Publications 

 

      My research areas include applied cryptography, information security, and electronic commerce. Especially, I am interested in the analysis, design, and application of digital signatures, secret sharing schemes, and security protocols etc.

Last updated:  16 July, 2013


       My Publications Listed in DBLP. 

   

  Edited Books and Book Chapters

  Refereed Journal Papers: 

  Refereed Conference Papers

  • Jingquan Wang, Guilin Wang, and Willy Susilo. Anonymous Single Sign-on Schemes Transformed from Group Signatures. In: Proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (INCoS-2013), Xi'an, China, September 9-11, 2013. [Full Text (PDF)New

  • Jingquan Wang, Guilin Wang, and Willy Susilo. Single Sign-on Schemes Constructed from Nominative Signatures. In: Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2013), 16-18 July, 2013, Melbourne, Australia. (ERA A). [Full Text (PDF)New

  • Wei Gao, Kefei Chen, Guilin Wang, and Xueli Wang. Designated Condition One-time Signatures. In: Proc. of the International Conference on Internet and Distributed Computing Systems (IDCS 2012), LNCS 7646, pp. 253-263, Springer-Verlag, 2012. November 21-23, 2012, Wu Yi Shan, Fujian, China. New

  • Qi Xie, Guilin Wang, Fubiao Xia, and Deren Chen. Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme. In: Prof. of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2012), Bucharest, Romania, September 19-21, 2012. New

  • Jiangshan Yu, Guilin Wang, and Yi Mu. Provably Secure Sing Sign-on Scheme in Distributed Systems and Networks. In: Proc. of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2012), 25-27 June 2012, Liverpool, UK (ERA A). [Full Text (PDF)New

  • Chunhua Su, Guilin Wang, and Kouichi Sakurai. Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. In: Proc. of the Second International Symposium on Security and Privacy in Internet of Things (SPIoT 2012), 25-27 June 2012, Liverpool, UK. New

  • Guilin Wang, Fubiao Xia, and Yunlei Zhao. Designated Confirmer Signatures With Unified Verification. In: Proc. of the 13th IMA International Conference on Cryptography and Coding (IMACC'11), LNCS 7089, pp. 469-495, Springer-Verlag, 2011. December 12-15, 2011; University of Oxford, UK (ERA B). Preliminary version is available at http://eprint.iacr.org/2011/182.

  • Lie Qu, Guilin Wang, and Yi Mu. Optimistic Fair Exchange of Ring Signatures. In: Proc. of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm'11), 7-9 Sept. 2011, London, UK (ERA A). [Full Text (PDF)

  • Tieyan Li, Yingjiu Li, and Guilin Wang. Secure and Practical Key Distribution for RFID-Enabled Supply Chains. In: Proc. of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm'11), 7-9 Sept. 2011, London, UK (ERA A). [Full Text (PDF)]

  • Rehana Yasmin, Eike Ritter, and Guilin Wang. A Pairing-Free ID-based One-Pass Authenticated Key Establishment Protocol for Wireless Sensor Networks. In: Proc. of the 5th International Conference on Sensor Technologies and Applications (SensorComm 2011), August 21-27, 2011, French Riviera, France (Best Paper Award). The paper is available online.

  • Fubiao Xia, Guilin Wang, and Rui Xue. On the Invisibility of Designated Confirmer Signatures. In: Proc. of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'11), pp. 268-276, ACM Press (ERA B). March 22-24, 2011, Hong Kong, China.

  • Rehana Yasmin, Eike Ritter, and Guilin Wang. An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures. In: Proc. of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), June 29-July 1, 2010, Bradford, UK (Best Paper Award). [Full Text (PDF)]  

  • Wei Gao, Guilin Wang, Xueli Wang, and Fei Li. One-Round ID-Based Blind Signature Scheme without ROS Assumption. In: Proc. of the 2nd International Conference on Pairing-based Cryptography (Pairing 2008), LNCS 5209, pp. 316-331, Springer-Verlag, 2008. Royal Holloway, University of London, UK; September 1-3, 2008. Preliminary version is available as ePrint archive, http://eprint.iacr.org/2007/007, Jan. 2007.

  • Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, and Willy Susilo. Formal Definition and Construction of Nominative Signature. In: Proc. of the 9th International Conference on Information and Communications Security (ICICS'07), LNCS 4861, pp. 57-68, Springer-Verlag, 2007. Zhengzhou, Henan Province, China; 12-15 December 2007 (AR=17.2%=38/222). Full version (Nominative Signature: Application, Security Model and Construction) is available as ePrint archive, http://eprint.iacr.org/2007/069, Feb. 2007.

  • Shiqun Li, Guilin Wang, Jianying Zhou, and Kefei Chen. Undeniable Mobile Billing Schemes. In: Proc. of 4th European PKI Workshop: Theory and Practice (EuroPKI'07), LNCS 4582, pp. 338-345, Springer-Verlag, 2007. Mallorca, Balearic Islands, Spain; 28-30 June, 2007.  [Full Text (PDF)]

  • Lifeng Guo, Guilin Wang, Duncan S. Wong, and Lei Hu. Further Discussions on the Security of a Nominative Signature Scheme. In: Proc. the 2007 International Conference on Security and Management (SAM 2007), pp. 566-572, CSREA Press, 2007. Las Vegas, USA; June 25-28, 2007. Preliminary version of this paper: http://eprint.iacr.org/2006/007, Jan. 2006. 

  • Guilin Wang and Feng Bao. Security Remarks on a Convertible Nominative Signature Scheme. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), IFIP 232, pp. 265-275, Springer, 2007. Sandton, Gauteng, South Africa; 14-16 May 2007.  [Full Text (PDF)]

  • Tieyan Li and Guilin Wang. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: Proc. of the  the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), IFIP 232, pp. 109-120, Springer, 2007. Sandton, Gauteng, South Africa; 14-16 May 2007.  [Full Text (PDF)]

  • Guilin Wang, Joonsang Baek, Duncan S. Wong, and Feng Bao. On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. In: Proc. of the 10th International Conference on Theory and Practice of Public Key Cryptography (PKC 2007), LNCS 4450, pp. 43-60, Springer-Verlag, 2007. Beijing, China; April 16-20, 2007.  [Full Text (PDF)]  

  • Guilin Wang, Feng Bao, and Jianying Zhou. The Fairness of Perfect Concurrent Signatures. In: Proc. of the 8th International Conference on Information and Communications Security (ICICS 2006), LNCS 4307, pp. 435-451, Springer-Verlag, 2006. Raleigh, North Carolina, USA; December 4-7, 2006. [Full Text (PDF)]

  • Guilin Wang and Feng Bao. Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. In: Proc. of the 8th International Conference on Information and Communications Security (ICICS 2006), LNCS 4307, pp. 399-409, Springer-Verlag, 2006. Raleigh, North Carolina, USA; December 4-7, 2006.  [Full Text (PDF)]

  • Wei Gao, Guilin Wang, Xueli Wang, and Dongqing Xie. Controllable Ring Signatures. In: Proc. of the 7th International Workshop on Information Security Applications (WISA 2006), LNCS 4298, pp. 1-14, Springer-Verlag, 2006. Jeju Island, Korea; August 28-30, 2006 (AR=21%=31/146). [Full Text (PDF)] 

  • Lifeng Guo, Guilin Wang, and Feng Bao. On the Security of a Threshold Proxy Signature Scheme Using Self- Certified Public Keys. In: Proc. of The SKLOIS conference on information security and cryptology (CISC 2005), pp. 45-53, ISBN 7-04-018757-4, Higher Education Press. Dec. 15-17, 2005,  Beijing, China. [Full Text (PDF)]

  • Guilin Wang, Feng Bao, Kenji Imamoto, and Kouichi Sakurai. Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. In:  Information and Communications Security (ICICS 2005), LNCS 3783, pp. 40-52.Springer-Verlag, 2005. December 10-13, 2005, Beijing, China (AR=17%=40/235). [Full Text (PDF)]

  • Guilin Wang. Generic Fair Non-Repudiation Protocols with Transparent Off-line TTP. In: Proc. of the 4th International Workshop for Applied PKI (IWAP'05), pp. 51-65, vol. 128 of Frontiers in Artificial Intelligence and Applications, IOS Press. Sept. 21-23, 2005, Singapore. [Full Text (PDF)]

  • Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. An Efficient Certified E-Mail Scheme Suitable for Wireless Mobile Environments. In: Proc. of the 16th Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC'05), IEEE. September 11-14, 2005, Berlin, Germany. 

  • Helger Lipmaa, Guilin Wang, and Feng Bao. Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction. In: Proc. of the 32nd International Colloquium on Automata, Languages and Programming (ICALP 2005), LNCS 3580, pp. 459-471. Springer-Verlag, 2005. July 11-15, 2005, Lisboa, Portugal. [Full Text (PDF)]

  • Guilin Wang. Designated-Verifier Proxy Signature Schemes. In: Security and Privacy in the Age of Ubiquitous Computing (Proc. of IFIP TC11 20th International Information Security Conference (SEC 2005)), pp. 409-423. Springer, 2005 (ISBN 0-387-25658-X). Chiba, Japan, May 30-June 1, 2005. [Full Text (PDF)

  • Guilin Wang. An Abuse-Free Fair Contract Signing Protocol Based on the RSA Signature. In: Proc. of the 14th International World Wide Web Conference (WWW 2005), pp. 412-421. ACM Press, 2005. Chiba, Japan, May 10-14, 2005 (AR=14%=77/550). [Full Text (PDF)]

  • Guilin Wang and Sihan Qing. Security Flaws in Several Group Signatures Proposed by Popescu. In: Proc. of International Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, pp. 711-718. Springer-Verlag, 2005. Singapore, May 9-12, 2005 (AR=20%=540/2700). Preliminary version appears in Cryptology ePrint archive, report 2003/207, Sep. 2003. http://eprint.iacr.org/2003/207

  • Min-Hua Shao, Jianying Zhou, and Guilin Wang. On the Security of a Certified E-Mail Scheme with Temporal Authentication.. In: Proc. of International Conference on Computational Science and its Applications (ICCSA 2005), LNCS 3482, pp. 701-710. Springer-Verlag, 2005. Singapore, May 9-12, 2005 (AR=20%=540/2700).  [Full Text (PDF)]

  • Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng. Providing Robust Certification Services Against Active Attacks in Ad Hoc Networks. Proc. 24th IEEE International Performance Computing and Communications Conference (IPCCC 2005), Phoenix, 7-9 April, 2005. 

  • Guilin Wang, Feng Bao, and Jianying Zhou. On the Security of a Certified E-Mail Scheme. In: Progress in Cryptology - INDOCRYPT 2004, LNCS 3348, pp. 48-60. Springer-Verlag, 2004. The 5th International Conference on Cryptology in Indian, December 20-22, Chennai (Madras), India (Acceptance Ratio 20.4%=30/147).  [Full Text (PDF)]

  • Guilin Wang, Robert H. Deng, Dongjin Kwak, and Sangjae Moon. Security Analysis of Two Signcryption Schemes. In: Information Security (ISC 2004), LNCS 3225, pp. 123-133. Springer-Verlag, 2004. September 27-29, 2004, Palo Alto, CA, USA. [Full Text (PDF)]

  • Guilin Wang, Feng Bao, Changshe Ma, and Kefei Chen. Efficient Authenticated Encryption Schemes with Public Verifiability. In: Proc. of the 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security, September 26-29, 2004, Los Angeles, CA, USA. IEEE Computer Society, 2004. [Full Text (PDF)]

  • Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Proxy Signature Scheme with Multiple Original Signers for Wireless E-Commerce Applications. In: Proc. of the 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security, September 26-29, 2004, Los Angeles, CA, USA. IEEE Computer Society, 2004. [Full Text (PDF)]

  • Shuhong Wang, Guilin Wang, Feng Bao, and Jie Wang. Cryptanalysis of a Proxy-Protected Proxy Signature Scheme Based on Elliptic Curve Cryptosystem. In: Proc. of the 60th IEEE Vehicular Technology Conference (VTC 2004-Fall) - Wireless Technologies for Global Security, September 26-29, 2004, Los Angeles, CA, USA. IEEE Computer Society, 2004. [Full Text (PDF)]

  • Guilin Wang, Jianying Zhou, and Robert H. Deng. On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. In: Trust and Privacy in Digital Business (TrustBus 2004), LNCS 3184, pp. 289-298. Springer-Verlag, 2004. 30 Aug.-3 Sep.; Zaragoza, Spain. Preliminary version appears in cryptology ePrint archive, report 2002/150, Sep. 2002.  http://eprint.iacr.org/2002/150/.

  • Feng Bao, Guilin Wang, Jianying Zhou, and Huafei Zhu. Analysis and Improvement of Micali's Fair Contract Signing Protocol. In: Information Security and Privacy (ACISP 2004), LNCS 3108, pp. 176-187. Springer-Verlag, 2004. Presented at the 9th Australasian Conference on Information Security and Privacy, July 13-15, 2004, Sydney, Australia (AR 21%=41/195).   [Full Text (PDF)]

  • Guilin Wang. Designated-Verifier Proxy Signatures For E-Commerce. In: Proc. of the IEEE 2004 International Conference on Multimedia and Expo (ICME 2004), June 27th-30th, 2004, Taipei, Taiwan. ISBN: 0-7803-8604-3. [Full Text (PDF)]

  • Guilin Wang. On the Security of a Group Signature Scheme with Forward Security. In: Information Security and Cryptology - ICISC 2003, LNCS 2971, pp. 27-39. Springer-Verlag, 2004. Presented at the 6th Annual International Conference on Information Security and Cryptology, November 27-28, Seoul, Korea (AR 19.6%=32/163).  Preliminary version appears in cryptology ePrint archive, report 2003/226, Oct. 2003. http://eprint.iacr.org/2003/226

  • Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng. Security Analysis of Some Proxy Signatures. In: Information Security and Cryptology - ICISC 2003, LNCS 2971, pp. 305-319. Berlin: Springer-Verlag, 2004. Presented at the 6th Annual International Conference on Information Security and Cryptology, November 27-28, Seoul, Korea (AR 19.6%=32/163).  Preliminary version appears in cryptology ePrint archive, report 2003/196, Sep. 2003. http://eprint.iacr.org/2003/196

  • Guilin Wang. Security Analysis of Several Group Signature Schemes. In: Progress in Cryptology - INDOCRYPT 2003, LNCS 2904, pp. 252-265. Springer-Verlag, 2003. The 4th International Conference on Cryptology in Indian, December 8-10, New Delhi, India (Acceptance Ratio 29.7%=30/101). Full version is available at http://eprint.iacr.org/2003/194

  • Guilin Wang, Xiaoxi Han, and Bo Zhu.  On the Security of Two Threshold Signature Schemes with Traceable Signers. In: Applied Cryptography and Network Security (ACNS 2003), LNCS 2846, pp.111 -122. Berlin: Springer-Verlag, 2003. Presented at the 1st MiAn International Conference on Applied Cryptography and Network Security , October 16-19, 2003, Kunming, China (Acceptance Ratio 16.8%=32/191).  [Full Text (PDF)]

  • Guilin Wang, Feng Bao, Jianying Zhou, and Rober H. Deng. Security Remarks on a Group Signature Scheme with Member Deletion. In: Information and Communications Security (ICICS 2003), LNCS 2836, pp. 72-83. Berlin: Springer- Verlag, 2003. Presented at the 5th International Conference on Information and Communications Security (ICICS 2003), 10-13 October, 2003, Huhehaote City, Inner-Mongolia, China. (Acceptance Ratio 21%=37/176).  [Full Text (PDF)]

  • Gang Yao, Guilin Wang, and Yong Wang. An Improved Identification Scheme. In: Coding, Cryptography and Combinatorics, Progress in Computer Science and Applied Logic, Vol. 23, pp. 397-405. ISBN 3-7643-2429-5. Birkhauser Verlag, Basel, Switzerland, 2004. (Proc. of the Workshop on Coding, Cryptography and Combinatorics (CCC 2003), June 23-28, Yellow Mountain, China.) [Full Text (PDF)]

  • Guilin Wang. On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. In: Information Security and Cryptology - ICISC 2002, LNCS 2587, pp. 75-89. Berlin: Springer-Verlag, 2003. The 5th International Conference on Information Security and Cryptography. November 28-29, 2002, Seoul, Korea (Acceptance Ratio 24.6%=35/142). [Full Text (PDF)

  • Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou. Threshold Undeniable RSA Signature Schemes. In: Information and Communications Security (ICICS 2001), LNCS 2229, pp. 221-232. Berlin: Springer-Verlag, 2001.  [Full Text (PDF)]

  • Guilin WANG, Sihan QING. Two New Attacks Against Otway-Rees Protocol. In: IFIP/SEC2000, Information Security. 16th World Computer Congress 2000, August 21-25, Beijing, China. Beijing: International Academic Publishers, 2000. 137-139. [Full Text (PDF)]

  Refereed Conference and Journal Papers Written in Chinese (Chinese Version with Full Context Access ): 

  • WANG Gui-lin, QING Si-han. Analysis and Improvement of a Multisecret Sharing Authenticating Scheme. Journal of Software, July 2006, 17(7): 1627-1632. 

  • WANG Gui-lin, QING Si-han. Security Notes on Two Cheat-Proof Secret Sharing Schemes (in Chinese). Research and Development of Computer, November 2005, 42(11): 1924-1927. 

  • WANG Shu-Hong, WANG Gui-Lin, BAO Feng, and WANG Jie. Cryptananlysis of a Proxy Blind Signature Scheme Based on DLP. Journal of Software, May 2005, 16(5): 911-915. 

  • Xiaoxi Han, Guilin Wang, Feng Bao, and Kui Ren. An attack to multisignature schemes based on discrete logarithm (in Chinese) Chinese Journal of Computers, August 2004, 27(8): 1147-1152.

  • Guilin Wang and Sihan Qing. Security flaws in a confirmer signature scheme (in Chinese). Journal of Software, May 2004, 15(5): 752-756.  

  • WANG Gui-lin, QING Si-han, MA Heng-tai. Security Proof to a Publicly Verifiable Secret Sharing Scheme (in Chinese). Information and Communications Security--CCICS'03, the 3rd Chinese Conference of Information and Communications Security, pp. 268-276. Beijing: Sciences Press, Mar. 2003.

  • WANG Gui-lin, QING Si-han. The Weaknesses of a Threshold Undeniable Signature Scheme (in Chinese). Advances in Cryptography - Chinacrypt 2002, 186-192. Beijing: Publishing House of Electronic Industry, June 2002.

  • WANG Gui-lin, QING Si-han. Formal Analysis of MTI A(0) Protocol (in Chinese). Journal of Software, 2002, 13(Supplement): 192-198.

  • WANG Gui-lin, QING Si-han, FENG Deng-guo, NI Xi-zhen. The Bell-LaPadula Formal Model for Secure Computer Systems (in Chinese). Computer Sciences, Dec. 2001, 28(12): 89-92.  

  • WANG Gui-lin, WANG Ming-sheng, QING Si-han, FENG Deng-guo. A Simple and Secure Threshold RSA Signature Scheme (in Chinese). Journal of the Graduate School of the Chinese Academy of Sciences, Dec. 2001, 18(2): 124-129.

  • WANG Gui-lin, QING Si-han, WANG Ming-sheng. Improvement to Shoup's Threshold RSA Signature Scheme (in Chinese). Research and Development of Computer, Sep. 2002, 39(9): 1046-1050.

  • WANG Gui-lin, QING Si-han, ZHOU Zhan-fei. Formal Analysis of Needham-Schroeder Protocol (in Chinese). Journal of Software, 2002, 13(Supplement): 86-92.

  • WANG Gui-lin, WANG Ming-sheng, JI Qing-guang, QING Si-han. Security Limits of the LHL Threshold Group Signature Scheme (in Chinese). Chinese Journal of Computers, Sep. 2000, 24(9): 897-902.

  • WANG Gui-lin, QING Si-han, ZHOU Zhan-fei. Some New Attacks upon Authentication Protocols (in Chinese). Journal of Software, Jun. 2001, 12 (6): 907-913.  

  • WANG Gui-lin, QING Si-han. The Weaknesses of Some Threshold Group Signature Schemes (in Chinese). Journal of Software, Oct. 2000, 11(10): 1326-1332.

  • ZHOU Zhan-fei, ZHOU Dian-cui, WANG Gui-lin, QING Si-han. Fairness in Electronic Commerce Protocols (in Chinese). Journal of Electronics, Sep. 2000, 28(9): 13-15.

  • WANG Gui-lin, QING Si-han. A New Taxonomy of Attacks against Cryptographic Protocols (in Chinese). Information and Communications Security--CCICS'99, the 1st Chinese Conference of Information and Communications Security. Beijing: Sciences Press, Jan. 2000, pp. 136-141.

■   Manuscripts: 

  • Guilin Wang, Fubiao Xia, and Yunlei Zhao. Designated Confirmer Signatures with Unified Verification. Submitted to the 13th IMA International Conference on Cryptography and Coding (IMA
    C&C 2011 ), June 2011. http://eprint.iacr.org/2011/182

  • Qi Xie, Guilin Wang, and Duncan S. Wong. Anonymous Two-factor Authenticated Key Exchange Secure Against Lost Smart Card Attack. Submitted to IEEE Transactions on Industrial Electronics (ERA B), Feb. 2011.

  • Wei Gao, Guilin Wang, Xueli Wang, and Fei Li. Round-Optimal Identity-Based Blind Signatures without ROS Assumption. Submitted to Theoretical Computer Science (ERA A), Dec. 2010.

  • Wei Gao, Guilin Wang, and Kefei Chen. Short and Efficient Identity-based Threshold Decryption Scheme from Bilinear Pairings. Submitted to Information Sciences (ERA B), Sept. 2010

  • Wei Gao, Guilin Wang, Xueli Wang, and Guoyan Zhang. Efficient Identity-based Threshold Signature Scheme from Bilinear Pairings in the Standard Model. Submitted to Information Sciences (ERA B), July 2010.

  • Lifeng Guo, Guilin Wang, and Duncan S. Wong. Further Discussions on the Security of a Nominative Signature Scheme. Cryptology ePrint archive, report 2006/007, Jan. 2006. http://eprint.iacr.org/2006/007

  • Guilin Wang. An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures. Cryptology ePrint archive, report 2003/243, Nov. 2003. http://eprint.iacr.org/2003/243

  • Guilin Wang. Security Analysis of Several Group Signature Schemes. Cryptology ePrint archive, report 2003/194, Sep 2003. http://eprint.iacr.org/2003/194

  • Guilin Wang. How to Cheat Verifiers in Shao's Batch Verifying Multiple DSA-type Digital Signatures. Submitted, Sep. 2003. [Full Text (PDF)] 

  • Guilin Wang and Bo Zhu. Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers. Cryptology ePrint archive, report 2003/46, Mar 2003. http://eprint.iacr.org/2003/46 [Full Text (PDF)]

  • Guilin Wang, Jianying Zhou, and Robert H. Deng. Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. Cryptology ePrint archive, report 2002/150, Sep 2002. http://eprint.iacr.org/2002/150.  [Full Text (PDF)]

 

  Dissertations: 

  • Design and Analysis of Threshold Signature Schemes and Authentication Protocols (in Chinese). Ph.D Dissertation, Dec. 2000. Supervised by Prof. Sihan Qing. Institute of Software, Chinese Academy of Sciences.  Beijing 100080, P. R. China.

    [Abstract] 

    Full Text (All Three Parts in Chinese

      - [Part1.ps](1,070KB)  [Part1.zip] (439KB)

      - [Part2.ps](1,202KB)  [Part2.zip] (482KB)

      - [Part3.ps](1,463KB)     [Part3.zip] (584KB)

  • The Micro-mechanical Research of the Coupled Thermoelastoplasticity of Two-phase Composites under Thermal and Mechanical Loads. M. Eng Thesis, June 1997. Supervised by Prof. Qingjie Zhang, and Prof. Wang Jihui. Department of Engineering Mathematics, Wuhan University of Technology. Wuhan, P.R. China. 

   [Abstract] [Full Text]

                                 


 [Timetable] [Profile] [Publications] [Bibliography on Digital Signatures] [Professional Activities] [Hotlinks]