李继国
李继国    的照片 姓  名: 李继国 性  别: 出生年月: 1970年12月
职  称: 教授 毕业学校:    哈尔滨工业大学
专 业:   计算机软件与理论 学 位:   博士
联系电话:   17302555826 电子邮件: ljg1688@163.com,lijiguo@hhu.edu.cn
研究方向:

密码学理论与技术、网络信息安全、云计算安全以及无线传感器网络安全等

获奖情况:

 2004年度江苏省高校“青蓝工程”优秀青年骨干教师培养人选

 2008年入选河海大学首批优秀创新人才计划

 2009年入选江苏省“六大人才高峰”第六批高层次人才项目资助计划

 2010年江苏省优秀硕士学位论文指导教师 

主要成果:

 

     

目前主持国家自然科学基金项目云计算环境下属性基密码及其应用研究”(61672207),国家自然科学基金项目可证明安全的基于证书密码体制及其拓展研究”(61272542),江苏省自然科学基金项目抗泄漏的公钥密码算法研究”(BK20161511),中央高校基本科研业务费重点培育专项云计算环境下公钥密码关键技术研究” (2016B10114),中美计算机科学研究中心开放课题公钥密码及其在云计算中的应用研究”(KJR16039)主持完成江苏省六大人才高峰第六批高层次人才项目新型公钥密码体制研究”(2009182)博士后基金可证明安全的基于证书签名体制研究20100471373),河海大学中央高校基本科研项目可证明安全的基于证书签名体制研究2009B21114),与南京师范大学共同主持完成国家自然科学基金项目高效无证书密码体制及其应用”(60673070),作为骨干成员参加完成国家863项目分布式可信计算系统研究” (2007AA01Z409)。主持完成了江苏省公安厅项目新型数字签名理论、应用及其关键技术研究”(200503002),河海大学科技创新基金项目代理签名及其应用研究。作为骨干成员参加完成了国家自然科学基金项目二次域密码、门限密钥托管及其应用”(60072018,该项目2003年结题,结题评价为优秀)。国家自然科学基金项目密码系统与密码分析”(69772037),黑龙江省自然科学基金项目二次背包密码体制与二次密钥方案。出版了信息安全系列教材2部(《信息安全数学基础》和《密码学教程》。从事密码与信息安全研究至今已经在Journal of Computer SecurityIEEE Transactions on Information Forensics and SecurityIEEE Transactions on Services ComputingInformation SciencesJournal of Systems and SoftwareThe Computer JournalTheoretical Computer ScienceFuture Generation Computer SystemsIET Information SecurityComputers & Mathematics with ApplicationsJCSTJournal of Communications and NetworksInternational Journal of Network SecuritySecurity and Communication NetworksComputing and InformaticsConcurrency and Computation Practice and ExperienceInternational Journal of Computer MathematicsInternational Journal of Information SecurityKSII Transactions on Internet and Information SystemsJournal of Information Science and Engineering、计算机学报,软件学报、电子学报、计算机研究与发展、电子与信息学报和通信学报等国内外核心学术期刊和EuroPKI’07, Infosecu’04等重要国际会议发表学术论文100余篇,其中SCIEI收录论文80余篇,一级学报26篇。JCR一区4篇,JCR二区12篇,JCR三、四区多篇,中国计算机学会推荐国际学术刊物A类期刊1, B类期刊15篇。据不完全统计,论文他引1500余次。目前,申请密码与信息安全相关的发明专利30项,已授权13项。获得2004年度江苏省高校青蓝工程优秀青年骨干教师培养人选,2008年入选河海大学首批优秀创新人才计划,2009年入选江苏省六大人才高峰第六批高层次人才项目资助计划。2005届河海大学本科毕业设计(论文)优秀指导教师称号。获得2010年江苏省优秀硕士学位论文指导教师。

目前为国家自然科学基金项目、霍英东教育基金、教育部博士点基金项目和中国博士后基金项目评审专家,IEEE会员,中国密码学会会员,中国计算机学会会员,江苏省计算机学会计算机安全专业委员会常务委员,江苏省大数据专家委员会委员,江苏省计算机学会会员,南京市三网融合工作专家委员会专家,被邀请担任IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Parallel and Distributed Systems, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Services Computing, IEEE Systems Journal, IEEE Transactions on Cloud Computing, IEEE Communications Letters, IET Information Security, Information Sciences, Journal of Systems and Software, The Computer Journal, Designs, Codes and Cryptography, Future Generation Computer System, Computers & Electrical Engineering, Computing and Informatics, Computers & Mathematics with Applications, Journal of Applied Mathematics, Security and Communication Networks, International Journal of Information Security, International Journal of Security and Networks, International Journal of Network Security, Journal of Information and Computer Security, Mathematical Problems in Engineering, Journal of Computer Science and Technology, International Journal of Communications, Network and System Sciences, International Journal of Computers and applications, Frontiers in China, The Scientific World Journal, Frontiers of Computer Science, Sensor Letter, Journal of Internet Technology, KSII Transactions on Internet and Information Systems, IETE Technical Review, Pervasive and Mobile Computing, Fundamenta Informaticae, Engineering Science and Technology, an International Journal, Journal of Information Science and Engineering,  SCIENCE CHINA Information Sciences,计算机学报、软件学报、电子学报、通信学报、中国通信、电子与信息学报等60余学术期刊和 CIS 2004-2015InfoSecu 2004CANS 07-08等国际会议的特邀审稿人及CIS2010-2015, MINES 2010, SECRYPT 2012-2015, ICICS2013, NFSP2013, GC13 WS – BigSecurity 2013-2015, CSS 2014, ISPEC 2014-2015, Inscrypt 2014, ICIT 2014, 2014 IEEE INFOCOM Workshop on Security and Privacy in Big Data, NSS 2015, CS-2015, ICCCS2015, SSCC-2015, ProvSec 2016, BigSecurity'16, ISPEC 2016, Globecom'16SAI'16, DPM 2016等国际会议的PC MemberOrganizing Chair of ProvSec 2016

电话:17302555826

Address:南京市江宁区佛城西路8号河海大学计算机与信息学院,211100
Office
:勤学楼4103
Email
ljg1688@163.com,lijiguo@hhu.edu.cn
欢迎报考本人硕士和博士研究生,请邮件联系。

发表和录用的部分论文如下:

    [1]   Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, and Jian Shen. Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Security and Communication Networks, 2016, accepted. (SCI&EI)

    [2]   Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen. Hierarchical Attribute-Based Encryption with Continuous Auxiliary Inputs Leakage. Security and Communication Networks, 2016, accepted. (SCI&EI)

    [3]   Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage, IEEE Transactions on Information Forensics and Security, 2016, 10.1109/TIFS.2016.2601070. SCI, Impact Factor: 2.441 (2015),中国计算机学会推荐国际学术刊物与会议(信息安全)A类期刊

    [4]   Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang and Futai Zhang. Continuous Leakage-Resilient Certificate-Based Encryption. Information Sciences, 355–356 (2016) 1–14 DOI:10.1016/j.ins.2016.03.032. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)

    [5]   Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian and Jinguang Han. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2016.2520932. (SCI&EI) (中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR 一区)

    [6]   Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu. A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. The Computer Journal, 2016, 59(7): 1066-1075. DOI 10.1093/comjnl/bxv128. (SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊, JCR 三区)

    [7]   Yang Lu, Jiguo Li. A Provably Secure Certificate-Based Encryption Scheme against Malicious CA Attacks in the Standard Model. Information Sciences, 2016, accepted. (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)

    [8]   Yang Lu, Jiguo Li. Provably Secure Certificateless Proxy Signature Scheme in the Standard Model. Theoretical Computer Science, 2016, 639: 42-59. http://dx.doi.org/10.1016/j.tcs.2016.05.019 (SCI, IDS Number: 125NI, Impact Factor: 0.657 (2014), 5-Year Impact Factor: 0.747, 中国计算机学会推荐国际学术刊物与会议(计算机科学理论)B类期刊, EI, JCR 一区)

    [9]   Jinguang Han, Ye Yang, Xinyi Huang, Tsz Hon  Yuen, Jiguo Li, Jie Cao. Accountable Mobile E-Commerce Scheme via Identity-based Plaintext-Checkable Encryption. Information Sciences, 2016, 345:143-155 doi:10.1016/j.ins.2016.01.045.  (SCI, IDS Number: 125NI, Impact Factor: 4.038 (2014), 5-Year Impact Factor: 4.221, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)

[10]   Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Constructions of Certificate-Based Signature Secure against Key Replacement Attacks. Journal of Computer Security, 2010,18(3): 421-449EI, 中国计算机学会推荐国际学术刊物与会议(信息安全)B类期刊

[11]   Jiguo Li, Haiting Du, Yichen Zhang. Certificate-based Key-Insulated Signature in the Standard Model. The Computer Journal, 2016, 59(7):1028-1039 DOI 10.1093/comjnl/bxv115 (SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊)

[12]   Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang. Certificate-Based Encryption Resilient to Key Leakage, Journal of Systems and Software, 2016, 116, 101–112. DOI: 10.1016/j.jss.2015.05.066 (SCI, 中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊, JCR 二区)

[13]   Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang and Jianying Zhou. A Forward-Secure Certificate-Based Signature Scheme. The Computer Journal, 2015, 58(4): 853-866. 10.1093/comjnl/bxt141 (SCI,中国计算机学会推荐国际学术刊物与会议(综合类刊物)B类期刊)

[14]   Jiguo Li, Xiaonan Lin, Yichen Zhang and Jinguang Han. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Transactions on Services Computing, 10.1109/TSC.2016.2542813. (SCI&EI) (中国计算机学会推荐国际学术刊物(软件工程、系统软件与程序设计语言)B类期刊, JCR 一区)

[15]   Jiguo Li, Zhiwei Wang, Yichen Zhang. Provably Secure Certificate-Based Signature Scheme without Pairings. Information Sciences, 2013, 233(6): 313-320. DOI information: 10.1016/j.ins.2013.01.013 (SCI, IDS Number: 125NI, Impact Factor: 3.643(2012), 5-Year Impact Factor: 3.676, 中国计算机学会推荐国际学术刊物与会议(数据库 数据挖掘 内容检索)B类期刊, EI, JCR 一区)

[16]   Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu. An Efficient Short Certificate-based Signature Scheme. Journal of Systems and Software, 2012, 85(2): 314-322. DOI: http://dx.doi.org/10.1016/j.jss.2011.08.014 (SCI: 893WH, 5-Year Impact Factor: 1.117, 中国计算机学会推荐国际学术刊物(软件工程方向)中的B类期刊, JCR 二区)

[17]   Lu Yang and Li Jiguo. A Pairing-Free Certificate-Based Proxy Re-encryption Scheme for Secure Data Sharing in Public Clouds. Future Generation Computer Systems, 2016, 62: 140-147. DOI: 10.1016/j.future.2015.11.012. (SCI&EI, 中国密码学会推荐学术刊物和国际会议目录(2016B类期刊)

[18]   Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang. Provably Secure Identity-Based Encryption Resilient to Post-Challenge Continuous Auxiliary Inputs Leakage. Security and Communication Networks, 9(10): 1016-1024 (2016) 10.1002-sec.1396. (SCI&EI, 中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊)

[19]   Li Jiguo, Wang Haiping, Yichen Zhang, Shen Jian. Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Transactions on Internet and Information Systems, vol. 10, no. 7, pp. 3339-3352, 2016. DOI: 10.3837/tiis.2016.07.026. (SCI&EI)

[20]   Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao. Provably Secure Certificate-based Conditional Proxy Re-encryption. Journal of Information Science and Engineering (J. Inf. Sci. Eng.) 32(4): 813-830 (2016). (SCI&EI)

[21]   Lu Yang, Zhang Quanling and Li Jiguo. Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols. In Proc. of 14th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, 2015. (EI)

[22]   Lu Yang, Zhang Quanling and Li Jiguo. An improved certificateless strong key-insulated signature scheme in the standard model. Advances in Mathematics of Communications, 9(3), 353-373, 2015. (SCI&EI)

[23]   Lu Yang and Li Jiguo. An Improved Certificate-based Signature Scheme without Random Oracles. IET Information Security, 2016, 10(2): 80-86. DOI: 10.1049/iet-ifs.2015.0188. (SCI&EI,中国密码学会推荐学术刊物和国际会议目录(2016B类期刊)

[24]   Xunjun Chen, Yuelong Zhu, Jiguo Li, Yamin Wen, Zheng Gong. Efficiency and Privacy Enhancement for a Track and Trace System of RFID-based Supply Chains. Information, 2015, 6(2): 258-274  (EI)

[25]   Yichen Zhang, Jiguo Li, Zhiwei Wang, Wei Yao. A New Efficient Certificate-Based Signature Scheme, Chinese Journal of Electronics, 2015, 24 (4): 776-782. (SCI)

[26]   Huaqun Wang, Jiguo Li. Certificate-Based Remote Data Integrity Checking in Public Clouds. COCOON2015, LNCS 9198, 375-386, 2015.

[27]   Jiguo Li, Yuerong Shi, Yichen Zhang. Searchable Ciphertext-Policy Attribute-Based Encryption with Revocation in Cloud Storage, International Journal of Communication Systems, accepted. (SCI). DOI: 10.1002/dac.2942

[28]   Qihong Yu, Jiguo Li, Yichen Zhang. Leakage-Resilient Certificate-Based Encryption, Security and Communication Networks, 2015, 8: 3346-3355, DOI:10.1002/sec.1258, 2015 (SCI). (中国计算机学会推荐国际学术刊物(网络与信息安全)C类期刊)

[29]   Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han. Privacy Preserving Personal Health Record Using Multi-Authority Attribute-Based Encryption with Revocation. International Journal of Information Security, 2015, 14(6): 487-497. (SCI,EI 20144900283750, Impact Factor: 1.279 (2015-2016), JCR 二区,中国密码学会推荐学术刊物和国际会议目录(2016B类期刊,中国计算机学会推荐国际学术刊物与会议(信息安全)C类期刊). DOI: 10.1007/s10207-014-0270-9

[30]   李继国, 张亦辰, 卫晓霞. 可证安全的基于证书广播加密方案. 电子学报,2016, 44(5): 1101-1110 (EI)

[31]   李继国,石岳蓉,张亦辰. 隐私保护且支持用户撤销的属性基加密方案. 计算机研究与发展, 2015, 52(10): 2281-2292 (EI)

[32]   李艳琼,李继国,张亦辰. 标准模型下安全的无证书签名方案. 通信学报, 2015, 36(4): 2015098-1-2015098-10.

[33]   Jiguo Li, Jingjing Zhao, Yichen Zhang. Certificateless Online/Offline Signcryption Scheme, Security and Communication Networks, 2015, 8:1979–1990. DOI: 10.1002/sec.1146 (SCI).

[34]   Lu Yang and Li Jiguo. Efficient Constructions of Certificate-Based Key Encapsulation Mechanism. International Journal of Internet Protocol Technology, 2014, 8(2/3): 96-106 (EI).

[35]   Lu Yang and Li Jiguo. Provably Secure Certificate-Based Signcryption Scheme without Pairings. KSII Transactions on Internet and Information Systems, 2014, 8(7): 2554-2571. (SCI&EI)

[36]   Yang Lu, Jiguo Li. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks. The Scientific World Journal, 2014, http://dx.doi.org/10.1155/2014/295419. (IDS Number: AH7JO, 2013 Impact Factor 1.219, SCI)

[37]   Jiguo Li, Na Qian, Yichen Zhang and Xinyi Huang. An Efficient Certificate-Based Designated Verifier Signature Scheme, Computing and Informatics, accepted. (SCI)

[38]   Yang Lu, Jiguo Li. Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model. Journal of Information Science and Engineering, 2014, 30(5): 1553-1568 (SCI&EI)

[39]   Jiguo Li, Xuexia Zhao, and Yichen Zhang. Certificate-Based Conditional Proxy Re-Encryption. M.H. Au et al. (Eds.): NSS 2014, LNCS 8792, pp. 299–310, 2014 (SCI, IDS Number:BB6XN).

[40]   禹勇, 李继国, 伍玮, 黄欣沂. 基于身份签名方案的安全性分析. 计算机学报, 2014, 37(5): 1025-1029

[41]   Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, and Yuexin Zhang. Provably Secure Certificate-based Key-Insulated Signature Scheme. Concurrency and Computation Practice and Experience, 2014, 26:1546–1560. DOI: 10.1002/cpe.3019 (IDS Number: AF4CM, 2013 Impact Factor 0.784, SCI, JCR 二区)

[42]   Tao Li, Jiguo Li, Jing Zhang. A Cryptanalysis Method based on Niche Genetic Algorithm. Applied Mathematics & Information Sciences, 2014, 8(1): 279-285 (IDS Number: AA9AQ, 2013 Impact Factor 1.232, SCI, JCR 一区)

[43]   陆阳, 李继国. 标准模型下高效安全的基于证书密钥封装机制. 计算机研究与发展,  2014, 51(7): 1497-1505. (EI)

[44]   陆阳, 李继国. 标准模型下前向安全公钥加密方案的新构造. 通信学报. 2014, 35(2): 33-39.

[45]   Wan Zhongmei, Li Jiguo, Hong Xuan. Parallel key-insulated signature scheme without random oracles. Journal of Communications and Networks, 2013, 15(3): pp.252-257. (SCI, IDS Number: 187UL, 2012 Impact Factor 0.309, EI )

[46]   Huiling Qian, Jiguo Li and Yichen Zhang. Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013, S. Qing et al. (Eds.): ICICS 2013, LNCS 8233, pp. 363–372, 2013. (中国计算机学会推荐国际学术刊物与会议(信息安全)C类会议)

[47]   Jiguo Li, Yanqiong Li and Yichen Zhang. Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Transactions on Internet and Information Systems, 2013, 7(8): 1972-1988. (SCI, 2012 Impact Factor 0.560, IDS Number: 245IL, EI, 20133716726219)

[48]   Ji Yao, Jiguo Li and Yichen Zhang. Certificate-Based Encryption Scheme without Pairing. KSII Transactions on Internet and Information Systems, 2013, 7(6): 1480-1491. (SCI, IDS Number: 173ZF, 2012 Impact Factor 0.560, EI)

[49]   Jiguo Li, Yanqiong Li and Yichen Zhang. Forward Secure Certificateless Proxy Signature Scheme. J. Lopez, X. Huang, and R. Sandhu (Eds.): NSS 2013, LNCS 7873, pp. 350-364, 2013. (EI, 20133716723893)

[50]   Lu Yang and Li Jiguo. New forward-secure public-key encryption without random oracles. International Journal of Computer Mathematics. 2013, 90(12): 2603-2613 DOI: 10.1080/00207160.2013.807915 (SCIImpact Factor: 0.542 (2012), 5-Year Impact Factor: 0.561,EI)

[51]   Lu Yang and Li Jiguo. Constructing Pairing-Free Certificate-Based Encryption. International Journal of Innovative Computing, Information and Control, 2013, 9(11): 4509-4518. (EI)

[52]   Yang Lu, Jiguo Li. Generic Construction of Forward-Secure Identity-Based Encryption. JCP 7(12): 3068-3074 (2012)

[53]   Lu Yang and Li Jiguo. Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption. In 2012 Fourth International Symposium on Information Science and Engineering, Shanghai, China, pp. 199-202, 2012. (EI)

[54]   Jiguo Li, Yichen Zhang and Huiyun Teng. A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. Y. Xiang et al. (Eds.): CSS 2012, LNCS 7672, pp. 362-376. Springer, Heidelberg (2012).

[55]   Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, and Yuexin Zhang. Certificate-based Key-Insulated Signature. Y. Xiang et al. (Eds.): ICDKE 2012, LNCS 7696, pp. 206-220, 2012.

[56]   Zhang Yichen, Li Jiguo, Sun Chuanming. An Efficient Property-based Remote Attestation Scheme. China Communication, 2012,(10): 1-9 (SCI)

[57]   Jiguo Li, Xinyi Huang, Meixue Hong,Yichen Zhang. Certificate-based Signcryption with Enhanced Security Features. Computers and Mathematics with Applications. 2012, 64(6) : 1587-1601, http://dx.doi.org/10.1016/j.camwa.2012.01.006 (SCI, 012PD, 5-Year Impact Factor: 1.643)

[58]   李继国, 杨海珊, 张亦辰. 标准模型下安全的基于证书密钥封装方案. 电子学报, 2012, 40 (8): 1577-1583(EI, 20124215582349).

[59]   李继国, 钱娜, 黄欣沂, 张亦辰. 基于证书强指定验证者签名方案. 计算机学报, 2012, 35 (8): 1579-1587 (EI, 20124415622447).

[60]   李继国, 杨海珊, 张亦辰. 带标签的基于证书密钥封装方案. 软件学报, 2012, 23(8): 2163-2172(EI, 20123815454316).

[61]   Lu Yang and Li Jiguo. Constructing Certificate-Based Encryption Secure against Key Replacement Attacks. ICIC Express Letters, Part B: Applications, 2012, 3(1): 195-200. (EI)

[62]   李继国, , 张亦辰. 标准模型下可证安全的本地验证者撤销群签名方案. 电子学报, 2011, 39 (7): 1618-1623

[63]   李继国, , 张亦辰. 实用的本地验证者撤销群签名方案. 通信学报, 2011,32 (10): 67-77.

[64]   Zhongmei Wan Xuejia Lai, Jian Weng and Jiguo Li. Certificateless Strong Key-Insulated Signature. ICIST 2011, pp.270-276

[65]   Wan Zhong-Mei, Weng Jian, Lai Xue-Jia, Liu Sheng-Li, Li Ji-Guo. On the relation between identity-based proxy re-encryption and mediated identity-based encryption. Journal of Information Science and Engineering, 2011,27(1):243-259 (SCI)

[66]   Lu Yang and Li Jiguo. A Practical Forward-Secure Public Key Encryption Scheme. Journal of Networks, 2011, 6 (9): 1254-1261

[67]   ZHOU Yajian, PAN Anwei, LI Jiguo. An Authenticated Dynamic Key Management Scheme for Clustered Sensor Networks, China Communications, 2010,(10):7-17 (SCIE)

[68]   Zhongmei Wan, Jian Weng, Jiguo Li. Security Mediated Certificateless Signatures Without Pairing. Journal of Computers. 2010, 5(12): 1862-1869

[69]   周亚建, 徐晨, 李继国. 基于改进CURE聚类算法的无监督异常检测方法. 通信学报.2010,31(7):18-23. (EI)

[70]   Wang Aiqin, Li Jiguo, Wang Zhijian. A Provably Secure Proxy Signature Scheme from Bilinear Pairings. Journal of Electronics. 2010,27(3):298-304.

[71]   Lu Yang and Li Jiguo. Forward-Secure Certificate-Based Encryption and its Generic Construction. Journal of Networks, 2010, 5(5): 527-534. (EI)

[72]   Lu Yang, Li Jiguo, Constructing efficient certificate-based encryption scheme with pairing in the standard model, Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, pp 234-237 (EI)

[73]   Lu Yang and Li Jiguo. An Efficient Forward-Secure Public-Key Encryption Scheme without Random Oracles. In the 3rd International Symposium on Electronic Commerce and Security Workshops, pp. 22-25, 2010. (EI)

[74]   Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption. The Fifth International Conference on Information Assurance and Security, Xian, China, pp.57-60, 2009.

[75]   Lu Yang, Li Jiguo and Xiao Junmo. Forward-secure Certificate-based Encryption: Definition and Generic Construction. In the 2009 International Conference on e-Business and Information System Security, Wuhan, China, pp.30-34, 2009. (SCI, IDS Number: BLZ43,  EI )

[76]   Weijia Jiang, Jiguo Li. Authenticated Tree Based Group Key Agreement. CIS2009, 251-255.

[77]   李继国, 姜平进. 标准模型下可证安全的基于身份的高效签名方案. 计算机学报, 2009,11(11)2130-2136

[78]   Jiguo Li, Lizhong Xu and Yichen Zhang. Provably Secure Certificate-based Proxy Signature Schemes. Journal of Computers. 2009, 4(6): 444-452 (EI)

[79]   Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption. Journal of software. 2009, 4(3): 210-217 (EI)

[80]   Lu Yang and Li Jiguo. Generic Construction of Certificate-based Encryption in the Standard Model. In the Second International Symposium on Electronic Commerce and Security, Nanchang, China, pp.25-29, 2009.

[81]   Lu Yang, Li Jiguo and Xiao Junmo. Threshold Certificate-based Encryption: Definition and Concrete Construction. 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, China, vol1, 278-282.

[82]   Yang Lu, Jiguo Li, and Junmo Xiao. Constructing Efficient Certificate-based Encryption with Paring. Journal of Computers. 2009, 4 (1): 19-26. (EI)

[83]   Jiguo Li, Xinyi Huang, Yi Mu, Wei Wu. Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme. Journal of Communications and Networks. 2008, 10(1): 10-17. (SCI, 000254805800003)

[84]   Lu Yang, Li Jiguo and Xiao Junmo. Generic Construction of Certificate-based Encryption. In the 9th International Conference for Young Computer Scientists, Zhangjiajie, China, pp. 1589-1594, 2008 (EI&ISTP)

[85]   Lu Yang, Li Jiguo and Xiao Junmo. Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption. In the 2008 International Symposium on Electronic Commerce and Security, Guangzhou, China, pp. 296-300, 2008. EI

[86]   Lu Yang and Li Jiguo. A General and Secure Certificate-based Encryption Construction. In the 3rd ChinaGrid Annual Conference, Dunhuang, China, pp. 182-189, 2008. EI

[87]   Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu. Certificate-Based Signature: Security Model and Efficient Construction. EuroPKI’07, LNCS 4582, 2007,110-125. EI

[88]   Jiguo Li, Shuhong Wang. New Efficient Proxy Blind Signature Scheme Using Verifiable Self-Certified Public Key. International Journal of Network Security, 2007, 2(4): 193-200(EI, 20131316142523)

[89]   王爱芹, 李继国, 马春光, 王志坚. 一种基于身份的代理盲签名方案的安全性分析. 通信学报, 2006, 27, (12A): 16-19.

[90]   Li Jiguo, Zhang Yichen, and Zhijian Wang. Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006, 480-483 (ISTP, EI)

[91]   李继国, 余纯武, 张福泰, 马春光等. 信息安全数学基础(信息安全系列), 武汉大学出版社, 2006.9

[92]   张福泰, 李继国, 王晓明, 林柏钢, 赵泽茂等. 密码学教程(信息安全系列), 武汉大学出版社, 2006.9

[93]   Li Jiguo, Liang Zhenghe, Zhu Yuelong and Zhang Yichen. Improvement of Some Proxy Signature Schemes. Chinese Journal of Electronics, 2005, 14(3): 407-411 (SCI,945NP, EI)

[94]   Li Jiguo, Zhang Yichen, Zhu Yuelong. A New Proxy Signature Scheme with Message Recovery Using Self-Certified Public Key. Wuhan University Journal of Natural Sciences, 2005, 10(1): 219-222 (EI)

[95]   Li Jiguo, Zhang Yichen, Zhu Yuelong. Security Analysis and Improvement of Some Proxy Signature Schemes. Infosecu’2004, ACM, 27-32

[96]   Jiguo Li, Yichen Zhang, Yuelong Zhu. Security on Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks. Proceedings of ICCC2004, 2004, 1584-1586 (ISTP)

[97]   LI Jiguo, LI Jianzhong, CAO Zhenfu and Zhang Yichen. Convertible Proxy Signcryption Scheme. Journal of Harbin Institute of Technology. 2004, 11(2): 209-213 (EI)

[98]   李继国,曹珍富,李建中. 代理签名的现状与进展. 通信学报. 2003, 24(10): 114-124

[99]   曹珍富, 李继国, 李建中. 一个新的具有指定接收者(t,n)门限签名加密方案. 通信学报. 2003, 24(5): 8-13

[100]   LI Jiguo, LI Jianzhong, CAO Zhenfu and Zhang Yichen. Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent. Journal of Software(软件学报英文版). 2003,14(12): 2021-2027 (EI)

[101]   李继国, 曹珍富, 李建中. 具有指定接收组(t,n)门限共享验证签名加密方案. 电子学报. 2003, 31(7): 1086-1088 (EI)

[102]   李继国, 曹珍富, 张亦辰, 李建中. 代理多重签名方案的密码分析与修改. 高技术通讯. 2003, 13(4): 1-5 (EI)

[103]   Li Jiguo, Cao Zhenfu and Zhang Yichen. Nonrepudiable Proxy Multi-Signature Schemes. Journal of Computer Science and Technology. 2003, 18(3): 399-402 (SCI, EI)

[104]   Li Jiguo, Cao Zhenfu and Zhang Yichen. Improvement of M-U-O and K-P-W Proxy Signature Schemes. Journal of Harbin Institute of Technology. 2002, 9(2): 145-148 (EI)

[105]   曹珍富, 李继国. 基于ElGamal体制的门限密钥托管方案. 计算机学报. 2002,25(4): 346-350 (EI)

[106]   李继国, 曹珍富. 一个门限代理签名方案的改进. 计算机研究与发展. 2002, 39 (11): 1513-1518(EI)

 

部分软件著作权及授权专利如下:

 [1]   徐晨,李继国. 基于数据挖掘的入侵检测系统V1.0. 计算机软件著作权登记证书. 编号:软著登字第0148688. 登记号:2009SR021689.

 [2]   李继国, 姜平进. 一种基于身份的数字签名方法. 专利授权号:ZL 200910027375.6

 [3]   李继国, 徐晨. 基于改进CURE聚类算法的无监督异常检测方法和系统. 专利授权号:ZL 200910027374.1

 [4]   李继国, 许峰, 孙传明. 一种用于证明远程平台安全属性的远程证明方法. 专利授权号:ZL 201110386340.9.

 [5]   李继国, 罗翀, 张亦辰. 一种隐藏得票数的电子投票方法. 专利授权号:ZL 201110425662.X.

 [6]   李继国, 杨海珊, 张亦辰. 一种带标签的基于证书密钥封装方法及系统. 专利授权号:ZL 201110425754.8.

 [7]   李继国, 王芝伟, 张亦辰. 基于证书的数字签名系统及签名方法. 专利授权号:ZL 201110426475.3.

 [8]   李继国, 滕荟芸, 张亦辰. 基于证书的前向安全签名方法及系统. 专利授权号:ZL 201110425553.8.

 [9]   李继国, 王飞, 张亦辰, 于启红, 钱惠玲, 滕美林, 郭宇燕, 石岳蓉, 郭俊, 赵雪霞, 赵晶晶. 一种对诚实参与者公平的理性多秘密分享方法;申请日期:2013-4-25,授权号:ZL201310149090.6,授权日期:2015-12-09

[10]   李继国, 钱惠玲, 张亦辰, 滕美林. 一种基于属性保护的多授权中心加密方法:发明专利,授权号:ZL 201310276499.4,授权日期:2016-06-01

[11]   陆阳, 李继国. 一种基于短期证书的密钥封装方法, 授权号:ZL 201310196758.22016-03-02

[12]   李继国, 张亦辰, 蒋鑫, 黄丕全, 钱惠玲, 滕美林, 汪鑫, 郭宇燕. 免费接收者数量可控的广播加密方法:发明专利,申请日期:2013-04-25, 授权号:ZL201310149490.7,授权日期:2016-04-20

[13]   李继国, 张亦辰, 汪鑫, 蒋勇, 钱惠玲, 滕美林, 蒋鑫, 郭宇燕. 基于离散对数的有向传递签名方法:发明专利,申请日期:2013-04-25, 授权号:ZL201310149352.9 ,授权日期:2016-04-27

[14]   陆阳, 李继国. 一种基于证书代理重加密方法及系统:发明专利,申请日期:2013-11-15,授权号:ZL ZL201310572508.4,授权日期:2016-07-06 

 

在研项目:

 [1]   国家自然科学基金项目云计算环境下属性基密码及其应用研究(61672207)

[2]   国家自然科学基金项目可证明安全的基于证书密码体制及其拓展研究(61272542)

 [3]   江苏省自然科学基金项目抗泄漏的公钥密码算法研究(BK20161511)

[4]   中央高校基本科研业务费重点培育专项云计算环境下公钥密码关键技术研究 (2016B10114) 

[5]   中美计算机科学研究中心开放课题公钥密码及其在云计算中的应用研究(KJR16039)