李晖 教授,博士生导师
博士学科:网络空间安全 密码学
硕士学科:网络空间安全 密码学
工作单位:网络与信息安全学院
联系方式:
电子邮箱:lihui@mail.xidian.edu.cn
办公电话:(029)81891867
办公地点:南校区行政辅楼214
个人简介:
李晖,博士生导师,现任西安电子科技大学网络与信息安全学院执行院长。ACM SIGSAC CHINA主席, 中国密码学会理事、安全协议专委会委员,中国中文信息学会大数据安全与隐私保护专委会副主任,中国电子学会信息论分会委员,IEEE学会会员。 1990年获得复旦大学无线电电子学理学学士学位, 1993年和1998年分别获得西安电子科技大学通信与电子系统工学硕士和工学博士学位,2009年在加拿大滑铁卢大学进行为期6个月的访问研究。主要的研究方向是密码信息安全、信息论与编码理论。
国家重点研发计划项目负责人, 主持863计划、国家科技支撑计划、新一代宽带移动通信国家重大专项、国家自然科学基金重点与面上项目、国防预研等项目15项,移动互联网安全陕西省创新团队负责人,获得国家级教学成果二等奖2项,陕西省教学成果特等奖1项,二等奖4项,陕西省优秀教材奖1项;省部级科技进步奖一等奖2项,二等奖3项,三等奖1项,2003年获得陕西省青年科技奖,2010年获陕西省教学名师奖,2017年获中央网信办网络安全优秀教师奖,2018年入选陕西省特支计划教学名师项目。获发明专利授权20余项,申请发明专利20项。论文170余篇。
主要研究方向
1. 云计算中的密码理论与安全协议
2. 移动互联网的隐私保护
3. 信息论与编码理论
科学研究:
一、目前研究团队承担的科研项目:
1) 网络信息安全方向:
⟡ 安全电子凭据服务及其监管关键技术,国家重点研发计划,2017.7-2020.12,2017YFB0802700
⟡ 互联网环境下隐私保护与取证,国家重点研发计划, 2017.7-2020.12,2017YFB0802201
⟡ 泛在网安全搜索基础理论与技术,国家自然科学基金重点项目,2018.01-2022.12,61732022
⟡ 移动互联网服务及隐私保护的理论与关键技术研究, 广东省联合基金项目,2015.1-2018.12,U1401251
⟡ 云计算环境下群组数据共享的隐私保护研究,国家自然科学基金面上项目,2013.1-2016,61272457
⟡ 移动感知服务中的隐私保护关键技术研究,陕西省自然科学基础研究计划重大基础研究项目,2016.1-2018.12,2016ZDJC-04
⟡ 可信路径与跨域认证技术,863计划,2012-2014,2012AA013102
2) 信息论与编码方向:
⟡ 高移动性宽带无线通信网络重点理论基础研究,973计划项目,2012-2016,2012CB316100
二、已完成的项目:
⟡ 面向IMT-Advanced协作中继的网络编码技术,新一代移动通信重大专项,2011-2012
⟡ 网络编码的安全问题研究,博士点基金项目,2011-2013
⟡ 宽带移动网络安全体系结构及关键技术,新一代移动通信国家重大科技专项,
⟡ 云计算中数据安全理论与关键技术,中央高校基本科研业务费重点项目,2012-2014
⟡ 基于云计算的网络安全技术,新一代移动通信重大专项,2012-2013
⟡ 移动互联网流量端到端管理和优化,新一代移动通信重大专项,2012-2013
⟡ 社区电子服务系统安全支撑体系 ,国家科技支撑计划项目
⟡ 移动自组织网络分布式PKI关键技术研究,国家自然科学基金面上项目
⟡ 公众移动网络P2P安全技术,科技部863探索导向类项目
⟡ 网络安全管理与监控系统,广东省教育部联合项目
⟡ XML安全认证协议研究,国家自然科学基金面上项目
⟡ 密码算法和安全协议自动化检测工具开发及测评系统构建,863目标导向类项目
⟡ 可信移动互联网络关键理论与应用研究,国家自然科学基金重点项目
⟡ Turbo码实用编译码算法研究,国家自然科学基金项目
论文发表(部分):
Conference paper:
1) 2018年:
➢ K Fan, J Wang, X Wang, H Li, Y Yang,Secure, efficient and revocable data sharing scheme for vehicular fogs,Peer-to-Peer Networking and Applications 11 (4), 766-777,2018
➢ K Fan, W Wang, W Jiang, H Li, Y Yang,Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV,Peer-to-Peer Networking and Applications 11 (4), 723-734,2018
➢ Q Han, C Li, H Li, Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things, Future Generation Computer Systems 83, 269-277,2018
➢ S Ding, C Li, H Li,A Novel Efficient Pairing-free CP-ABE Based on Elliptic Curve Cryptography for IoT,IEEE Access,2018
➢ K Fan, X Wang, K Suto, H Li, Y Yang,Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing,IEEE Network 32 (3), 52-57,2018
➢ K Fan, W Jiang, H Li, Y Yang,Lightweight RFID Protocol for Medical Privacy Protection in IoT,IEEE Transactions on Industrial Informatics 14 (4), 1656-1665,2018
➢ X Liu, H Zhu, R Lu, H Li,Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification,Peer-to-Peer Networking and Applications 11 (2), 334-347,2018
➢ F Shan, H Li, F Li, Y Guo, B Niu,HAC: Hybrid Access Control for Online Social Networks,Security and Communication Networks 2018
2) 2015
➢ Kai Fan, Deng Hai, Lang Wang, Hui Li, Yinyang Yang, Ciphertext retrieval in super-peer p2p network, GLOBECOM 2015
➢ Boyang Wang, Ming Li, Haitao Wang, Hui LI, Circular Range Search on Encrypted Spatial Data, IEEE CNS 2015
➢ Jin Cao ; Hui Li; Maode Ma , GAHAP: A Group-based Anonymity Handover Authentication Protocol for MTC in LTE-A Networks, ICC 2015
➢ Jin Cao ; Hui Li ; MaodeMa ; Fenghua Li, UGHA:Uniform Group-based Handover Authentication for MTC within E-UTRAN in LTE-A Networks ,ICC 2015
➢ Shunrong Jiang ; Xiaoyan Zhu; Ripei Hao; Haotian Chi; Hui Li ; Liangmin WangLightweight and Privacy-Preserving Agent Data Transmission for Mobile Healthcare, ICC 2015
➢ Weihao Li ; Ben Niu; Hui Li; Fenghua Li, Privacy-Preserving Strategies in Service Quality Aware Location-Based Services, ICC 2015
➢ Wenhai Sun, Xuefeng Liu; Wenjing Lou,Thomas Hou, Hui Li, Catch You If You Lie to Me: Efficient Verifiable Conjunctive Keyword Search over Large Dynamic Encrypted Cloud Data, IEEE INFOCOM 2015
➢ Ben Niu; Qinghua Li; Xiaoyan Zhu; Guohong Cao; Hui Li , Enhancing Privacy through Caching in Location-Based Services, IEEE INFOCOM 2015
➢ Niu, Ben ; Zhu, Xiaoyan; Li, Weihao; Li, Hui; Wang, Yingjuan; Lu, Zongqing A personalized two-tier cloaking scheme for privacy-aware location-based services, ICNC 2015, p 94-98,March 26, 2015
3) 2014
➢ Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index, ASIA CCS '14, Tokoyo, Japan
➢ Boyang Wang ; Ming Li ; Sherman S. M. Chow ; Hui Li, A Tale of Two Servers: Efficient Privacy-Preserving Computation over Cloud Data under Multiple Keys, 2th IEEE Conference on Communications and Network Security, 2014.10, San Fransico,USA
➢ Boyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li and Fenghua Li. Tree-based Multi-Dimensional Range Search on Encrypted Data with Enhanced Privacy, 10th International Conference on Security and Privacy in Communication Networks,Beijing, China
➢ Niu, Ben ;Zhu, Xiaoyan; Weihao,Li,Li, Hui, EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs, IEEE MASS 2014, Philadelphia, USA,2014.10
➢ Niu, Ben ; Li, Qinghua; Zhu, Xiaoyan; Li, Hui, A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services, ICCCN, September 25, 2014, Shanghai, China
➢ Zhu, Hui ; Huang, Rong; Liu, Ximeng; Li, Hui, SPEMR: A new secure personal electronic medical record scheme with privilege separation, 2014 IEEE International Conference on Communications Workshops, ICC 2014, p 700-705, 2014,
➢ Zhu, Xiaoyan ; Chi, Haotian; Jiang, Shunrong; Lei, Xiaosan; Li, Hui, Using dynamic pseudo-IDs to protect privacy in location-based services, 2014 IEEE International Conference on Communications, ICC 2014, p 2307-2312, 2014,
➢ Zhu, Hui; Huang, Cheng; Li, Hui, MPPM: Malware propagation and prevention model in online SNS, 2014 IEEE International Conference on Communications Workshops, ICC 2014,Sydney, NSW, Australia
➢ Zhu, Xiaoyan; Liu, Jie; Jiang, Shunrong; Chen, Zengbao; Li, Hui, Efficient Weight-based Private Matching for proximity-based mobile social networks, 2014 IEEE International Conference on Communications, ICC 2014,Sydney, NSW, Australia,2014
➢ Lai, Chengzhe; Li, Hui; Lu, Rongxing; Jiang, Rong; Shen, Xuemin, SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks, 2014 IEEE International Conference on Communications, ICC 2014, p 1011-1016, 2014
➢ Niu B, Zhang Z, Li X and Li H, Privacy-Area Aware Dummy Generation Algorithms for Location-Based Services, in Proc. of IEEE ICC 2014
➢ Sun W, Yu S, Lou W, Hou T Y, and Li H, Protecting Your Right: Attribute-based Keyword Search with Fine-grained Owner-enforced Search Authorization in the Cloud, in Proc. of IEEE INFOCOM 2014
➢ Niu B, Li Q, Zhu X, Cao G and Li H, Achieving k-anonymity in Privacy-Aware Location-Based Services, in Proc. of IEEE INFOCOM 2014, Toronto, Canada
➢ Zhang, Yinghui ; Zheng, Dong; Chen, Xiaofeng; Li, Jin; Li, Hui, Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts, Lecture Notes in Computer Science, v 8782, p 259-273, 2014
4) 2013
➢ Niu B, Zhu X, Lei X, Zhang W, and Li H, EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services, in Proc. of IEEE GLOBECOM 2013
➢ Niu B, Zhu X, Liu J, Li Z, and Li H, Weight-aware Private Matching Scheme for Proximity-Based Mobile Social Networks," in Proc. of IEEE GLOBECOM 2013
➢ Zhu X, Chi H, Niu B, Zhang W, Li Z, and Li H, Mobicache: When k-anonymity meets cache, in Proc. of IEEE GLOBECOM 2013
➢ Niu B, Zhu X, Zhang T, Chi H, and Li H, P-match: Priority-aware Friend Discovery for Proximity-Based Mobile Social Networks, in Proc. of IEEE MASS, pp.351-355, 2013
➢ Boyang Wang, Sherman S.M. Chow, Ming Li, Hui Li, Storing Shared Data on the Cloud via Security-Mediator, ICDCS 2013
➢ Boyang Wang, Hui Li, Ming Li, Privacy Preserving Public Auditing for Shared Cloud Data Supporting Group Dynamics, ICC 2013.
➢ Wenhai Sun, Bing Wang, Ning Cao, Ming Li, Wenjing Lou, Thomas Hou and Hui Li, Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, ASIACCS 2013
➢ Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong and Hui Li, Anonymous Attribute-Based Encryption Supporting Efficient Decryption Test, ASIACCS 2013, distinguished paper award
➢ Boyang Wang, Baochun Li, Hui Li, Public Auditing for Shared Data with Efficient User Revocation in the Cloud, INFOCOM 2013, Apr.15-19, Turin, Italia.
➢ Ben Niu, Xiaoyan Zhu, Hui Li, An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems, IEEE WCNC 2013
➢ Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li, plus:$ Privacy-Preserving Pseudo-Location Updating System in Location-Based Services, IEEE WCNC 2013
Journal Paper
1) 2015
➢ Liu, X.; Sun, W.; Quan, H.; Lou, W.; Zhang, Y.; Li, H. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys, IEEE Transactions on Services Computing, online
➢ Zhu, Hui; Huang, Cheng; Lu, Rongxing; Li, Hui, Modelling information dissemination under privacy concerns in social media, Physica A: Statistical Mechanics and its Applications, v 449, p 53-63, May 1, 2016
➢ Zhu, Hui; Gao, Lijuan; Li, Hui, Secure and privacy-preserving body sensor data collection and query scheme, Sensors (Switzerland), v 16, n 2, February 1, 2016
➢ Zhu, Hui; He, Xiaoying; Liu, Ximeng; Li, Hui, PTFA: A secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system, International Journal of em[ant]bedded Systems, v 8, n 1, p 78-86, 2016
➢ Niu, Ben;(Zhu, Xiaoyan; Li, Qinghua ; Chen, Jie; Li, Hui*, A novel attack to spatial cloaking schemes in location-based services, FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE,Vol.49,p125-132,2015
➢ Wang, Yong; Wu, Hao;Tang, Liyang; Li, Hui, The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,9(3):956-970,2015
➢ Lv, Xixiang ; Mu, Yi; Li, Hui, Key management for Smart Grid based on asymmetric key-wrapping, INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS,92(3): 498-512,2015
➢ Lai, Chengzhe; Li, Hui; Li, Xiaoqing; Cao, Jin, A novel group access authentication and key agreement protocol for machine-type communication, TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES 26(3):414-431,2015
➢ Li, Chen; Chen, Le; Lu, Rongxing; Li, Hui, Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding", IEEE TRANSACTIONS ON COMPUTERS, 64(3): 882-883,2015
➢ Zhu, Hui; Xue, Yingfang;Chen, Xiaofeng;Li, Qiang; Li, Hui, V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service, MOBILE INFORMATION SYSTEMS, 1-9,2015
➢ Wang B, Li B, Li H, Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud, IEEE Transactions on Service Computing, 8(1): 92-106,2015
2014
➢ Sun W, Wang B, Cao N, Li M, Lou W, Y Hou Y, Li H,Verifiable Privacy-Preserving Multi-keyword Text Search in the Cloud Supporting Similarity-based Ranking, IEEE Transactions on Parallel and Distributed Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(11): 3025-3035, 2014
➢ Wang, Boyang; Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing, Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud, JOURNAL OF COMMUNICATIONS AND NETWORKS,16(6): 592-599
➢ Zhang, Yinghui; Chen, Xiaofeng; Li, Jin;Li, Hui, Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks, COMPUTER NETWORKS, 75:192-211,series A,2014
➢ Li, Chen ; Lu, Rongxing;Li, Hui; Chen, Le;Li, Xiaoqing, Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding", IEEE COMMUNICATIONS LETTERS, 18(12): 2129-2132,2014
➢ Cao J, Ma M, Li H, Zhang Y,A Survey on Security Aspects for LTE and LTE-A Networks, IEEE Communications Surveys & Tutorials, Vol.16, No.1, pp.283-302, 2014
➢ Xiang, Xinyin ; Li, Hui; Wang, Mingyu; Liu, Zhenhua, Hidden attribute-based signcryption scheme for lattice, Security and Communication Networks, 11(7):1780-1787, 2014
➢ Wang B, Li B, Li H, Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud, IEEE Transactions on Cloud Computing, 2(1): 43-56, 2014
➢ Lv X, Mu Y, Li H, Non-interactive Key Establishment for Bundle Security Protocol of Space DTNs, IEEE Transactions on Information Forensics and Security, 9(1): 5-13, 2014
➢ Chengzhe Lai ; Hui Li; Xiaohui Liang; Rongxing Lu; Kuan Zhang; Xuemin Shen, CPAL: a conditional privacy-preserving authentication with access linkability for roaming service, IEEE Internet of Things Journal, 1(1): 46-57, 2014
➢ Wang, Boyang; Li, Hui; Liu, Xuefeng, SecureMatch: Privacy-preserving group matching in social networks for large groups, Journal of Computational Information Systems, 10(2):665-672, 2014
➢ Han, Qi ; Zhang, Yinghui; Chen, Xiaofeng; Li, Hui; Quan, Jiaxiang, Efficient and robust identity-based handoff authentication for EAP-based wireless networks, Concurrency Computation Practice and Experience, 26(8):1561-1573, 2014
➢ Li, Xiaoqing ; Li, Hui; A survey on data dissemination in VANETs, CHINESE SCIENCE BULLETIN, 59(32): 4190-4200
2013
➢ Lv, Chao; Ma, Maode; Li, Hui; Ma, Jianfeng; Zhang, Yaoyu An novel three-party authenticated key exchange protocol using one-time key,Journal of Network and Computer Applications, v 36, n 1, p 498-503, January 2013
Lai C, Li H, Lu R, Shen XS ,SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks, Computer Networks, Vol.57, No.17, pp.3492-3510, 2013