Homepage of Fagen Li

Research Fellow, Institute of Mathematics for Industry, Kyushu University

Address: 744, Motooka, Nishi-ku, Fukuoka 819-0395, Japan

E-mail:fagenli@imi.kyushu-u.ac.jp

Prof.Tsuyoshi Takagi Lab

Kyushu University

¡¡

I am working as a research fellow in Prof. Takagi Laboratory at Kyushu University, Fukuoka, Japan. I received the Ph.D. degree in Cryptography from School of Telecommunications Engineering, Xidian University, Xi'an, P.R. China in 2007. During April 2008 to April 2009, I was a JSPS postdoctoral fellow in the School of Systems Information Science, Future University-Hakodate, Japan. My research interests include cryptography and network security, especially in signcryption schemes, signature schemes and key agreement protocols. I am a member of IEICE and Chinese Association for Cryptologic Research (CACR). I am also an editorial board member of Journal of Information Security.

Publications

  2011

  1. Fagen Li, Jiang Deng, Tsuyoshi Takagi, An Improved Authenticated Encryption Scheme, IEICE Transactions on Information and Systems. (Accepted)

  2. Fagen Li, Mingwu Zhang, Tsuyoshi Takagi, Efficient Signcryption in the Standard Model, Concurrency and Computation: Practice and Experience, Wiley.(Accepted)

  3. Fagen Li, Tsuyoshi Takagi, Secure Identity-Based Signcryption in the Standard Model, Mathematical and Computer Modelling, Elsevier. (Accepted)

  4. Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, Identity-Based Online/Offline Signcryption for Low Power Devices, Journal of Network and Computer Applications, Elsevier. (Accepted)

  5. Fagen Li, Muhammad Khurram Khan, A Biometric Identity-Based Signcryption Scheme, Future Generation Computer Systems, Elsevier. (Accepted)

  6. Fagen Li, Yongjian Liao, Zhiguang Qin, Analysis of an Identity-Based Signcryption Scheme in the Standard Model, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E94-A, No.1, pp.268-269, 2011.

  7. Fagen Li, Muhammad Khurram Khan, A Survey of Identity-Based Signcryption, IETE Technical Review, Vol. 28, No. 3, pp. 265-272, 2011.

  8. Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, Efficient Identity-Based Signcryption in the Standard Model, The Fifth International Conference on Provable Security (ProvSec 2011), LNCS 6980, pp.120-137, Springer-Verlag, 2011. 

 2010

  1. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Cryptanalysis of Efficient Proxy Signature Schemes for Mobile Communication, Science China Information Sciences, Vol. 53, No. 10, pp. 2016-2021, 2010. 

  2. Fagen Li, Zhiguang Qin, Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem, IETE Technical Review, Vol. 27, No. 3, pp. 266-269, 2010.

  3. Fagen Li, Yonjian Liao, Masaaki Shirase, Tsuyoshi Takagi, Identity-Based and Certificateless Hybrid Signcryption, in Horizons in Computer Science Research, Editors: Thomas S. Clary, Nova Science Publishers, ISBN: 978-1-61761-439-2, 2010.

  4. Hu Xiong, Zhiguang Qin, Fagen Li, Secure Vehicle-to-Roadside Communication Protocol Using Certificate-Based Cryptosystem, IETE Technical Review, Vol. 27, No. 3, pp. 214-219, 2010.

  5. Hu Xiong, Zhiguang Qin, Fagen Li, A Provably Secure Proxy Signature Scheme in Certificateless Cryptography, Informatica, Vol. 21, No. 2, pp. 1-18, 2010.

  6. Hu Xiong, Zhiguang Qin, Fagen Li, Identity-Based Threshold Signature Secure in the Standard Model, International Journal of Network Security, Vol.10, No.1, pp.75-80, 2010.

 2009

  1. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Certificateless Hybrid Signcryption, The 5th Information Security Practice and Experience Conference (ISPEC 2009), LNCS 5451, pp.112-123, Springer-Verlag, 2009. 

  2. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks, 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 289-304, Springer-Verlag, 2009. 

  3. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Efficient Signcryption Key Encapsulation Without Random Oracles. 4th International Conference on Information Security and Cryptology (Inscrypt 2008), LNCS 5487, pp. 47-59, Springer-Verlag, 2009. 

  4. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Identity-Based Hybrid Signcryption, Fourth International Conference on Availability, Reliability and Security (ARES 2009), pp. 534-539, IEEE Computer Society, Fukuoka, Japan, 2009. 

  5. Fagen Li, Hu Xiong, Yongjian Liao, A Generic Construction of Identity-Based Signcryption, International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp. 291-295, IEEE Press, San Jose, USA, 2009.

  6. Fagen Li, Hu Xiong,  Xuyun Nie, A New Multi-Receiver ID-Based Signcryption Scheme for Group Communications, International Conference on Communications, Circuits and Systems (ICCCAS 2009), pp.296-300, IEEE Press, San Jose, USA, 2009.

  7. Li Fagen, Wang Cao, Xiong Hu, A Multipurpose Multi-Signcryption Scheme, Netinfo Security, No. 10, pp.75-77, 2009.(Invited Paper, In Chinese)

  8. Li Fagen, Wang Cao, Xiong Hu, A Threshold Proxy Signature Scheme with Known Signers from Bilinear Pairings, Netinfo Security, No. 3, pp.17-21, 2009. (Invited Paper, In Chinese)

  9. Hu Xiong, Fagen Li, Zhiguang Qin, Provably Secure Identity-Based Threshold Signature Without Random Oracles, International Journal of Computers and Applications, Vol. 31, No. 4, pp. 490-495, 2009, ACTA Press.

  10. Hu Xiong, Zhiguang Qin, Fagen Li, An Anonymous Sealed-Bid Electronic Auction Based on Ring Signature, International Journal of Network Security, Vol. 8, No. 3, pp. 235-242, 2009.

 2008

  1. Fagen Li, Shijie Zhou, Rong Sun, Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 7, pp.1820-1823, 2008.

  2. Fagen Li, Xiangjun Xin, Yupu Hu, Identity-Based Broadcast Signcryption, Computer Standards & Interfaces, Vol. 30, No. (1-2), pp. 89-94, 2008, Elsevier.

  3. Fagen Li, Chunxiang Xu, Shijie Zhou, Improvement of a Proactive Threshold Signcryption Scheme, International Journal of Computers and Applications, Vol.30, No.4, pp. 345-347, 2008, ACTA Press.

  4. Fagen Li, Xiangjun Xin, Yupu Hu, ID-Based Threshold Proxy Signcryption Scheme from Bilinear Pairings, International Journal of Security and Networks, Vol.3, No.3, pp.206-215, 2008, Inderscience Publishers.

  5. Fagen Li, Xiangjun Xin, Yupu Hu, Efficient Certificate-Based Signcryption Scheme from Bilinear Pairings, International Journal of Computers and Applications, Vol.30, No.2, pp.129-133, 2008, ACTA Press. 

  6. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Analysis and Improvement of Authenticatable Ring Signcryption Scheme, Journal of Shanghai Jiaotong University (Science), Vol. 13, No. 6, pp.679-683, 2008.

  7. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, On the Security of Online/Offline Signatures and Multisignatures from ACISP¡¯06, The 7th International Conference on Cryptology and Network Security (CANS 2008), LNCS 5339, pp. 108-119, Springer-Verlag, 2008. 

  8. Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks, IFIP International Conference on Network and Parallel Computing (NPC 2008), LNCS 5245, pp.116-126, Springer-Verlag, 2008. 

  9. Fagen Li, Yong Yu, An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme, International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.547-551, IEEE Press, Chengdu, China, 2008. 

  10. Fagen Li, Hu Xiong, Yong Yu, An Efficient ID-Based Ring Signcryption Scheme, International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.542-546, IEEE Press, Chengdu, China, 2008. 

  11. Hu Xiong, Zhiguang Qin, Fagen Li, Identity-Based Threshold Ring Signature Without Pairings, International Conference on Communications, Circuits and Systems (ICCCAS 2008), pp.537-541, IEEE Press, 2008. 

  12. Hu Xiong, Zhiguang Qin, Fagen Li, An Improved Certificateless Signature Scheme Secure in the Standard Model, Fundamenta Informaticae, Vol. 88, No. (1-2), pp. 1-14, 2008, IOS Press.

  13. Yu Yong, Yang Bo, Li Fagen, and Sun Ying, An ID-Based Proxy Signcryption Scheme with Fast Revocation, Journal of Electronics and Information Technology, Vol. 30, No. 3, pp. 672-675, 2008. (In Chinese) 

  14. Chengyu Fan, Shijie Zhou, Fagen Li, Deniable Proxy-Anonymous Signatures, 9th International Conference for Young Computer Scientists (ICYCS 2008), pp. 2131-2136, IEEE Computer Society, 2008.

 2007

  1. Fagen Li, Yupu Hu, Security Analysis of the Pomykala-Barabasz Scheme, Fundamenta Informaticae, Vol. 80, No. 4, pp. 453-459, 2007, IOS Press. 

  2. Fagen Li, Xiangjun Xin, Yupu Hu, A Pairing-Based Signcryption Scheme Using Self-Certified Public Keys, International Journal of Computers and Applications, Vol. 29, No. 3, pp. 278-282, 2007, ACTA Press. 

  3. Fagen Li, Xiangjun Xin, Yupu Hu, Key Management in Ad Hoc Networks Using Self-Certified Public Key System, International Journal of Mobile Communication, Vol. 5, No. 1, pp. 94-106, 2007, Inderscience Publishers. 

  4. Fagen Li, Yupu Hu, Shuanggen Liu, Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings, Wuhan University Journal of Natural Sciences, Vol. 12, No. 1, pp. 17-20, 2007. 

  5. Fagen Li, Yupu Hu, Chuanrong Zhang, An Identity-Based Signcryption Scheme for Multi-Domain Ad Hoc Networks, 5th International Conference on Applied Cryptography and Network Security (ACNS 2007), LNCS 4521, pp. 373-384, Springer-Verlag, 2007. 

  6. Fagen Li, Yupu Hu, Shuanggen Liu, ID-Based (t, n) Threshold Proxy Signcryption for Multi-Agent Systems, International Conference on Computational Intelligence and Security (CIS 2006), Revised Selected Papers, LNAI 4456, pp. 406-416, Springer-Verlag, 2007. 

  7. Fagen Li, Chunxiang Xu, An Improved Identity-Based KCDSA Signcryption Scheme, The First International Symposium on Data, Privacy, & E-Commerce (ISDPE 2007), pp. 230-232, IEEE Computer Society, 2007. 

  8. Bo Yang, Yong Yu, Fagen Li, Ying Sun, Provably Secure Identity-Based Threshold Unsigncryption Scheme, 4th International Conference on Autonomic and Trusted Computing (ATC 2007), LNCS 4610, pp.114-122, Springer-Verlag, 2007.

  9. Xin Xiangjun, Li Fagen, Xiao Guozhen, A Fair Exchange Protocol Based on Short Signature with the Off-Line Semi-Trusted Third Party, Journal of Xidian University, Vol. 34, No. 1, pp. 92-95, 2007. (In Chinese) 

  10. Xin Xiangjun, Li Fagen, Xiao Guozhen, Exchange Protocol Based on Schnorr Signature Scheme and Secret Sharing, Computer Engineering, Vol.33, No.1, pp. 38-39, 2007. (In Chinese) 

  11. Yu Yong, Yang Bo, Li Fagen, Zhang Mingwu, An Efficient Proxy Ring Signature Scheme, Journal of Beijing University of Posts and Telecommunications, Vol. 30, No. 3, pp. 23-26, 2007. (In Chinese) 

 2006

  1. Fagen Li, Xiangjun Xin, Yupu Hu, ID-Based Signcryption Scheme with (t, n) Shared Unsigncryption, International Journal of Network Security, Vol. 3, No. 2, pp. 155-159, 2006.

  2. Fagen Li, Juntao Gao, Shuanggen Liu, and Yupu Hu, Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks, Journal of Shanghai Jiaotong University (Science), Vol. E-11, No. 2, pp. 152-157, 2006. 

  3. Fagen Li, Yupu Hu, Jie Chen, Improvement of Identity-Based Threshold Proxy Signature Scheme with Known Signers, Wuhan University Journal of Natural Sciences, Vol. 11, No. 6, pp. 1653-1656, 2006. 

  4. Fagen Li, Yupu Hu, Shuanggen Liu, ID-based (t,n) Threshold Proxy Signcryption for Multi-Agent Systems, International Conference on Computational Intelligence and Security (CIS 2006), pp.1389-1392, IEEE Press,2006.

  5. Fagen Li, Yupu Hu, Jie Chen, Efficient ID-Based Signcryption Scheme for Multiple Recipients, The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China, pp. 1-12, 2006. 

  6. Fagen Li, Yupu Hu, Shuanggen Liu, Security Analysis of Two ID-Based Threshold Proxy Signature Schemes, The 5th International Workshop for Applied PKC (IWAP 2006), Dalian, China, pp. 13-20, 2006. 

  7. Fagen Li, Yupu Hu, Jie Chen, Efficient and Provably Secure Signcryption Scheme from Bilinear Pairings, The 9th China Cryptography Conference (ChinaCrypt 2006), Jinan, China, pp. 200-207, 2006. 

  8. Li Fagen, Hu Yupu, Li Gang, Efficient Identity-Based Signcryption Scheme, Chinese Journal of Computers, Vol. 29, No. 9, pp. 1641-1647, 2006. (In Chinese) 

  9. Li Fagen, Xin Xiangjun, Hu Yupu, Improvement of Signature Scheme Based on Discrete Logarithms and Factoring, China Railway Science, Vol. 27, No. 5, pp. 132-135, 2006. (In Chinese) 

  10. Xin Xiangjun, Li Fagen, and Xiao Guozhen, Security Analysis and Improvement of Several Partial Blind Signature Schemes, Journal of Xidian University, Vol. 33, No. 6, pp. 953-955, 2006. (In Chinese) 

 2005

  1. Fagen Li, Juntao Gao, Yupu Hu, ID-Based Threshold Unsigncryption Scheme from Pairings, SKLOIS Conference on Information Security and Cryptology (CISC 2005), LNCS 3822, pp. 242-253, Springer-Verlag, 2005.