Prof. Qi Xie
Prof. Qi Xie
School of Mathematics
Hangzhou Normal University
No.2318 Yuhangtang Road, Hangzhou 311121 Zhejiang P R China .
E-mail:qixie68@126.com; qixie@shtsebo.com
Phone:+86-571-28869619Qi Xie, Director of Key Laboratory of Cryptography of Zhejiang Province, Dean of School of Mathematics. His research area is Applied Cryptography, including digital signatures, authentication and key agreement protocols, security in IoT (e.g. VANETS and smart healthcare) etc. He is a World's Top 2% Scientists (2021-2024) and has published over 100 research papers in international journals and conferences, and served as general co-chair of ISPEC2012 and ACM ASIACCS2013, and a reviewer for over 40 international journals.
Education and profession
Selected Projects
Selected Papers
[1] Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang. Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model. IEEE Transactions on Information Forensics & Security, 2017, 12(6):1382-1392.
[2] Qi Xie, Zixuan Ding, Qingyun Xie, Xiao Tan, Debiao He and Wen Tang. Blockchain-based traffic accident handling protocol without third-party for VANETs, IEEE Internet of Things Journal, vol.11, no.19, pp. 31068-31079, 2024, DOI 10.1109/JIOT.2024.3414453.
[3] Qi Xie, Yuanyuan Zhao, Qingyun Xie, Xiumei Li, Debiao He, Kefei Chen. A Multi-server Authentication Protocol with Integrated Monitoring for IoMT-based Healthcare System", IEEE Internet of Things Journal, 12(2): 2265-2278, JANUARY 15, 2025, DOI: 10.1109/JIOT.2024.3469629
[4] Qingyun Xie and Qi Xie. Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System, IEEE Internet of Things Journal, 11(8): 15038 – 15042,2024. 10.1109/JIOT.2023.3334708
[5] Qi Xie, Zixuan Ding and Panpan Zheng, "Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs," in IEEE Transactions on Intelligent Transportation Systems, 24(7): 7318-7327, 2023. doi: 10.1109/TITS.2023.3253710, 2023.
[6] Ding Zixuan, Xie, Qi. Provably secure and lightweight three-factor authentication scheme for industrial medical CPS. Journal of Information Security and Applications, 79(2023)103656, 2023. //doi.org/10.1016/j.jisa.2023.103656
[7] Qi Xie, Zixuan Ding, Wen Tang, Debiao He, Xiao Tan. Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs, IEEE Transactions on Vehicular Technology, 72(12): 15200-15212, 2023. 10.1109/TVT.2023.3289175, 2023
[8] Huige Wang; Kefei Chen; Qi Xie; Qian Meng. Post-Quantum Secure Identity-Based Matchmaking Encryption. IEEE Transactions on Dependable and Secure Computing, vol. 22, no. 1, pp. 833-844, Jan.-Feb. 2025, doi: 10.1109/TDSC.2024.3418984.
[9] Qi Xie, Zixuan Ding. Provably secure and lightweight blockchain based cross hospital authentication scheme for IoMT-based healthcare. Scientific Reports, (2025) 15:6461, //doi.org/10.1038/s41598-025-90219-5.
[10] Bin Hu, Wen Tang, Qi Xie, A Two-factor Security Authentication Scheme for Wireless Sensor Networks in IoT Environments, Neurocomputing 500 (2022) 741–749. doi: //doi.org/10.1016/j.neucom. 2022.05.099
[11] Lidong Han, Guangwu Xu, Qi Xie. Comment on an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage, IEEE Transactions on Information Forensics and Security. 2023, 18: 3934-3935. DOI 10.1109/TIFS.2023.3271272
[12] Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie, PBIDM: Privacy-preserving blockchain-based identity management system for Industrial Internet of Things, IEEE Transactions on Industrial Informatics, 19(2): 1524-1534 (2023). DOI: 10.1109/TII.2022.3206798, 2022.
[13] Yi Yang, Debiao He, Pandi Vijayakumar, Brij B Gupta, Qi Xie. An Efficient Identity-based Aggregate Signcryption Scheme with Blockchain for IoT-enabled Maritime Transportation System. IEEE Transactions on Green Communications and Networking, 2022, 6 (3), pp.1520-1531
[14] Qi Xie. A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012; 25(1):47–54.
[15] Xie Qi. Provably secure convertible multi-authenticated encryption scheme, IET Information Security, 2012, 6( 2): 65–70.
[16] Guilin Wang, Jiangshan Yu and Qi Xie. Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks, IEEE Transactions on Industrial Informatics, 9(1): 294-302 (2013).
[17] Qi Xie, Guilin Wang, Fubiao Xia and Deren Chen. Self-Certified Proxy Convertible Authenticated Encryption: Formal Definitions And A Provably Secure Scheme. Concurrency and Computation: Practice and Experience,2014, 26(5): 1038-1051.
[18] Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. Information Technology And Control, 2013, Vol.42, No.3,231-237.
[19] Qi Xie, Xiao Tan, Duncan S. Wong, Guilin Wang, Mengjie Bao and Na Dong. A practical anonymous authentication protocol for wireless roaming, Security and Communication Networks. 7(8): 1264-1273 (2014) .
[20] Qi Xie, Bin Hu, Xiao Tan, Mengjie Bao, Xiuyuan Yu. Robust anonymous two-factor authentication scheme for roaming service in global mobility network, Wireless Personal Communications, 2014, 74(2): 601-614.
[21] Qi Xie, Jianmin Zhao, Xiuyuan Yu. Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement Scheme. Nonlinear Dynamics, 2013, Volume 74, Issue 4, pp 1021-1027.
[22] Qi Xie, Dongzhao Hong, Mengjie Bao, Na Dong and Duncan S. Wong. Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks, International Journal of Distributed Sensor Networks, vol. 2014, Article ID 325734, 7 pages, 2014.
[23] Qi Xie, Wenhao Liu, Shengbao Wang, Lidong Han, Bin Hu, Ting Wu. Improvement of a Uniqueness-and-Anonymity Preserving User Authentication Scheme for Connected Health Care, Journal of Medical Systems, (2014) 38:91.
[24] Qi Xie, Bin Hu, Na Dong, Duncan S. Wong. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems, PLoS ONE 9(7): e102747. doi:10.1371/journal.pone.0102747 (2014).
[25] Xie, Q., Li, K., Tan, X. et al. A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city. EURASIP Journal of Wireless Commmunication and Networkings, 2021, 119 (2021).
[26] Qi Xie, Jun Zhang, Na Dong. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems, Journal of Medical Systems.2013 Apr;37(2):1-8.
[27] Qi Xie. Improvement of a security enhanced one-time two-factor authentication and key agreement scheme, Scientia Iranica (2012) 19 (6), 1856–1860.
[28] Qi Xie, Zhixiong Tang, Kefei Chen. Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks, Computers and Electrical Engineering, 2017(59): 218-230.
[29] Xie Qi, Hu Bin, Chen Ke-Fei, Liu Wen-Hao and Tan Xiao. Chaotic maps and biometrics based anonymous three-party authenticated key exchange protocol without using passwords. Chinese Physics B, Vol. 24, No. 11 (2015) 110505
[30] Qi Xie, Bin Hu, Ting Wu. Improvement of a chaotic maps-based three-party password-authenticated key exchange protocol without using server's public key and smart card. Nonlinear Dynamics, 2015, 79(4 ): 2345-2358
[31] Qi Xie, Zhixiong Tang. Biometrics based authentication scheme for session initiation protocol. SpringerPlus, (2016) 5: 1045-1058.
[32] Qi Xie, Xiao Tan, Bin Hu, Guilin Wang, Duncan S. Wong, Kefei Chen, and XiuYuan Yu. Probably Secure Anonymous Authenticated Key Agreement Protocols with Enhanced Security Models, Science, 360(6387):27-28, 2018APR 27
[33] Qi Xie, Lingfeng Hwang, Security enhancement of an anonymous roaming authentication scheme with two-factor security in smart city, Neurocomputing 347 (2019): 131-138.
[34] Qi Xie, Yanrong Lu, Xiao Tan,Zhixiong Tang, Bin Hu. Security and Efficiency Enhancement of an Anonymous Three-Party Password-Authenticated Key Agreement Using Extended Chaotic Maps. PLoS ONE, 2018, 13(10): e0203984.
[35] Qi Xie, Bin Hu, Xiao Tan, Duncan S. Wong. Chaotic Maps-Based Strong Anonymous Authentication Scheme for Roaming Services in Global Mobility Networks, Wireless Personal Communications, (2017) 96:5881-5896.
[36] Xie Qi, Yu XiuYuan. Cryptanalysis of Tseng et al's authenticated encryption schemes,Applied Mathematics and Computation, 2004, 158(1):1-5.
[37] Xie Qi. Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers. Applied Mathematics and Computation, 2005,168(2):776-782.
[38] Qi Xie , Zixuan Ding , and Bin Hu. A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. Security and Communication Networks, Volume 2021, Article ID 4799223, 12 pages.