Peng Jiang picture

Peng Jiang

Assistant Professor in BIT
Beijing, China

Research interests: public key cryptography, applied cryptography and information security

Current Position

Experience

Education

Publications

  1. Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao.
    Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
    IEEE Transactions on Services Computing, to appear, 2018. Acceptance Date: 10 October 2018.

  2. Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai, Wenmin Li.
    PPFilter: Provider Privacy-aware Encrypted Filtering System.
    IEEE Transactions on Services Computing, to appear, 2018. Acceptance Date: 27 September 2018.

  3. Peng Jiang, Fuchun Guo, Yi Mu.
    Efficient Identity-based Broadcast Encryption with Keyword Search against Insider Attacks for Database Systems.
    Theoretical Computer Science, to appear, 2018. Acceptance Date: 27 September 2018.

  4. Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen.
    Identity-Based Revocation System: Enhanced Security Model and Scalable Bounded IBRS Construction with Short Parameters.
    Information Sciences, to appear, 2018. Acceptance Date: 10 September 2018.

  5. Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Sha Ma.
    Identity-Based Broadcast Encryption for Inner Products.
    The Computer Journal, vol. 61(8), pp. 1240-1251, 2018.

  6. Jianchang Lai, Yi Mu, Fuchun Guo, Peng Jiang, Willy Susilo.
    Privacy-enhanced attribute-based private information retrieval.
    Information Sciences, vol. 454-455, pp. 275--291, 2018.

  7. Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph Liu.
    Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
    IEEE Transactions on Services Computing, to appear, 2018. Acceptance Date: 21 March 2018.

  8. Peng Jiang, Fuchun Guo, Willy Susilo, Jinguang Han.
    Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
    Encyclopedia of Big Data Technologies, 2018. doi:10.1007/978-3-319-63962-8_232-1.

  9. Peng Jiang, Fuchun Guo, Kaitai Liang, Jianchang Lai, Qiaoyan Wen.
    Searchain: Blockchain-based Private Keyword Search in Decentralized Storage.
    Future Generation Computer Systems, to appear, 2017. Acceptance Date: 18 August 2017.

  10. Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen
    A Survey on the security of blockchain systems.
    Future Generation Computer Systems, to appear, 2017. Acceptance Date: 14 August 2017.

  11. Willy Susilo, Peng Jiang, Fuchun Guo, Guomin Yang, Yong Yu, Yi Mu.
    EACSIP: Extendable Access Control System with Integrity Protection for Enhancing Collaboration in the Cloud.
    IEEE Transactions on Information Forensics & Security, to appear, 2017. Acceptance Date: 24 July 2017.

  12. Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen.
    Private Keyword Search for Database Systems against Insider Attacks.
    Journal of Computer Science and Technology (JCST), vol. 32(3), pp. 599–617, 2017.

  13. Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang, Wei Jiang.
    PAS: Policy-based Assistance in Sensor Network.
    Computing, to appear, 2016.

  14. Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen.
    Secure-Channel Free Keyword Search with Authorization in Manager-centric Databases.
    Computers & Security, Online, 2016. DOI: 10.1016/j.cose.2016.11.015.

  15. Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen.
    Public Key Encryption with Authorized Keyword Search.
    In: 21th Australasian Conference on Information Security and Privacy (ACISP 2016) (Regular Paper).
    LNCS 9723, pp. 170–186, 2016. [Acceptance Ratio: 54/176]

  16. Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen.
    Oblivious Keyword Search with Authorization.
    In: 10th International Conference on Provable Security (ProvSec 2016) (Regular Paper).
    LNCS 10005, pp. 173–190, 2016. [Acceptance Ratio: 17/88]

  17. Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai.
    Centralized Keyword Search on Encrypted Data for Cloud Applications.
    Security and Communication Networks (SCN), vol. 9(18), pp.  5064–5084, 2016.

  18. Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen.
    Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
    The Computer Journal, vol. 59(7), pp. 955-969, 2016.

  19. Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang.
    An Anonymous and Efficient Remote Biometric User Authentication Scheme in a Multi-server Environment.
    Frontier Computer Science (FCS), vol. 9(1), pp. 142-156, 2015.

  20. Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang.
    An Anonymous User Authentication with Key Agreement Scheme Without Pairings for Multi-server Architecture using SCPKs.
    Scientific World Journal, vol. 2013.

Patents

  1. 李文敏, 蒋芃, 张华, 王心怡.
    基于无证书的M2M 隐私保护和密钥管理的方法.
    中华人民共和国国家知识产权局, 发明专利, CN103297963A, 2013.

  2. 张华, 王心怡, 李文敏, 蒋芃.
    基于生物特征的批量认证的方法及服务器.
    中华人民共和国国家知识产权局, 发明专利, CN103297235A, 2013.

Awards

  1. Scholarship supported by China Scholarship Council, 2014-2015.

  2. National Award for Postgraduate, 2012.

  3. BUPT Outstanding Postgraduate Scholarship (first class), 2011-Present.

  4. BUPT Outstanding Postgraduate Award, 2011, 2012.