通信地址:福建省福州市福建师范大学旗山校区数学与计算机科学学院350108
个人简介:黄欣沂,男,汉族,1981年3月生,江苏仪征人,研究生学历、博士学位,硕士生导师。现为福建师范大学数学与计算机科学学院教授,福建省网络安全与密码技术重点实验室副主任,中国密码学会会员,2013年度“福建省高校杰出青年科研人才培育计划”入选者。教育经历:2006年-2009年,澳大利亚卧龙岗大学计算机科学和软件工程学院,博士(信息安全),指导老师:YiMu
2002年-2005年,南京师范大学数学与计算机科学学院,硕士(信息安全),指导老师:张福泰
1998年-2002年,南京师范大学数学与计算机科学学院,学士(数学与应用数学,师范类)工作经历:2012年2月-至今,福建师范大学数学与计算机科学学院,网络安全与密码技术福建省高校重点实验室
2011年2月-2011年11月,新加坡资讯通信研究院(I2R,Singapore)研究型科学家(ResearchScientist),合作老师:JianyingZhou
2010年2月-2011年2月,新加坡管理大学(SingaporeManagementUniversity)博士后研究人员,合作老师:RobertH.Deng
2009年11月-2010年1月,澳大利亚中央昆士兰大学(CentralQueenslandUniversity)博士后研究人员,合作老师:YangXiang
科研项目:
- “大规模网络安全身份认证协议若干问题研究”(项目负责人,国家自然科学基金青年基金,NSFC61202450,2013-2015)
“大规模网络身份认证协议的安全性分析与设计”(项目负责人,教育部高等学校博士学科点专项科研基金新教师类,**001,2013-2015)
“支持隐私保护的安全协议研究”(项目负责人,2013年度“福建省高校杰出青年科研人才培育计划”)
“面向授权的数字签名方案的新型设计”(参与,国家自然科学基金,NSFC61003232,2011-2013)
“基于证书密码体制研究”(参与,国家自然科学基金,NSFC60842002,2009)
“高效无证书密码体制及其应用”(参与,国家自然科学基金,NSFC60673070,2007-2009)
福建省高等学校“异构网络安全通信技术”创新团队(参与)
福建师范大学“网络与信息安全”创新团队(参与)
- Editor(编委),InternationalJournalofInformationSecurity(IJIS),Springer
Editor(编委),InternationalJournalofSecurity,CRCPressGuestEditor(专刊编委),NSS2012SpecialIssueinSecurityandCommunicationNetworks(SCN)
GuestEditor(专刊编委),INCOS2012SpecialIssueinConcurrencyandComputation:Practice&Experience(CPE)
- GeneralCo-Chair,The8thInternationalConferenceonNetworkandSystemSecurity(NSS2014),Xi’an,China.
ProgramCo-Chair,The10thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2014),Fuzhou,China
PublicityChair,The15thInternationalConferenceonInformationandCommunicationsSecurity(ICICS2013),Beijing,China
ProgramCo-Chair,The7thInternationalConferenceonNetworkandSystemSecurity(NSS2013),Madrid,Spain
ProgramCo-Chair,The5thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2013),Xi’an,China,2013
GeneralChair,2012InternationalConferenceonDataandKnowledgeEngineering(ICDKE2012),WuYiShan,China
WorkshopChair,TheFirstInternationalWorkshoponLarge-ScaleNetworkSecurity(LSNS2012),ROMANIA,2012
TrackChair,The4thInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2012),BUCHAREST,ROMANIA,2012
PublicityChair,The10thInternationalConferenceonAppliedCryptographyandNetworkSecurity(ACNS2012),Singapore,2012
PublicityChair,The6thInternationalConferenceonNetworkandSystemSecurity(NSS2012),WuYiShan,China,2012
- 8thInternationalConferenceonProvableSecurity(ProvSec2014),13-14October2014,HongKong.
19thEuropeanSymposiumonResearchinComputerSecurity(ESORICS2014),September7-112014,Wroclaw,Poland.
The4thIEEEInternationalSymposiumonBiometrics&SecurityTechnologies(ISBAST2014),26-27August,2014,KualaLumpur,Malaysia
The2014IEEEInternationalConferenceonCommunications,IEEEICC2014-CommunicationandInformationSystemsSecuritySymposium,10-14June2014,Sydney,Australia.
The2014AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2014)April14th-17th2014,Bali,Indonesia
The19thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2014),Wollongong,Australia
TheThirdInternationalConferenceonSmartSystems,DevicesandTechnologies,SMART2014,July20-24,2014-Paris,France
2013InternationalConferenceonConnectedVehicles&Expo,2-6December2013,LasVegas
The34thInternationalConferenceonDistributedComputingSystems(ICDCS2014),Madrid,Spain
TheSecondInternationalConferenceonSecurityinComputerNetworksandDistributedSystems(SNDS2014),March13-14,2014,Trivandrum,India
The9thInternationalWorkshoponSecurityandTrustManagement(STM2013),Egham,U.K.,September09-13,2013
2013InternationalConferenceonCloudComputingandBigData(CloudCom-Asia),Fuzhou,China,December16-18,2013
The10thIEEEConsumerCommunicationsandNetworkingConference(CCNC2013)
The12thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications,IEEETrustCom-13,July16-18,2013,Melbourne,Australia
The5thInternationalSymposiumonCyberspaceSafetyandSecurity(CSS2013),Zhangjiajie,China,November13-15,2013
The15thInternationalConferenceonInformationandCommunicationsSecurity(ICICS2013),Beijing,China
TheSecondInternationalConferenceonSmartSystems,DevicesandTechnologies,SMART2013,June23-28,2013,Rome,Italy
The9thInternationalConferenceonInformationSecurityPracticeandExperience(ISPEC2013),May12-14,2013,Lanzhou,China
The3rdIEEEInternationalSymposiumonBiometrics&SecurityTechnologies(ISBAST2013),2-5July,2013,Chengdu,China
The2013AsianConferenceonAvailability,ReliabilityandSecurity(AsiaARES2013).March25th-29th2013,GadjahMadaUniversity,Indonesia
2013ACMAsiaPublic-KeyCryptographyWorkshop(AsiaPKC2013),May7,2013,Hangzhou,China
The9thIEEEConsumerCommunicationsandNetworkingConference(CCNC2012),LasVegas,USA,2012
The26thIEEEInternationalConferenceonAdvancedInformationNetworkingandApplications(AINA2012),Tokyo,Japan,2012
The17thAustralasianConferenceonInformationSecurityandPrivacy(ACISP2012),Wollongong,Australia,2012
The2012InternationalConferenceonSecurityandCryptography(SECRYPT2012),Rome,Italy,2012
The2012InternationalConferenceonSecurityinComputerNetworksandDistributedSystems(SNDS-2012),Trivandrum,India,2012
The11thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(TrustCom-2012),Liverpool,England,UK,2012
TheFirstInternationalConferenceonSmartSystems,DevicesandTechnologies(SMART2012),Stuttgart,Germany,2012
The2012SummerFTRAInternationalSymposiumonAdvancesinCryptography,SecurityandApplicationsforFutureComputing(ACSA-Summer),2012
The5thInternationalConferenceonProvableSecurity(ProvSec2011),Xi’an,China,2011
The8thIEEEConsumerCommunicationsandNetworkingConference(CCNC11),LasVegas,USA,2011
The9thAnnualConferenceonPrivacy,SecurityandTrust(PST2011),MontrealQuebec,Canada,2011
The3rdInternationalWorkshoponCyberspaceSafetyandSecurity(CSS2011),Milan,Italy,2011
The10thIEEEInternationalConferenceonTrust,SecurityandPrivacyinComputingandCommunications(TrustCom2011),Changsha,China,2011
The6thInternationalConferenceonFrontierofComputerScienceandTechnology(FCST2011),Changsha,China,2011
TheFirstInternationalWorkshoponSecurity&OptimizationforWirelessNetworks(SOWN2011),Beijing,China,2011
The5thInternationalConferenceonNetworkandSystemSecurity(NSS2011),Milan,Italy,2011
The9thIEEEInternationalConferenceonDependable,AutonomicandSecureComputing(DASC2011),Sydney,Australia,2011
ThirdInternationalConferenceonIntelligentNetworkingandCollaborativeSystems(INCoS2011),FUKUOKA,JAPAN,2011
The12thIEEEInternationalConferenceonHighPerformanceandCommunications(HPCC-10),Melbourne,Australia,2010
The2009IEEEInternationalConferenceonNetworking,Architecture,andStorage(NAS2009),ZhangJiaJie,China,2009
- XinyiHuang(黄欣沂),YangXiang,ElisaBertino,JianyingZhou,andLiXu.“RobustMulti-FactorAuthenticationforFragileCommunications”.IEEETransactionsonDependableandSecureComputing(IEEETDSC).(已录用,2013-12-22,10.1109/TDSC.2013.2297110)
XinyiHuang(黄欣沂),XiaofengChen,JinLi,YangXiang,andLiXu.“FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS).(已录用,2013-09-01,DOI:10.1109/TPDS.2013.230).
XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“OptimisticFairExchangewithStrongResolution-Ambiguity”.IEEEJournalonSelectedAreasinCommunications(IEEEJ-SAC)29(7):1491-1502,2011
XinyiHuang,YiMu,WillySusilo,WeiWu,JianyingZhou,andRobertDeng.“PreservingTransparencyandAccountabilityinOptimisticFairExchangeofDigitalSignatures”.IEEETransactionsonInformationForensicsandSecurity(IEEETIFS)6(2):498-512,IEEESignalProcessingSociety,2011
XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“FurtherObservationsonOptimisticFairExchangeProtocolsintheMulti-userSetting”.In13thInternationalConferenceonPracticeandTheoryinPublicKeyCryptography,PKC2010.LectureNotesinComputerScience6056:124-141.Springer,2010
XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatureRevisited”.InInformationSecurityandPrivacy,12thAustralasianConference,ACISP2007,LectureNotesinComputerScience4586:308-322.Springer,2007
XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“OntheSecurityofCertificatelessSignatureSchemesfromAsiacrypt2003”.InCryptologyandNetworkSecurity,4thInternationalConference,CANS2005,LectureNotesinComputerScience3810:13-25.Springer,2005
XinyiHuang,YangXiang,AshleyChonka,JianyingZhou,andRobertH.Deng.“AGenericFrameworkforThree-FactorAuthentication:PreservingSecurityandPrivacyinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS)22(8):1390-1397,IEEEComputerSocietyPress,2011
XinyiHuang,WillySusilo,YiMu,andWeiWu.“SecureUniversalDesignatedVerifierSignaturewithoutRandomOracles”.InternationalJournalofInformationSecurity7(3):171-183.Springer,2008
- ShaohuaTang,LinglingXu,NiuLiu,XinyiHuang(黄欣沂),JintaiDing,andZhimingYang.”ProvablySecureGroupKeyManagementApproachBaseduponHyper-Sphere”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-12-31)
XinyiHuang(黄欣沂),YangXiang,ElisaBertino,JianyingZhou,andLiXu.“RobustMulti-FactorAuthenticationforFragileCommunications”.IEEETransactionsonDependableandSecureComputing(IEEETDSC).(SCI、EI,已录用,2013-12-22,10.1109/TDSC.2013.2297110)
XiaofengChen,JinLi,XinyiHuang(黄欣沂),JingweiLi,YangXiang,andDuncanS.Wong.“SecureOutsourcedAttribute-basedSignatures”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-12-05)
JiguoLi,HuiyunTeng,XinyiHuang(黄欣沂),YichenZhang,JianyingZhou.“AForward-SecureCertificate-BasedSignatureScheme”.TheComputerJournal(InPress,Acceptedon2013-11-07)
JinLi,XinyiHuang(黄欣沂),JingweiLi,XiaofengChen,andYangXiang.“SecurelyOutsourcingAttribute-basedEncryptionwithCheckability”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS),IEEEComputerSociety.(InPress,Acceptedon2013-09-27)(SCI、EI)
YuexinZhang,LiXu,YangXiang,andXinyiHuang(黄欣沂).“AMatrix-basedPairwiseKeyEstablishmentSchemeforWirelessMeshNetworksUsingPreDeploymentKnowledge”.IEEETransactionsonEmergingTopicsinComputing(IEEETETC),IEEEComputerSociety.(InPress,Acceptedon2013-09-27)
XinyiHuang,XiaofengChen,JinLi,YangXiang,andLiXu.“FurtherObservationsonSmart-Card-BasedPassword-AuthenticatedKeyAgreementinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems(IEEETPDS).(已录用,2013-09-01).
LanxiangChen,ShumingZhou,XinyiHuang,andLiXu.”DataDynamicsforRemoteDataPossessionCheckinginCloudStorage”.AcceptedbyComputers&ElectricalEngineering,Elsevier.
Ai-JunGe,Xin-YiHuang,ChengChen,Chuan-GuiMaandRuiZhang."CryptanalysisofWang-Zhu-Feng-Yau's"Attribute-BasedSignaturewithPolicy-and-EndorsementMechanism"".AcceptedbyJOURNALOFCOMPUTERSCIENCEANDTECHNOLOGY,Springer.
LiXu,XinyuChen,JieLi,XinyiHuang,andJianyinZhou.“CrosslayerDesigninWirelessMulti-hopNetwork:ABargainingGameTheoreticAnalysis”.AcceptedbyTelecommunicaitonSystem,Springer.
YanlingLian,XinyiHuang,andYiMu.“SA3:Self-AdaptiveAnonymousAuthenticationforDynamicAuthenticationPoliciesFutureGenerationComputerSystems”.FutureGenerationComputerSystems,Elsevier.2013.
YanlingLian,LiXuandXinyiHuang.“Attribute-basedSignatureswithEfficientRevocation”InProceedingsofINCOS2013,IEEE,2013.
ChuanYao,LiXuandXinyiHuang.“ASecureCloudStorageSystemfromThresholdEncryption”.InProceedingsofINCOS2013,IEEE,2013.
YuexinZhang,LiXu,XinyiHuangandJieLi.“Matrix-basedPairwiseKeyEstablishmentwithPreandPostDeploymentKnowledgeforWirelessMeshNetworks”.AcceptedbyTheSeventhInternationalConferenceonInnovativeMobileandInternetServicesinUbiquitousComputing(IMIS-2013),IEEEComputationalIntelligenceSociety.
YuexinZhang,LiXu,YangXiangandXinyiHuang.“Matrix-basedPairwiseKeyEstablishmentinWirelessMeshNetworksUsingDeploymentKnowledge”,IEEEICC2013-Ad-hocandSensorNetworkingSymposium.
-----2012-----
XinyiHuang,Cheng-KangChu,Hung-MinSun,JianyingZhou,andRobertH.Deng.“EnhancedAuthenticationforCommercialVideoServices”.SecurityandCommunicationNetworks5(11):1248–1259,2012.
XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatures:NewSchemesandSecurityModels".TheComputerJournal55(4):457-474,2012.
JiguoLi,XinyiHuang,MeixueHong,andYichenZhang.“Certificate-basedSigncryptionwithEnhancedSecurityFeatures”.ComputersandMathematicswithApplications64(6):1587-1601,2012.
LiJi-Guo,QianNa,HuangXin-Yi,andZhangYi-Chen.“Certificate-BasedStrongDesignatedVerifierSignatureScheme”.ChineseJournalofComputers35(8):1579-1587,2012.
WeiWu,YiMu,WillySusilo,XinyiHuangandLiXu.“AProvablySecureConstructionofCertificate-BasedEncryptionfromCertificatelessEncryption”.TheComputerJournal55(10):1157-1168,2012.
XuAnWang,XinyiHuang,XiaoyuanYang,LongfeiLiu,andXuguangWu.“FurtherObservationonProxyRe-encryptionwithKeywordSearch”.JournalofSystemsandSoftware85(3):643-654,2012.
RaylinTso,XinyiHuang,WillySusilo.“StronglySecureCertificatelessShortSignatures”.JournalofSystemsandSoftware85(6)1409–1417,2012.
JiguoLi,XinyiHuang,YichenZhang,andLizhongXu.“AnEfficientShortCertificate-basedSignatureScheme”,JournalofSystemsandSoftware85(2):314-322,2012.
YuexinZhang,LiXuandXinyiHuang.“PolynomialbasedKeyPredistributionSchemeinWirelessMeshNetworks”.JournalofComputationalInformationSystem8(6):2539-2550,2012.
TszHonYue,JosephK.Liu,XinyiHuang,ManHoAu,WillySusiloandJianyingZhou.“ForwardSecureAttribute-BasedSignatures”.ICICS2012,LectureNotesinComputerScience7618:167-177,2012,Springer
YunmeiZhang,JosephLiu,XinyiHuang,ManHoAuandWillySusilo.“EfficientEscrow-FreeIdentity-BasedSignature”.Provsec2012,LectureNotesinComputerScience7496:161-174,2012,Springer
Cheng-KangChu,JosephK.Liu,XinyiHuang,andJianyingZhou.“Verifier-LocalRevocationGroupSignatureswithTime-BoundKeys”.InAsiaCCS2012:26-27,2012,ACM
ShermanS.M.Chow,Cheng-KangChu,XinyiHuang,JianyingZhou,andRobertH.Deng.“DynamicSecureCloudStoragewithProvenance”.LectureNotesinComputerScience6805:442-464,2012,Springer
-----2011-----
XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang."OptimisticFairExchangewithStrongResolutionAmbiguity".IEEEJournalonSelectedAreasinCommunications29(7):1491-1502,2011.
XinyiHuang,YiMu,WillySusilo,WeiWu,JianyingZhou,andRobertDeng.“PreservingTransparencyandAccountabilityinOptimisticFairExchangeofDigitalSignatures”.IEEETransactionsonInformationForensicsandSecurity6(2):498-512,IEEESignalProcessingSociety,2011.
XinyiHuang,YangXiang,AshleyChonka,JianyingZhou,andRobertH.Deng.“AGenericFrameworkforThree-FactorAuthentication:PreservingSecurityandPrivacyinDistributedSystems”.IEEETransactionsonParallelandDistributedSystems22(8):1390-1397,IEEEComputerSocietyPress,2011.
RaylinTso,XunYi,andXinyiHuang.“EfficientandShortCertificatelessSignaturesSecureAgainstRealisticAdversaries”.JournalofSupercomputing55(2):173-191,2011.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“ProvablySecureServer-AidedVerificationSignatures”.ComputersandMathematicswithApplications61(7):1705-1723,2011.
-----2010-----
JiguoLi,XinyiHuang,YiMu,WillySusilo,andQianhongWu.“ConstructionsofCertificate-BasedSignatureSecureagainstKeyReplacementAttacks”.JournalofComputerSecurity18(3):421-449,2010.
HongYuan,FutaiZhang,XinyiHuang,YiMu,WillySusiloandLeiZhang.“CertificatelessThresholdSignatureSchemefromBilinearMaps”.InformationSciences180(23):4714-4728,2010.
LiXu,SishengCheng,XinyiHuang,andYiMu.“BloomFilterbasedSecureandAnonymousDSRProtocolinWirelessAdHocNetworks”.InternationalJournalofSecurityandNetwork5(1):35-44,2010.
FutaiZhang,SujuanLi,SongqinMiao,YiMu,WillySusilo,andXinyiHuang.“CryptanalysisonTwoCertificatelessSignatureSchemes”.InternationalJournalofComputers,Communications&Control,Vol.V,No.4,pp.586-591,2010.
XinyiHuang,YiMu,WillySusilo,WeiWu,andYangXiang.“FurtherObservationsonOptimisticFairExchangeProtocolsintheMulti-userSetting”.In13thInternationalConferenceonPracticeandTheoryinPublicKeyCryptography,PKC2010.LectureNotesinComputerScience6056:124-141.Springer,2010.
-----2009-----
YongYu,ChunxiangXu,XinyiHuang,andYiMu.“AnEfficientAnonymousProxySignatureSchemewithProvableSecurity”.ComputerStandards&Interfaces31(2):348-353,2009.
LeiZhang,FutaiZhang,andXinyiHuang.“ASecureandEfficientCertificatelessSignatureSchemeUsingBilinearPairing”.TheChineseJournalofElectronics18(1):145-148,2009.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“Certificate-basedSignaturesRevisited”.JournalofUniversalComputerScience15(8):1684-1659,2009.
AijunGe,ShaozhenChen,andXinyiHuang.“AConcreteCertificatelessSignatureSchemewithoutPairings”.In2009InternationalConferenceonMultimediaInformationNetworkingandSecurity,MINES2009:374-377.IEEEComputerSociety,2009.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“Certificate-BasedSignatures:NewDefinitionsandAGenericConstructionfromCertificatelessSignatures”.InInformationSecurityApplications,9thInternationalWorkshop,WISA2008,LectureNotesinComputerScience5379:99-114.Springer,2009.
XuanWang,XinyiHuang,andXiaoyuanYang.“FurtherObservationsonCertificatelessPublicKeyEncryption”.InInformationSecurityandCryptology,4thSKLOISConference,Inscrypt2008.LectureNotesinComputerScience5487:217-239.Springer,2009.
-----2008-----
XinyiHuang,WillySusilo,YiMu,andWeiWu.“SecureUniversalDesignatedVerifierSignaturewithoutRandomOracles”.InternationalJournalofInformationSecurity7(3):171-183.Springer,2008.
XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“ShortDesignatedVerifierSignatureSchemeandItsIdentity-basedVariant”.InternationalJournalofNetworkSecurity6(1):82-93,2008.
JiguoLi,XinyiHuang,YiMu,andWeiWu.“CryptanalysisandImprovementofAnEfficientCertificatelessSignatureScheme”.JournalofCommunicationsandNetworks10(1):10-17,2008.
DongdongSun,XinyiHuang,YiMu,andWillySusilo.“Identity-BasedOn-line/Off-lineSigncryption”.In2008IFIPInternationalConferenceonNetworkandParallelComputing,NPC2008:34-41.IEEEComputerSociety,2008.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“Server-AidedVerificationSignatures:DefinitionsandNewConstructions”.InProvableSecurity,SecondInternationalConference,ProvSec2008,LectureNotesinComputerScience5324:141-155.Springer,2008.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“ConvertibleUndeniableProxySignatures:SecurityModelsandEfficientConstruction”.InInformationSecurityApplications,8thInternationalWorkshop,WISA2007,LectureNotesinComputerScience4867:16-29.Springer,2008.
WeiWu,YiMu,WillySusilo,andXinyiHuang.“ProvablySecureIdentity-BasedUndeniableSignatureswithSelectiveandUniversalConvertibility”.InInformationSecurityandCryptology,ThirdSKLOISConference,Inscrypt2007,LectureNotesinComputerScience4990:25-39.Springer,2008.
RaylinTso,XunYi,andXinyiHuang.“EfficientandShortCertificatelessSignature”.InCryptologyandNetworkSecurity,7thInternationalConferenceCANS2008,LectureNotesinComputerScience5339:64-79.Springer,2008.
-----2007-----
XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“BreakingandRepairingTrapdoor-FreeGroupSignatureSchemesfromAsiacrypt'2004”.JournalofComputerScienceandTechnology22(1):71-74.Springer,2007.
XinyiHuang,YiMu,WillySusilo,andWeiWu.“ProvablySecurePairing-BasedConvertibleUndeniableSignaturewithShortSignatureLength”.InPairing-BasedCryptography-Pairing2007,FirstInternationalConference,LectureNotesinComputerScience4575:367-391.Springer,2007.
XinyiHuang,YiMu,WillySusilo,DuncanS.Wong,andWeiWu.“CertificatelessSignatureRevisited”.InInformationSecurityandPrivacy,12thAustralasianConference,ACISP2007,LectureNotesinComputerScience4586:308-322.Springer,2007.
XinyiHuang,YiMu,WillySusilo,andWeiWu.“AGenericConstructionforUniversally-ConvertibleUndeniableSignatures”.InCryptologyandNetworkSecurity,6thInternationalConference,CANS2007,LectureNotesinComputerScience4856:15-33.Springer,2007.
WeiWu,YiMu,WillySusilo,JenniferSeberry,andXinyiHuang.“Identity-BasedProxySignaturefromPairings”.InAutonomicandTrustedComputing,4thInternationalConference,ATC2007,LectureNotesinComputerScience4610:22-31.Springer,2007.JiguoLi,XinyiHuang,YiMu,WillySusilo,andQianhongWu.“Certificate-BasedSignature:SecurityModelandEfficientConstruction”.InPublicKeyInfrastructure,4thEuropeanPKIWorkshop:TheoryandPractice,EuroPKI2007,LectureNotesinComputerScience4582:110-125.Springer,2007.YongYu,BoYang,XinyiHuang,andMingwuZhang.“EfficientIdentity-BasedSigncryptionSchemeforMultipleReceivers”.InAutonomicandTrustedComputing,4thInternationalConference,ATC2007,LectureNotesinComputerScience4610:13-21.Springer,2007.DennisY.W.Liu,DuncanS.Wong,XinyiHuang,GuilinWang,QiongHuang,YiMu,andWillySusilo.“FormalDefinitionandConstructionofNominativeSignature”.InInformationandCommunicationsSecurity,9thInternationalConference,ICICS2007,LectureNotesinComputerScience4861:57-68.Springer,2007.
-----2006-----
LiSujuan,ZhangFutai,andHuangXinyi.“AnEfficientDesignated-verifierProxySignatureScheme”.ComputerEngineering32(23):148-150,2006.XinyiHuang,FutaiZhang,andWeiWu.“Identity-basedRingSigncryptionScheme”(inChinese),TienTzuHsuehPao/ActaElectronicaSinica34(2):263-266.2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“Short(Identity-Based)StrongDesignatedVerifierSignatureSchemes”.InInformationSecurityPracticeandExperience,SecondInternationalConference,ISPEC2006,LectureNotesinComputerScience3903:214-225.Springer,2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“RestrictedUniversalDesignatedVerifierSignature”.InUbiquitousIntelligenceandComputing,ThirdInternationalConference,UIC2006,LectureNotesinComputerScience4159:874-882.Springer,2006.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“CertificatelessDesignatedVerifierSignatureSchemes”.In20thInternationalConferenceonAdvancedInformationNetworkingandApplications,AINA2006:15-19.IEEEComputerSociety,2006.XinyiHuang,WillySusilo,YiMu,andWeiWu.“UniversalDesignatedVerifierSignatureWithoutDelegatability”.InInformationandCommunicationsSecurity,8thInternationalConference,ICICS2006,LectureNotesinComputerScience4307:479-498.Springer,2006.XinyiHuang,WillySusilo,YiMu,andWeiWu.“ProxySignatureWithoutRandomOracles”.InMobileAd-hocandSensorNetworks,SecondInternationalConference,MSN2006,LectureNotesinComputerScience4325:473-484.Springer,2006.
-----2005-----
YiMu,WillySusilo,andXinyiHuang.“EfficientBroadcastfromTrapdoorFunctions”.InThe4thInternationalWorkshopforAppliedPKI(IWAP'05):240-248.IOSPress,2005.WillySusilo,YiMu,andXinyiHuang.“SecureKeyExtractioninComputerNetworks”.InThe8thInternationalSymposiumonDSPandCommunicationSystems&4thWorkshopontheInternet,TelecommunicationsandSignalProcessing(DSPCS'2005&WITSP'2005),2005.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“OntheSecurityofCertificatelessSignatureSchemesfromAsiacrypt2003”.InCryptologyandNetworkSecurity,4thInternationalConference,CANS2005,LectureNotesinComputerScience3810:13-25.Springer,2005.XinyiHuang,YiMu,WillySusilo,FangguoZhang,andXiaofengChen.“AShortProxySignatureScheme:EfficientAuthenticationintheUbiquitousWorld”.InTheSecondInternationalSymposiumonUbiquitousIntelligenceandSmartWorlds,UISW2005,LectureNotesinComputerScience3823:480-489.Springer,2005.XinyiHuang,YiMu,WillySusilo,andFutaiZhang.“ShortDesignatedVerifierProxySignaturefromPairings”.InTheFirstInternationalWorkshoponSecurityinUbiquitousComputingSystems,SecUbiq2005,LectureNotesinComputerScience3823:835-844.Springer,2005.XinyiHuang,WillySusilo,YiMu,andFutaiZhang.“Identity-basedRingSigncryptionSchemes:CryptographicPrimitivesforPreservingPrivacyandAuthenticityintheUbiquitousWorld”.TheFirstInternationalWorkshoponUbiquitousSmartWorlds(USW2005),inconjunctionwiththe19thIEEEInternationalConferenceofAINA2005:649-654.IEEEComputerSociety,2005.
2012级:侯书权、李梦婷2013级:刘江华、杨旭