近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Wei Gao, Guilin Wang, Xueli Wang, Zhenguang Yang, ID-based threshold signatures based on bilinear Pairings, Informatica, 2009, 20(4): 461-476
Wei Gao, Fei Li, Xueli Wang, Chameleon hash without key exposure based on Schnorr signature. Computer standards & interfaces, 2009, 31(2): 282-285
Wei Gao, Xueli Wang, Dongqing Xie, Chameleon hashes sithout key exposure based on factoring. Journal of computer science and technology, 2007, 22(1): 109-113
Wei Gao, Kefei Chen., Guilin Wang, Designated condition one-time signatures, International Conference on Internet and Distributed Computing Systems, LNCS, 2012,7646: 253-263, Fujian, China, 2012.11.21-11.23
Wei Gao, Zhenyou Wang, Fei Li, Lie Chen, An efficient threshold signature scheme without random oracles, Proceedings of the 2009 international conference on computational intelligence and security, IEEE Computer Society, 2009, 400-404, Beijing, China, 2009.12.11-12.14
Wei Gao, Guilin Wang, Xueli Wang, Fei Li, One-round ID-based blind signature scheme without ROS assumption, The second international conference on pairing-based cryptography (Pairing 2008), LNCS, 2008, 5209: 316-331, Egham, UK, 2008.09.01-09.03
Wei Gao, Fei Li, Banghai Xu, An abuse-free optimistic fair exchange protocol based on BLS signature, Proceedings of the 2008 international conference on computational intelligence and security, IEEE Computer Society, pp.278-282, 2008.12.12-12.17
Fei Li, Wei Gao,Kefei Chen,Guilin Wang, A certificateless signature and public auditing with trust level 3+.Journal of Ambient Intelligence and Humanized Computing, 2017, online,DOI:10.1007/s12652-017-0553 -x
Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient identity-based threshold signature scheme from bilinear pairings in standard model, International Journal of Internet Protocol Technology, 2014, 8(2/3): 107-115
Jiangshan Yu, Guilin Wang, Yi Mu, Wei Gao, An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation, IEEE Transactions on Information Forensics and Security, 2014, 9(12): 2302-2313
Jianhua Yu, Xueli Wang, Wei Gao, Improvement and applications of secure outsourcing of scientific computations, J. Ambient Intelligence and Humanized Computing 6(6): 763-772 (2015)
Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, Zhe Liu, Qiuliang Xu, A brief survey on secure multi-party computing in the presence of rational parties, J. Ambient Intelligence and Humanized Computing, 6(6): 807-824 (2015)
Yilei Wang, Tao Li, Hairong Qin, Jin Li, Wei Gao, A brief survey on secure multi-party computing in the presence of rational parties, Journal of Ambient Intelligence and Humanized Computing, 2015, 6(6): 1-18
Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen, Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited, Oxford Computer Journal, 2015, 58(10): 2747 - 2757
Gang Sheng, Chunming Tang, Wei Gao, Ying Yin, MD-VC Matrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication, The 10th International Conference on Network and System Security (NSS 2016), Taipei, Taiwan, 2016.09.28-09.30
Fei Li, Wei Gao, Dongqing Xie, Chunming Tang,Certificateless Cryptography with KGC Trust Level 3 Revisited, International Conference on Cloud Computing and Security 2017, ICCCS (2), pp.7292-304, Nanjing, China, 2017.06.16-06.18.
Fei Li, Wei Gao, Jianhua Yan, Xuan Wang, Round-optimal ID-based dynamic authenticated group key agreement, International Journal of High Performance Systems Architecture, 2016, 6(3): 153-161
Fei Li, Wei Gao, Xuan Wang, Jianhua Yan, An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings, The 10th International Conference on Complex, Intelligent, and Software Intensive Systems, CISIS 2016, IEEE Computer Society, pp.468- 472, Fukuoka, Japan, 2016.07.06-07.082.Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security, INFORMATICA, 2017, 28(2): 215-235
Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang, Efficient Identity-based Threshold Decryption Scheme from Bilinear Pairings. Frontiers of Computer Science, 2018, 12(1):177-189
Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Chunmig Tang, Double-authentication-preventing signatures revisited:new definition and construction from chameleon hash. Frontiers of Information Technology & Electronic Engineering, 2019, 20(2):176-186