Kefei Chen, PhD, Professor
School of Mathematics, Hangzhou Normal University
Email: kfchen@hznu.edu.cn
Telephone: 0571-28867257
Address: No.2318 Yuhangtang Rd., Yuhang District, Hangzhou
Postcode: 311121
Research Areas
Cryptography, Information Security
Education
- 1978.03-1982.01, Applied Mathematics, the Northwest Telecommunications Engineering Institute (renamed as Xidian University), in Xi'an, B.S
- 1982.09-1985.04, Applied Mathematics, the Northwest Telecommunications Engineering Institute (one semester at the GUCAS in Beijing), in Xi'an, M.S
- 1990.10-1991.03, German Language, Goethe-Institute Mannheim, Germany, PNdS
- 1991.04-1994.09, Applied Mathematics, Justus-Liebig University, in Giessen, Germany, PhD
Experience
Work Experience
- 1982.01-1986.09, Teaching Assistant, Department of Applied Mathematics, Xidian University
- 1987.10-1990.09, Lecture, Department of Applied Mathematics, Xidian University
- 1996.07-1998.11, Associate Professor, Department of Computer Science and Engineering, Shanghai Jiaotong University
- 1998.12-2013.02, Professor, Department of Computer Science and Engineering, Shanghai Jiaotong University
- 2013.03-present, Professor, School of Science, Hangzhou Normal University
Membership
- Deputy Chairman of Chinese Association for Ccryptologic Research
- Academic Committee of the State Key Laboratory of Information Security at the CAS
- Member of Editorial Board of the Journal of Software
- Member of Editorial Board of Journal of Computer
- Member of Editorial Board of Journal of Cryptologic Research
- Member of Editorial Board of Journal of Frontiers of Computer Science and Technology
Publications
Papers
- Huige Wang, Guangye Sui, Yunlei Zhao,Kefei Chen,Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.IEEE Access 9: 10443-10459 (2021)
Yiming Li, Shengli Liu, Dawu Gu,Kefei Chen,Reusable Fuzzy Extractor Based on the LPN Assumption.Comput. J. 63(12): 1826-1834 (2020)
Lixue Sun, Chunxiang Xu, Yuan Zhang,Kefei Chen,Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.Int. J. Inf. Sec. 19(6): 711-720 (2020)
Huige Wang,Kefei Chen, Yuan Zhang, Yunlei Zhao,Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.Peer Peer Netw. Appl. 13(6): 2334-2341 (2020)
Ziyuan Hu, Shengli Liu,Kefei Chen,Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks.IEEE Trans. Dependable Secur. Comput. 17(5): 972-983 (2020)
Yunxia Han ,Chunxiang Xu,Debiao He,Kefei Chen,On the Security of a Key Agreement and Key Protection Scheme.IEEE Trans. Information Forensics and Security15:3293-3294,2020
- Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li, Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes, IEEE Access, 7: 79299-79310, 2019
- Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long: A new VRSA-based pairing-free certificateless signature scheme for fog computing. Concurr. Comput. Pract. Exp. 31(22), 2019
- Fucai Luo,Fuqun Wang,Kunpeng Wang, Kefei Chen: Fully homomorphic encryption based on the ring learning with rounding problem.IET Information Security 13(6): 639-648, 2019
- Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen, A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, Information Sciences, 480: 70-89, 2019
- Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang, Functional broadcast encryption with applications to data sharing for cloud storage, Information Sciences, 502: 109-124, 2019
- Ziyuan Hu, Shengli Liu, Kefei Chen, Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks, IEEE Transactions on Dependable and Secure Computing (TDSC), 30 April 2018,DOI:10.1109/TDSC.2018.2831199
- Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long, Access control encryption with efficient verifiable sanitized decryption, Information Sciences 465, 72-85, October 2018
- Xiangxue Li, Yu Yu, Guannan Sun, Kefei Chen, Connected Vehicles’ Security from the Perspective of In-Vehicle Network, IEEE Network, 32(3): 58-63, 2018
- Huige Wang, Kefei Chen, Yu Long, Junyao Ye, Liangliang Wang, A new randomized message-locked encryption in the standard model, Peer-to-Peer Networking and Applications, 11(2): 298–308, 2018
- Liangliang Wang, Kefei Chen, Yu Long, Huige Wang, An efficient pairing-free certificateless signature scheme for resource-limited systems, SCIENCE CHINA Information Sciences, 60(11): 119102, 2017
- Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen, A New Construction on Randomized Message-Locked Encryption in the Standard Model via UCEs, SCIENCE CHINA Information Sciences, 60(5): 52101, 2017
- Gang Han, Yu Yu, Xiangxue Li, Kefei Chen,Characterizing the Semantics of Passwords: The Role of Pinyin for Chinese Netizens, Computer Standard and Interface, Vol. 54, Part 1, 20-28, 2017
- Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security, Informatica, Lith. Acad. Sci. 28(2): 215-235, 2017
- Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li, Insight of the protection for data security under selective opening attacks, Information Sciences 412: 223-241, 2017
- Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang, Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model, IEEE Trans. Information Forensics and Security 12(6): 1382-1392, 2017
- Liangliang Wang, Kefei Chen(*), Yu Long, Huige Wang, An efficient pairing-free certificateless signature scheme for resource-limited systems, SCIENCE CHINA Information Sciences, DOI:10.1007/s11432-015-0367-6, September 23, 2016
- Huige Wang, Kefei Chen(*), Baodong Qin, Xuejia Lai, Yunhua Wen, A New Construction on Randomized Message-Locked Encryption in the Standard Model via UCEs, SCIENCE CHINA Information Sciences, DOI:10.1007/s11432-015-1037-2, November14, 2016
- Huige Wang, Kefei Chen(*), Yu Long, Junyao Ye, Liangliang Wang, A new randomized message-locked encryption in the standard model, Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-016-0488-6, September 3, 2016
- Xianping Mao, Junzuo Lai(*), Qixiang Mei, Kefei Chen(*), Jian Weng, Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption, IEEE Transactions on Dependable and Secure Computing, 13(5): 533-546, 2016
- Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen, Optimal assignment schemes for general access structures based on linear programming, Design, codes and cryptography, 74(3): 623-644, 2015
- Zhenan Huang, Shengli Liu, Kefei Chen,n-Evasive All-But-Many Lossy Trapdoor Function and its Constructions, Security and Communication Networks, 8(4), pp 550-564, 2015
- Baodong Qin, Shengli Liu, Kefei Chen, Efficient Chosen-Ciphertext Secure Public-Key Encryption Scheme with High Leakage-Resilience, IET Information Security, 9(1), pp 32-42, 2015
- Jianhong Chen, Yu Long, Kefei Chen, Jie Guo, Attribute-based key-insulated signature and its applications, Information Sciences, 275(1), pp 57-67, 2014
- Shengli Liu, Fangguo Zhang, Kefei Chen, Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie–Hellman assumption, Concurrency and Computation: Practice and Experience, 26(8), pp 1506-1519, 2014
- Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan. Identity-Based Key-Insulated Signcryption. INFORMATICA, Vol.23, No.1, 2012
- Yongtao Wang, Kefei Chen, Yu Long, Zhaohui Liu, Accountable authority key policy attribute-based encryption, SCIENCE CHINA (Information Sciences), July 2012 Vol. 55 No. 7: 1631–1638
- Junzuo Lai, Weidong Kou, Kefei Chen. Self-generated-certificate public key encryption without pairing and its application, Information Sciences, Vol. 181, issue. 11, pp.2422-2435, 2011
- Shengli Liu, Yu Long, Kefei Chen. Key Updating Technique in Identity-based Encryption, Information Sciences, Vol. 181, issue. 11, pp. 2436-2440, 2011
Books
- Wenzheng Zhang, Kefei Chen, Wei Zhao. Basic Theory and Technique of Cryptography. National Defense Industry Press, Beijing, 2015
- Ling Dong, Kefei Chen. Cryptographic Protocol: Security analysis based on trusted freshness. Higher Education Press & Springer-Verlag, 2012
- Kefei Chen, Zheng Huang. Introduction to Information Security Techniques. Publishing House Electronics Industry, Beijing, 2007
- J. Baek, F. Bao,,K. Chen, X. Lai (Eds.). Provable Security. Lecture Notes in Computer Science Vol. 5324, Springer-Verlag, Heidelberg, 2008
- David Pointcheval, Yi Mu, Kefei Chen (Eds.). Cryptology and Network Security. Lecture Notes in Computer Science 4301, Springer-Verlag, Heidelberg, 2006
- Xuejia Lai, Kefei Chen (Eds.). Advances in Cryptology –Asiacrypt 2006. Lecture Notes in Computer Science 4284, Springer-Verlag, Heidelberg, 2006
- Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou (Eds.). Information Security Practice and Experience. Lecture Notes in Computer Science 3903, Springer-Verlag, Heidelberg, 2006
- Kefei Chen (Ed). Progress on Cryptography: 25 years of cryptography in China. Kluwer Acdemic Publishers, Boston, 2004