Dr. Fuchun Guo is currently an Associate Professsssssssssssor at the School of Computing and Information Technology, University of Wollongong. He is ARC DECRA Fellow (2017-2019) and ARC Future Fellow (2023-2026). He received his PhD degree from University of Wollongong Australia in 2013 supervised by Yi Mu and Willy Susilo. His primary research interests are security reduction and research philosophy in modern cryptography.




Book:
  1. Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao.
    数字签名密史:从急需到有趣》(Cryptologic Research History of Digital Signatures: From 1976 to 2020),
    北京理工大学出版社 (2022)     第一章

  2. Fuchun Guo, Willy Susilo, and Yi Mu. Introduction to Security Reduction. Springer 2018.

    ePrint:

  3. Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao.
    ``Research Philosophy of Modern Cryptography: Is It Possible to Capture All Research Motivations?", ePrint:2023/715 (2023)


    Conference:

  4. Fuchun Guo and Willy Susilo. Optimal Tightness for Chain-Based Unique Signatures. 41st Annual International Conference on the Theory and Applications of Cryptology and Information Security (EUROCRYPT 2022), Lecture Notes in Computer Science, 2022. (Paper)

  5. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang and Yi Mu. Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. The 37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, 2017. (Paper)

  6. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016. (Paper)

  7. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext," 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science vol.7459, Springer Verlag, 2012, pp. 609-626. (PDF)

  8. Fuchun Guo, Yi Mu, and Zhide Chen, ``Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles," 3rd International Workshop on Security (IWSEC 2008), Lecture Notes in Computer Science vol.5312, Springer Verlag, 2008, pp.49-63. (Best Student Paper)

  9. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," 12th Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science vol.5143, Springer Verlag, 2008, pp.247-261. (PDF)

  10. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key," 1st International Conference on Pairing-based Cryptography(Pairing 2007), Lecture Notes in Computer Science vol.4575, Springer Verlag,2007, pp.392-406.

    Journal:
  1. 赵臻, 吴戈, 赖建昌, 蒋芃, 朱斌瑞, 穆怡, 苏西洛, 郭福春.
    公钥密码方案构造及安全证明的知识要点和方法论[J]. 密码学报, 2018. (Paper)

    Other Articles:
  2. Fuchun Guo, Willy Susilo, and Yumei Li. ``PMP: Attack Encryption Schemes" (2023)
  3. Fuchun Guo, Jianchang Lai, and Zhen Zhao. ``Don't Waste Papers You Have Read " (2023)
  4. Fuchun Guo, Willy Susilo. ``Practice Makes Perfect: Attack Signature Schemes" (2023)
  5. Fuchun Guo, Willy Susilo. ``How To Understand "Research Gap"" (2023)
  6. Fuchun Guo, Willy Susilo, Casey Chow, Hoa Dam, Nan Li.
    ``SCIT-RPR: How to Prepare a Professional Presentation" (2023)