Ximing Li

NameXiming Li
TitleSenior Engineer
Areas of Research信息安全基础理论
Personal Profile

Ximing Li

Senior Engineer

 

Education

Ximing Li received Ph.D. degree on cryptography from College of Informatics, South China Agricultural University, Guangzhou, Guangdong, China, in 2011. his Ph.D. advisor is Prof. Yang Bo. With advisor Prof. Weiping Liu in Jinan University, Guangzhou, Guangdong, China, he got his Master Degree on Communication and Information system in 2005.

He has visited Prof. Shlomi Dolev as post-doc between  2012.3 -2013.8 and 2014.6-2014.07, in Ben Gurion University of the Negev in Israel.

 

Patents:

Accumulating Automata and Cascaded Equations Automata for Non Interactive and Perennial Secure Multi-Party Computation. Shlomi Dolev, Niv Gilboa and Ximing Li. Publication No. WO/2014/174516, 2014.10.30

 

 

Publications:

·         Hillel Avni, Shlomi Dolev, Niv Gilboa and Ximing Li*. SSSDB: Database with Private Information Search, ALGOCLOUD 2015, Greece.

·         Shlomi Dolev, Niv Gilboa, and Ximing Li*. 2015. Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract. In Proceedings of the 3rd International Workshop on Security in Cloud Computing (SCC '15).

·         Guo, Yubin, Liankuan Zhang, Fengren Lin and Ximing Li*.  A Solution for Privacy-Preserving Data Manipulation and Query on NoSQL Database. Journal Of Computers, 8(6)(2013), 1427-1432. 

·         Guo, Yubin, Zeye Cai, Zewei Lin and Ximing Li*. "Design and Implementation of a Flexible Workflow Management System." Journal of Software , 8.12 (2013): 3060-3065. 

·         Shlomi, Dolev; Nova, Fandina, Ximing Li*Nested Merkle's Puzzles against Sampling Attacks. Information Security and Cryptology. 8th International Conference, Inscrypt 2012. Revised Selected Papers, p 157-74, 2013

·         Guo, Yubin; Zhang, Liankuan; Lin, Fengren; Ximing Li*A solution for privacy-preserving data manipulation and query on NoSQL database. Journal of Computers (Finland), v 8, n 6, p 1427-1432, 2013

·         Ximing Li; Yang, Bo; Guo, Yubin; Yao, Jintao. A new key hiding scheme based on fingerprint. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, v 50, n 3, p 532-539, March 2013 Language: Chinese

·         Weiwei Sun; Bo Yang; Qiong Huang; Sha Ma; Ximing LiMulti-Committer Threshold Commitment Scheme from Lattice. Intelligence and Security Informatics. Proceedings Pacific Asia Workshop, PAISI 2012, p 162-75, 2012

·         Sun, Weiwei; Yang, Bo; Ximing LiNon-interactive equivocable commitment from Lossy encryption. Journal of Convergence Information Technology, v 7, n 8, p 389-397, May 2012

·         Ximing Li; Yang, Bo; Guo, Yubin; Sun, Weiwei. Provably secure group based broadcast encryption on lattice. Journal of Information and Computational Science, v 8, n 2, p 179-193, February 2011

·         Ximing Li; Yang, Bo; Zhang, Mingwu. Provably semi-statically secure broadcast signcryption scheme with small ciphertext. Source: ICIC Express Letters, v 5, n 3, p 803-808, March 2011

·         Ximing Li, Yang Bo, Guo Yu-Bin. Construction of Biometric Secure Sketch: Theory and Practice. Journal of Wuhan University of Technology. 2011.Vol.33(7) (Language: Chinese)

·         Ximing Li, Guo Yu-Bin. Research on Quantization Characteristics of Fingerprint Template. Computer Engineering and Design. 2011. Vol.32(5). (Language: Chinese)

·         Ximing Li, Yang Bo, Yao Jin-Tao. Secure Sketch Construction of Fuzzy Vector and Analysis of Security. Computer Engineering and Design. 2011.Vol.31(23): 4957-4959. (Language: Chinese)

·         Yang Bo; Ximing Li; Zhang Wenzheng. The Effect of Public String on Extracted String in A Fuzzy Extractor. International Journal of Computer and Network Security, v 2, n 10, p 9-12, 2010

·         Ximing Li, Yang Bo. Construction of Fingerprint Key Extraction With High Performance. Computer Science. 2010. Vol.38(3): 107-110. (Language: Chinese)

·         Ximing Li, Zhang Ming-Wu. Research of Construction and Security of Fuzzy Extractors. Journal of Chongqing University of Technology. 2010.08. (Language: Chinese)

·         Yang, De-Xin. Yang, Bo. Ximing LiEfficient two-server password authenticated key exchange scheme. Journal on Communications, 2010. Vol.31(9):228-232, (Language: Chinese)

·         Ximing Li; Yang, Bo; Zhang, Mingwu; Yang, Dexin. Construction and performance of robust fingerprint key extractorJournal of Information and Computational Science, v 7, n 6, p 1287-1300, June 2010

·         Ximing Li; Bo Yang; YuBin Guo. Fuzzy identity based encryption scheme with some assigned attributes. 2009 Fifth International Conference on Information Assurance and Security (IAS), p 133-6, 2009

·         Ximing Li; Bo Yang; MingWu Zhang. New construction of fuzzy identity-based encryption. Source: 2009 WASE International Conference on Information Engineering (ICIE), p 647-51, 2009

·         Yubin Guo; Jianqing Xi; Deyou Tang; Ximing LiA correctness criterion for transaction management in loosely coupled system. NPC 2007 Workshops. IFIP International Conference on Network and Parallel Computer Workshops, p 975-82, 2007

·         Yubin, Guo; Jianqing, Xi; Deyou, Tang; Ximing LiA transaction description model and properties for P2P computing. Information Technology Journal, v 6, n 4, p 509-517, May 15, 2007

 

Contacts::

 

Email: liximing.cn at gmail.com