Peng Xu received the B.A. degree in computer science from Wuhan University of Science and Technology, Wuhan, China, in 2003, the Master and Ph.D. degree in computer science from Huazhong University of Science and Technology, Wuhan, China, respectively in 2006 and 2010. Since 2010, he works as a post-doctor at Huazhong University of Science and Technology, Wuhan, China. He was PI in three grants respectively from National Natural Science Foundation of China (No. 61472156 and No. 61100222) and China Postdoctoral Science Foundation (No. 20100480900), and a key member in several projects supported by 973 (No. 2014CB340600) and 863 (No. 2012AA012604). He has authored over 20 research papers. His research interests are in the field of cryptography. He is a member of ACM and IEEE.
 Wei Wang, Peng Xu, Hui Li, Laurence Tianruo Yang, Secure Hybrid-Indexed Search for High Efficiency over Keyword Searchable Ciphertexts, accepted by Future Generation Computer Systems.
 Xu Peng, Chen Hongwu, Zou Deqing, Jin Hai, Fine-grained and Heterogeneous Proxy Re-Encryption for Secure Cloud Storage, Chinese Science Bulletin, 59(32), pp. 4201-4209, 2014.  Xu Peng, Tang Yong, Jiang Wenbin, Jin Hai, Zou Deqing, Ciphertext-Policy Attribute-Based Encryption with Short Keys, Chinese Journal of Electronics, 23(4), pp. 655-660, 2014.
 Wei Wang, Peng Xu, Hui Li, Laurence Yang, A Secure Synchronized Reading System over Time-Critical Online Contests, accepted by IEEE ICC 2014.
 Ayad Ibrahim, Hai Jin, Ali A. Yassin, Deqing Zou, Peng Xu, Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing, Computer Journal, 57(2), pp. 241-254, 2014.
 Peng Xu, Hai Jin, Qianhong Wu, Wei Wang, Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack, IEEE Transactions on Computers, 62(11), pp. 2266-2277, 2013.
 Bing Zeng, Christophe Tartary, Peng Xu, Jiandu Jing, Xueming Tang. A Practical Framework for t-Out-of-n Oblivious Transfer with Security Against Covert Adversaries, IEEE Transactions on Information Forensics and Security, 7(2), pp. 465-479, 2012.
 Peng Xu, Guo-Hua Cui, Feng-Yu Lei, Jing-Fang Xu, One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity, Information Sciences, 180(22), pp. 4420-4429, 2010.
 Xu Peng, Cui GuoHua, Fu Cai, Tang XueMing. A more efficient accountable authority IBE scheme under the DL assumption, SCIENCE CHINA Information Sciences, 53(3), pp. 581-592, 2010.