Computer Science & Engineering

  • Name:Xue Qingshui
  • Title:Associate Professor
  • Office:SEIEE-3-509
  • Office Phone:021-3420-4642
  • Email:xue-qsh@sjtu.edu.cn
  • Website:http://www.cs.sjtu.edu.cn/en/PeopleDetail.aspx?id=265

Research Field

Proxy cryptography
Position-based cryptography
Applied cryptography

Education

Ph.D., Computer Science,2005
Shanghai Jiao Tong University, Shanghai, China

M.Sc., Computer Science,2000
Shandong University, Jinan, China

B.S., Computer Science, 1995
Shandong Normal University, Jinan, China

Work experience

2005.7-2010.8, Associate Professor, School of Techniques, Shanghai Jiao Tong University
2011.9- , Associate Research Professor,Department of Computer Science and Engineering, Shanghai Jiao Tong University

Research

Awards and Honors

Teaching

Publications

1.Qingshui Xue, Fengying Li and Zhenfu Cao, Bilinear-pairings Based Designated-verifier Multi-proxy Multi-signature Scheme, ICCASM 2010 (2010 International Conference on Computer Application and System Modeling), Taiyuan, China. October 22-24, 2010
2.Qingshui Xue, Fengying Li and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on DLP. http://www.paper.edu.cn, 2010
3.Qingshui Xue, Fengying Li and Zhenfu Cao, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem. http://www.paper.edu.cn, 2010
4.Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009,[WORLDCOMP'09 (The 2009 World Congress in Computer Science, Computer Engineering, and Applied Computing)],Las Vegas, Nevada, USA, July 13-16, 2009
5.Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. An ECDLP-based Threshold Proxy Signature Scheme Using Self-certified Public Key System, MobiSec 2009, June 3-5, 2009, Turin, Italy, (LNICST), 2009, pp. 58-70
6.Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, , Journal of Computational and Applied Mathematics, 195( 2006 ), pp. 229-241
7.Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemes,Journal of Communication and Computer, Vol 2, No 1, pp.17-25, 2005
8.Qingshui Xue, Zhenfu Cao and Haifeng Qian, A generalized proxy signature scheme based on the RSA cryptosystem, PDCAT ‘04 (The Fifth International Conference on Parallel and Distributed Computing, Applications and Technologies), LNCS 3320, 8-10 December, 2004, Singapore, pp. 662-665
9.Qingshui Xue and Zhenfu Cao, A nonrepudiable multi-proxy multi-signature scheme, IEEE SympoTIC’04 Proceeding (Symposium on Trends in Communications), Bratislava, Slovakia, 24-26 October 2004, pp. 102-105
10.Qingshui Xue, Zhenfu Cao and Haifeng Qian, Cryptanalysis of New Digital Nominative Proxy Signature Schemes for Mobile Communication, 2004 Global Mobile Congress, Shanghai, Oct.11-13, 2004, DELSON GROUP, pp. 302-306
11.Qingshui Xue and Zhenfu Cao, A New Proxy Blind Signature Scheme with Warrant, 2004 IEEE Conference on Cybernetics and Intelligent Systems (CIS and RAM 2004), December 1 to 3, 2004, Singapore
12.Qingshui Xue, Zhenfu Cao and Feilong Tang, An improved threshold proxy signature scheme based on the RSA cryptosystem, PDPTA'04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 901-907.
13.Qingshui Xue and Zhenfu Cao, A threshold proxy signature scheme using self-certified public keys, ISPA’2004(Second International Symposium on Parallel and Distributed Processing and Applications), LNCS, Hong Kong, China, 13-15 Dec. 2004
14.Qingshui Xue and Zhenfu Cao, Improvement of Multi-proxy Signature Scheme, The 4th International Conference on Computer and Information Technology (IEEE CIT2004), Wuhan, China, 14-16 September 2004, IEEE Computer Society Press
15.Qingshui Xue, Zhenfu Cao, and Haifeng Qian, Bilinear Pairings-based Threshold Proxy Signature Schemes with Known Signers,DCABES 2004 (2004 International Symposium on Distributed Computing and Application to Business, Engineering and science),Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 950-955
16.Qingshui Xue and Zhenfu Cao, Security analysis and improvement of some threshold proxy signature schemes,DCABES 2004 (2004 International Symposium on Distributed Computing and Application to Business, Engineering and science),Wuhan University of Technology Press ,Wuhan, China, Volume 2, pp. 944-949
17.Qingshui Xue, Zhenfu Cao and Haifeng Qian, Generalization of Proxy Signature Based on the RSA Cryptosystem, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 913-917
18.Qingshui Xue and Zhenfu Cao, Factoring Based Proxy Signature Schemes, ISCI2004 (International Symposium on Computing and Information), August 15-18, 2004, Zhuhai, Guangdong, China, Volume 2, pp. 918-922
19.Fengying Li and Qingshui Xue, Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem, EEEE 2010 (2010 Second International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 423-426
20.Fengying Li and Qingshui Xue, Online Oral Defense System Based on Threshold Proxy Signature, EEEE 2010 (2010 Second International Conference on E-Learning, E-Business, Enterprise Information Systems, and E-Government), Sep. 4-5, Luoyang, China, 2010, pp. 427-431
21.Fengying Li, Qingshui Xue and Zhenfu Cao, Some Basic Principles for Proxy Signature Schemes Based on ECDLP, CollaborateCom 2010 (The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing), Chicago, Illinois, USA, October 9-12, 2010
22.Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, Science in China Series F-Information Sciences, pp.612-622, 2004
23.Haifeng Qian, Zhenfu Cao and Qingshui Xue, Threshold proxy signature scheme from bilinear pairings, science in China Series E-Technological sciences 34(6),pp. 711-720, 2004 (in Chinese)
24.Feilong Tang, Minglu Li, Jian Cao and Qingshui Xue, A Model That Coordinates Short-lived and Long-lived Transactions for Web Services, PDPTA‘04 (The 2004 International Conference on Parallel and Distributed Processing Techniques and Applications), Las Vegas, Nevada, June 21 - 24, 2004, CSREA Press, Volume 2, pp. 908-914.
25.Fengying Li, Qingshui Xue, Jiping Zhang and Zhenfu Cao, About the Security for HW Threshold Proxy Signature Scheme with self-certified Public Key System, CHINACOM 2009 (Int‘l Conference on Communications and Networking), August 26-28, 2009, Xi’an, China
26.Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao. A Model of Bilinear-pairings Based Designated-verifier Proxy Signature Scheme, The Third International Workshop on Trusted Collaboration, 2008 (TrustCol-2008), Orlando, FL, USA, November 13-16, LNICST, 2008, pp. 416-424
27.Fengying Li, Qingshui Xue, Zhenfu Cao. Bilinear-pairings Based Designated-verifier Multi-proxy Signatue Scheme, IT Revolutions 2008, Venice, Italy, December 17-19, IEEE Xplore Publishing, 2008
28.Fengying Li, Qingshui Xue, Zhenfu Cao. Crypanalysis of Kuo and Chen‘s Threshold Proxy Signature Scheme Based on the RSA. (ITNG 2007): 2-4 Apr. 2007, Las Vegas, Nevada, USA., pp. 815-818
29.Haifeng Qian; Zhenfu Cao; Lichen Wang; Qingshui Xue. Efficient non-interactive deniable authentication protocols,CIT 2005 (The Fifth International Conference on Computer and Information Technology). 21-23 Sept. 2005, Shanghai, China IEEE Computer Society, pp. 673 – 679
30.Zhenfu Cao, Qingshui Xue, Strengthen research on cryptology and improve security consciousness, Computer Education, 2005 (in Chinese)
31.Haifeng Qian, Zhenfu Cao and Qingshui Xue, Efficient Pairing-Based Threshold proxy Signature Scheme with Known Signers, Informatica, Vol. 16, No. 2, pp. 261-274, 2005

Others