Yong Li

Work place: Key Laboratory of Communication & Information Systems (Beijing Jiaotong University), Beijing Municipal Commission of Education, Beijing 100044, China

E-mail: li.yong9@gmail.com

Website:

Research Interests: Computer Architecture and Organization, Information Security, Data Structures and Algorithms, Information-Theoretic Security

Biography

Yong Li received his M.S. degree in Computer Science from Wuhan University in 2003, and the Ph.D. degree from State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences in 2007. 
Currently, he is an associate professor at the School of Electronic and Information Engineering, Beijing Jiaotong University. He has over 20 publications and filed 6 patents. His research interests include cryptographic protocols and information security.
Dr. Li is a member of the International Association for Cryptologic Research (IACR), Chinese Association for Cryptologic Research (CACR), Association for Computing Machinery (ACM), China Computer Federation (CCF). He served as organizing committee chair of the international conference on cloud computing (CloudCom 2009). He was the program committee member for the international conferences CloudCom 2009, CloudCom 2010, NCIS'11. He also served as peer reviewers for seveal international conferences and academic journals, such as Asiacrypt, PKC, FSE, ACNS, Journal of Systems and Software, High Technology Letters, etc. 

Author Articles
Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

By Xi Chen Yong Li

DOI: https://doi.org/10.5815/ijwmt.2012.01.08, Pub. Date: 15 Feb. 2012

As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. In this paper, we propose a new cryptographic primitive Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files storaged in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. The scheme is semantically secure under the BDH assumption.

[...] Read more.
Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage

By Xi Chen Yong Li

DOI: https://doi.org/10.5815/ijcnis.2011.02.07, Pub. Date: 8 Mar. 2011

Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated by the challenging problem “Private Searching over Encrypted Data”, we propose a new cryptographic primitive, Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files stored in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. Extensive analysis shows that our scheme is efficient and semantically secure under the BDH assumption.

[...] Read more.
Other Articles