Wei Gao

Affiliations:
  • Ludong University, School of Mathematics and Statistics, Yantai, China
  • Nanjing University of Information Science and Technology, School of Computer and Software, China
  • Guangzhou University, Key Laboratory of Information Security, China
  • Shanghai Jiao Tong University, Department of Computer Science and Engineering, China (former)
  • Hunan University, School of Mathematics and Econometrics, Changsha, China (former)


According to our database1, Wei Gao authored at least 34 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+.
J. Ambient Intell. Humaniz. Comput., February, 2024

2022
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022

2019
Double-authentication-preventing signatures revisited: new definition and construction from chameleon hash.
Frontiers Inf. Technol. Electron. Eng., 2019

Authentication of outsourced linear function query with efficient updates.
Clust. Comput., 2019

2018
Comments on "SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors".
IEEE Trans. Comput. Soc. Syst., 2018

Efficient identity-based threshold decryption scheme from bilinear pairings.
Frontiers Comput. Sci., 2018

2017
Generic Construction of Certificate-Based Signature from Certificateless Signature with Provable Security.
Informatica, 2017

Authentication of Outsourced Linear Function Query with Efficient Updates.
IACR Cryptol. ePrint Arch., 2017

Certificateless Cryptography with KGC Trust Level 3 Revisited.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Round-optimal ID-based dynamic authenticated group key agreement.
Int. J. High Perform. Syst. Archit., 2016

MD-<i>VC</i><sub>Matrix</sub>: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.
Proceedings of the Network and System Security - 10th International Conference, 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

2015
Improvement and applications of secure outsourcing of scientific computations.
J. Ambient Intell. Humaniz. Comput., 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intell. Humaniz. Comput., 2015

Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited.
Comput. J., 2015

2014
An Efficient Generic Framework for Three-Factor Authentication With Provably Secure Instantiation.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient identity-based threshold signature scheme from bilinear pairings in standard model.
Int. J. Internet Protoc. Technol., 2014

2013
Short Convertible Undeniable Signature From Pairing.
J. Softw., 2013

Controllable Ring Signatures and Its Application to E-Prosecution.
J. Comput., 2013

2012
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings.
J. Comput., 2012

Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption.
J. Commun., 2012

Efficient identity-based threshold signature scheme from bilinear pairings in the standard model.
IACR Cryptol. ePrint Arch., 2012

Efficient identity-based threshold decryption scheme from bilinear pairings.
IACR Cryptol. ePrint Arch., 2012

Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model.
IACR Cryptol. ePrint Arch., 2012

Designated Condition One-Time Signatures.
Proceedings of the Internet and Distributed Computing Systems, 2012

On Generic Construction for Private Designated Verifier Signatures.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2009
One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings.
Informatica, 2009

Chameleon hash without key exposure based on Schnorr signature.
Comput. Stand. Interfaces, 2009

Perfect Subliminal Channel in a Paring-Based Digital Signature.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Efficient Threshold Signature Scheme Without Random Oracles.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Abuse-Free Optimistic Fair Exchange Protocol Based on BLS Signature.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Chameleon Hashes Without Key Exposure Based on Factoring.
J. Comput. Sci. Technol., 2007

One-Round ID-Based Blind Signature Scheme without ROS Assumption.
IACR Cryptol. ePrint Arch., 2007

2006
Controllable Ring Signatures.
Proceedings of the Information Security Applications, 7th International Workshop, 2006


  Loading...