Work place: Key Laboratory of Communication & Information Systems (Beijing Jiaotong University), Beijing Municipal Commission of Education, Beijing 100044, China
E-mail: li.yong9@gmail.com
Website:
Research Interests: Computer Architecture and Organization, Information Security, Data Structures and Algorithms, Information-Theoretic Security
Biography
Yong Li received his M.S. degree in Computer Science from Wuhan University in 2003, and the Ph.D. degree from State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences in 2007.
Currently, he is an associate professor at the School of Electronic and Information Engineering, Beijing Jiaotong University. He has over 20 publications and filed 6 patents. His research interests include cryptographic protocols and information security.
Dr. Li is a member of the International Association for Cryptologic Research (IACR), Chinese Association for Cryptologic Research (CACR), Association for Computing Machinery (ACM), China Computer Federation (CCF). He served as organizing committee chair of the international conference on cloud computing (CloudCom 2009). He was the program committee member for the international conferences CloudCom 2009, CloudCom 2010, NCIS'11. He also served as peer reviewers for seveal international conferences and academic journals, such as Asiacrypt, PKC, FSE, ACNS, Journal of Systems and Software, High Technology Letters, etc.
DOI: https://doi.org/10.5815/ijwmt.2012.01.08, Pub. Date: 15 Feb. 2012
As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. In this paper, we propose a new cryptographic primitive Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files storaged in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. The scheme is semantically secure under the BDH assumption.
[...] Read more.DOI: https://doi.org/10.5815/ijcnis.2011.02.07, Pub. Date: 8 Mar. 2011
Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated by the challenging problem “Private Searching over Encrypted Data”, we propose a new cryptographic primitive, Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files stored in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. Extensive analysis shows that our scheme is efficient and semantically secure under the BDH assumption.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals