dolev as post-doc between  2012.3 -2013.8 and 2014.6-2014.07, in Ben Gurion University of the Negev in Israel.

 

Patents:

Accumulating Automata and Cascaded Equations Automata for Non Interactive and Perennial Secure Multi-Party Computation. Shlomi Dolev, Niv Gilboa and Ximing Li. Publication No. WO/2014/174516, 2014.10.30

 

 

Publications:

·         Hillel Avni, Shlomi Dolev, Niv Gilboa and Ximing Li*. SSSDB: Database with Private Information Search, ALGOCLOUD 2015, Greece.

·         Shlomi Dolev, Niv Gilboa, and Ximing Li*. 2015. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract. In Proceedings of the 3rd International Workshop on Security in Cloud Computing (SCC '15).

·         Guo, Yubin, Liankuan Zhang, Fengren Lin and Ximing Li*.  A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database. Journal Of Computers, 8(6)(2013), 1427-1432. 

·         Guo, Yubin, Zeye Cai, Zewei Lin and Ximing Li*. "Design and Implementation of a Flexible Workflow Management System." Journal of Software , 8.12 (2013): 3060-3065. 

·         Shlomi, Dolev; Nova, Fandina, Ximing Li*Nested Merkle's Puzzles against Sampling Attacks. Information Security and Cryptology. 8th International Conference, Inscrypt 2012. Revised Selected Papers, p 157-74, 2013

·         Guo, Yubin; Zhang, Liankuan; Lin, Fengren; Ximing Li*A solution for privacy-preserving data manipulation and query on NoSQL database. Journal of Computers (Finland), v 8, n 6, p 1427-1432, 2013

·         Ximing Li; Yang, Bo; Guo, Yubin; Yao, Jintao. A new key hiding scheme based on fingerprint. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, v 50, n 3, p 532-539, March 2013 Language: Chinese

·         Weiwei Sun; Bo Yang; Qiong Huang; Sha Ma; Ximing LiMulti-Committer Threshold Commitment Scheme from Lattice. Intelligence and Security Informatics. Proceedings Pacific Asia Workshop, PAISI 2012, p 162-75, 2012

·         Sun, Weiwei; Yang, Bo; Ximing LiNon-interactive equivocable commitment from Lossy encryption. Journal of Convergence Information Technology, v 7, n 8, p 389-397, May 2012

·         Ximing Li; Yang, Bo; Guo, Yubin; Sun, Weiwei. Provably secure group based broadcast encryption on lattice. Journal of Information and Computational Science, v 8, n 2, p 179-193, February 2011

·         Ximing Li; Yang, Bo; Zhang, Mingwu. Provably semi-statically secure broadcast signcryption scheme with small ciphertext. Source: ICIC Express Letters, v 5, n 3, p 803-808, March 2011

·         Ximing Li, Yang Bo, Guo Yu-Bin. Construction of Biometric Secure Sketch: Theory and Practice. Journal of Wuhan University of Technology. 2011.Vol.33(7) (Language: Chinese)

·         Ximing Li, Guo Yu-Bin. Research on Quantization Characteristics of Fingerprint Template. Computer Engineering and Design. 2011. Vol.32(5). (Language: Chinese)

·         Ximing Li, Yang Bo, Yao Jin-Tao. Secure Sketch Construction of Fuzzy Vector and Analysis of Security. Computer Engineering and Design. 2011.Vol.31(23): 4957-4959. (Language: Chinese)

·         Yang Bo; Ximing Li; Zhang Wenzheng. The Effect of Public String on Extracted String in A Fuzzy Extractor. International Journal of Computer and Network Security, v 2, n 10, p 9-12, 2010

·         Ximing Li, Yang Bo. Construction of Fingerprint Key Extraction With High Performance. Computer Science. 2010. Vol.38(3): 107-110. (Language: Chinese)

·         Ximing Li, Zhang Ming-Wu. Research of Construction and Security of Fuzzy Extractors. Journal of Chongqing University of Technology. 2010.08. (Language: Chinese)

·         Yang, De-Xin. Yang, Bo. Ximing LiEfficient two-server password authenticated key exchange scheme. Journal on Communications, 2010. Vol.31(9):228-232, (Language: Chinese)

·         Ximing Li; Yang, Bo; Zhang, Mingwu; Yang, Dexin. Construction and performance of robust fingerprint key extractorJournal of Information and Computational Science, v 7, n 6, p 1287-1300, June 2010

·         Ximing Li; Bo Yang; YuBin Guo. Fuzzy identity based encryption scheme with some assigned attributes. 2009 Fifth International Conference on Information Assurance and Security (IAS), p 133-6, 2009

·         Ximing Li; Bo Yang; MingWu Zhang. New construction of fuzzy identity-based encryption. Source: 2009 WASE International Conference on Information Engineering (ICIE), p 647-51, 2009

·         Yubin Guo; Jianqing Xi; Deyou Tang; Ximing LiA correctness criterion for transaction management in loosely coupled system. NPC 2007 Workshops. IFIP International Conference on Network and Parallel Computer Workshops, p 975-82, 2007

·         Yubin, Guo; Jianqing, Xi; Deyou, Tang; Ximing LiA transaction description model and properties for P2P computing. Information Technology Journal, v 6, n 4, p 509-517, May 15, 2007

 

Contacts::

 

Email: liximing.cn at gmail.com