General

Kefei Chen, PhD, Professor

School of Mathematics, Hangzhou Normal University
Email: kfchen@hznu.edu.cn
Telephone: 0571-28867257
Address: No.2318 Yuhangtang Rd., Yuhang District, Hangzhou
Postcode: 311121

Research Areas

Cryptography, Information Security

Education

  • 1978.03-1982.01, Applied Mathematics, the Northwest Telecommunications Engineering Institute (renamed as Xidian University), in Xi'an, B.S
  • 1982.09-1985.04, Applied Mathematics, the Northwest Telecommunications Engineering Institute (one semester at the GUCAS in Beijing), in Xi'an, M.S
  • 1990.10-1991.03, German Language, Goethe-Institute Mannheim, Germany, PNdS
  • 1991.04-1994.09, Applied Mathematics, Justus-Liebig University, in Giessen, Germany, PhD

Experience


Work Experience

  • 1982.01-1986.09, Teaching Assistant, Department of Applied Mathematics, Xidian University
  • 1987.10-1990.09, Lecture, Department of Applied Mathematics, Xidian University
  • 1996.07-1998.11, Associate Professor, Department of Computer Science and Engineering, Shanghai Jiaotong University
  • 1998.12-2013.02, Professor, Department of Computer Science and Engineering, Shanghai Jiaotong University
  • 2013.03-present, Professor, School of Science, Hangzhou Normal University

Membership

  • Deputy Chairman of Chinese Association for Ccryptologic Research
  • Academic Committee of the State Key Laboratory of Information Security at the CAS
  • Member of Editorial Board of the Journal of Software
  • Member of Editorial Board of Journal of Computer
  • Member of Editorial Board of Journal of Cryptologic Research
  • Member of Editorial Board of Journal of Frontiers of Computer Science and Technology

Publications


Papers

  1. Huige Wang, Guangye Sui, Yunlei Zhao,Kefei Chen,Efficient SSE With Forward ID-Privacy and Authentication in the Multi-Data-Owner Settings.IEEE Access 9: 10443-10459 (2021)
  2. Yiming Li, Shengli Liu, Dawu Gu,Kefei Chen,Reusable Fuzzy Extractor Based on the LPN Assumption.Comput. J. 63(12): 1826-1834 (2020)

  3. Lixue Sun, Chunxiang Xu, Yuan Zhang,Kefei Chen,Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.Int. J. Inf. Sec. 19(6): 711-720 (2020)

  4. Huige Wang,Kefei Chen, Yuan Zhang, Yunlei Zhao,Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.Peer Peer Netw. Appl. 13(6): 2334-2341 (2020)

  5. Ziyuan Hu, Shengli Liu,Kefei Chen,Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks.IEEE Trans. Dependable Secur. Comput. 17(5): 972-983 (2020)

  6. ,,,On the Security of a Key Agreement and Key Protection Scheme.IEEE Trans. Information Forensics and Security15:3293-3294,

  7. Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li, Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes, IEEE Access, 7: 79299-79310, 2019
  8. Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long: A new VRSA-based pairing-free certificateless signature scheme for fog computing. Concurr. Comput. Pract. Exp. 31(22), 2019
  9. Fucai Luo,Fuqun Wang,Kunpeng Wang, Kefei Chen: Fully homomorphic encryption based on the ring learning with rounding problem.IET Information Security 13(6): 639-648, 2019
  10. Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen, A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, Information Sciences, 480: 70-89, 2019
  11. Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang, Functional broadcast encryption with applications to data sharing for cloud storage, Information Sciences, 502: 109-124, 2019
  12. Ziyuan Hu, Shengli Liu, Kefei Chen, Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks, IEEE Transactions on Dependable and Secure Computing (TDSC), 30 April 2018,DOI:10.1109/TDSC.2018.2831199
  13. Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu, Yu Long, Access control encryption with efficient verifiable sanitized decryption, Information Sciences 465, 72-85, October 2018
  14. Xiangxue Li, Yu Yu, Guannan Sun, Kefei Chen, Connected Vehicles’ Security from the Perspective of In-Vehicle Network, IEEE Network, 32(3): 58-63, 2018
  15. Huige Wang, Kefei Chen, Yu Long, Junyao Ye, Liangliang Wang, A new randomized message-locked encryption in the standard model, Peer-to-Peer Networking and Applications, 11(2): 298–308, 2018
  16. Liangliang Wang, Kefei Chen, Yu Long, Huige Wang, An efficient pairing-free certificateless signature scheme for resource-limited systems, SCIENCE CHINA Information Sciences, 60(11): 119102, 2017
  17. Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen, A New Construction on Randomized Message-Locked Encryption in the Standard Model via UCEs, SCIENCE CHINA Information Sciences, 60(5): 52101, 2017
  18. Gang Han, Yu Yu, Xiangxue Li, Kefei Chen,Characterizing the Semantics of Passwords: The Role of Pinyin for Chinese Netizens, Computer Standard and Interface, Vol. 54, Part 1, 20-28, 2017
  19. Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security, Informatica, Lith. Acad. Sci. 28(2): 215-235, 2017
  20. Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen, Jin Li, Insight of the protection for data security under selective opening attacks, Information Sciences 412: 223-241, 2017
  21. Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang, Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model, IEEE Trans. Information Forensics and Security 12(6): 1382-1392, 2017
  22. Liangliang Wang, Kefei Chen(*), Yu Long, Huige Wang, An efficient pairing-free certificateless signature scheme for resource-limited systems, SCIENCE CHINA Information Sciences, DOI:10.1007/s11432-015-0367-6, September 23, 2016
  23. Huige Wang, Kefei Chen(*), Baodong Qin, Xuejia Lai, Yunhua Wen, A New Construction on Randomized Message-Locked Encryption in the Standard Model via UCEs, SCIENCE CHINA Information Sciences, DOI:10.1007/s11432-015-1037-2, November14, 2016
  24. Huige Wang, Kefei Chen(*), Yu Long, Junyao Ye, Liangliang Wang, A new randomized message-locked encryption in the standard model, Peer-to-Peer Networking and Applications, DOI: 10.1007/s12083-016-0488-6, September 3, 2016
  25. Xianping Mao, Junzuo Lai(*), Qixiang Mei, Kefei Chen(*), Jian Weng, Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption, IEEE Transactions on Dependable and Secure Computing, 13(5): 533-546, 2016
  26. Qiang Li, Xiangxue Li, Xuejia Lai, Kefei Chen, Optimal assignment schemes for general access structures based on linear programming, Design, codes and cryptography, 74(3): 623-644, 2015
  27. Zhenan Huang, Shengli Liu, Kefei Chen,n-Evasive All-But-Many Lossy Trapdoor Function and its Constructions, Security and Communication Networks, 8(4), pp 550-564, 2015
  28. Baodong Qin, Shengli Liu, Kefei Chen, Efficient Chosen-Ciphertext Secure Public-Key Encryption Scheme with High Leakage-Resilience, IET Information Security, 9(1), pp 32-42, 2015
  29. Jianhong Chen, Yu Long, Kefei Chen, Jie Guo, Attribute-based key-insulated signature and its applications, Information Sciences, 275(1), pp 57-67, 2014
  30. Shengli Liu, Fangguo Zhang, Kefei Chen, Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie–Hellman assumption, Concurrency and Computation: Practice and Experience, 26(8), pp 1506-1519, 2014
  31. Jianhong Chen, Kefei Chen, Yongtao Wang, Xiangxue Li, Yu Long, Zhongmei Wan. Identity-Based Key-Insulated Signcryption. INFORMATICA, Vol.23, No.1, 2012
  32. Yongtao Wang, Kefei Chen, Yu Long, Zhaohui Liu, Accountable authority key policy attribute-based encryption, SCIENCE CHINA (Information Sciences), July 2012 Vol. 55 No. 7: 1631–1638
  33. Junzuo Lai, Weidong Kou, Kefei Chen. Self-generated-certificate public key encryption without pairing and its application, Information Sciences, Vol. 181, issue. 11, pp.2422-2435, 2011
  34. Shengli Liu, Yu Long, Kefei Chen. Key Updating Technique in Identity-based Encryption, Information Sciences, Vol. 181, issue. 11, pp. 2436-2440, 2011


Books

  1. Wenzheng Zhang, Kefei Chen, Wei Zhao. Basic Theory and Technique of Cryptography. National Defense Industry Press, Beijing, 2015
  2. Ling Dong, Kefei Chen. Cryptographic Protocol: Security analysis based on trusted freshness. Higher Education Press & Springer-Verlag, 2012
  3. Kefei Chen, Zheng Huang. Introduction to Information Security Techniques. Publishing House Electronics Industry, Beijing, 2007
  4. J. Baek, F. Bao,,K. Chen, X. Lai (Eds.). Provable Security. Lecture Notes in Computer Science Vol. 5324, Springer-Verlag, Heidelberg, 2008
  5. David Pointcheval, Yi Mu, Kefei Chen (Eds.). Cryptology and Network Security. Lecture Notes in Computer Science 4301, Springer-Verlag, Heidelberg, 2006
  6. Xuejia Lai, Kefei Chen (Eds.). Advances in Cryptology –Asiacrypt 2006. Lecture Notes in Computer Science 4284, Springer-Verlag, Heidelberg, 2006
  7. Kefei Chen, Robert Deng, Xuejia Lai, Jianying Zhou (Eds.). Information Security Practice and Experience. Lecture Notes in Computer Science 3903, Springer-Verlag, Heidelberg, 2006
  8. Kefei Chen (Ed). Progress on Cryptography: 25 years of cryptography in China. Kluwer Acdemic Publishers, Boston, 2004