Yongge Wang's Publications
Survey articles
- Yongge Wang. Encryption Based Covert Channel for Large Language Models (pdf)
- Yongge Wang. A Review of Threshold Digital Signature Schemes
(pdf)
- Yongge Wang. Smart Grid, Automation, and SCADA Systems Security
(pdf, 200K). Chapter of "Security and Privacy in Smart Grids", 2013,
CRC Press (Taylor & Grancis Group). ISBN 978-1-4398-7783-8
- Yongge Wang. Public Key Cryptography Standards: PKCS
(pdf, 150K). Chapter of "Handbook of Information Security",
John Wiley & Sons, Inc., 2005
Publisher's ToC
- Securing eBusiness with cryptographic techniques
(pdf 319KB or
pdf 945KB). In Bank Fraud and IT Security
December 2004 Issue, by
Southeast Consulting Inc.
Refereed conference and journal papers
- Yongge Wang: On LIL Tests.
(pdf)
- Yongge Wang.
Another Look at CBC Casper Consensus Protocol , March, 2020
(pdf).
- Yongge Wang.
Byzantine Fault Tolerance in Partially Connected Asynchronous Networks IACR ePrint, December 2019 (pdf).
- Yongge Wang. Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. (pdf)
- Yongge Wang: Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes. Manuscripts 2017. (pdf)
- Y.Wang and Q. Malluhi. Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. Proc. AfricaCrypt 2024.
(paper and PowerPoint Presentation).
- Y.Wang and Q. Malluhi. Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs
(pdf, PPT). Proc. 25th Information Security Conference. LNCS, Springer-Verlag, 2022.
- Yongge Wang.
The Adversary Capabilities In Practical Byzantine Fault Tolerance.
In International Workshop on Security and Trust Management, (pp. 20-39). Springer LNCS 13075 (pdf or DOI).
- Israa Alsarsour, Qutaibah Malluhi, and Yongge Wang.
Free Chain: Enabling Freedom of Expression through Public Blockchains. In
IEEE DependSys 2020, December 2020. (pdf)
- Liu, Jingang, Yongge Wang, Zongxinag Yi, and Dingyi Pei. "Quantum Resistant Public Key Encryption Scheme polarRLCE." In International Conference on Algebra, Codes and Cryptology, pp. 114-128. Springer, Cham, 2019. Online
- M. Ahmed, J. Wei, Yongge Wang, Ehab Al-Shaer: A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154.
(pdf)
- Y.Wang and Q. Malluhi. Reusable Garbled Turing Machines without FHE
(pdf). Proc. 3rd Conference C2SI, Codes, Cryptology and Information Security. LNCS, Springer-Verlag, 2019.
- Yongge Wang and Khaled Khan. Matrix Barcode Based Secure Authentication without Trusting Third Party. IEEE IT Professionals, May 2019. (pdf).
- Gretchen Mattthews and Yongge Wang. Quantum Resistant Public Key Encryption Scheme HermitianRLCE. Proc. Code Based Cryptography. 2019 (pdf).
- Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, and Tianyuan Xie.
Breaking HK17 in Practice.
Proc. ISIT 2019. (pdf).
- Yongge Wang and Q.M.Malluhi.
The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. Communications of ACM, May 2019 (pdf).
- K. Khan, M.Shaheen, and Y.Wang. Using Sparse Matrices to Prevent Information Leakage in Cloud Computing. Proc. 2018 IEEE 6th International Conference on Future Internet of Things and Cloud. (pdf).
- M. Punekar, Q. Malluhi, Y. Wang, and Y. Desmedt. Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 Architectures. Proc. ACM BDCAT’17, December 5–8, 2017, Austin, Texas, USA. (pdf).
- M. Punekar, Q. Malluhi, Y. Wang, and Y. Desmedt. Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. Proc. CANS 2017. (pdf).
- Khaled Khan, Mahboob Shaheen, and Yongge Wang. Data Confidentiality in Cloud-based Pervasive System. Proc. ACM 2nd International Conference on Internet of Things, Data and Cloud Computing 2017.
(pdf).
- Yongge Wang. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems. In Proc. CyberICPS 2016 (ESORICS Workshop), LNCS 10166, pages 103-120. (pdf).
- Y. Wang. and Q.M. Malluhi. Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. Proc. ESORICS 2016, LNCS 9878, pp. 301-323. (pdf).
- Yongge Wang:
Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE. Proc. IEEE pages 2519-2523 ISIT 2016 (Barcelona)
(pdf).
- P.Li, X.Liu, X.Yi, Y.Wang and Yongge Wang.
Brownian Motion Properties of Random Bit Generators Based on Laser Chaos. Optics Express 24(14):15822-15833 (pdf,
Publisher version, impact factor: 3.148 for 2015)
- Y.Wang and Q. Malluhi and K.Khan:
Garbled computation in cloud. Future Generation of Computer Systems,
Vol 62, pages 54-65, 2015
(pdf)
- Yongge Wang and Yvo Desmedt. Efficient Secret Sharing Schemes
Achieving Optimal Information Rate. In Information Theory Workshop (ITW)
pages 516-520, 2014. (pdf)
- Yongge Wang:
Privacy-preserving data storage in cloud using array BP-XOR codes.
IEEE Transactions on Cloud Computing (TCC), 3(4):425-435, 2015
(pdf)
- M. Paterson, Douglas R. Stinson, and Yongge Wang:
On Encoding Symbol Degrees of Array BP-XOR
Codes. Cryptography and Communications, pages 1-14,
2015. (pdf)
- Yongge Wang and Tony Nicol:
Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL.
Computers and Security (53):44-64, September 2015.
An extended abstract appeared in ESORICS 2014, LNCS 8712, pp. 454--471.
(pdf)
Elsevier version. (LIL Software, 432KB). The JAR file runs on all platforms. For instructions, run: java -jar LILtest.jar
- Q. Duan, Y.Wang, F.Mohsen, and E.Al-Shaer.
Private and Anonymous Data Storage and Distribution in Cloud.
Proc. IEEE SCC 2013, pages 264-271.
(pdf)
- Yongge Wang: Array BP-XOR Codes for Reliable Cloud Storage Systems.
Proc. IEEE ISIT 2013, pages 326--330.
(pdf) and
(presentation slide).
- Y.Wang: Efficient Identity-Based and Authenticated Key
Agreement Protocol (pdf).
M.L. Gavrilova and C.J.K. Tan (Eds.) Trans. on Comput. Sci. XVII, LNCS 7420, pp. 172--197. Springer, Heidelberg (2013)
- Y.Wang. Password Protected Smart Card and Memory Stick Authentication
Against Off-line Dictionary Attacks.
In: D. Gritzalis, S. Furnell, and M. Theoharidou (Eds.): SEC 2012, IFIP AICT 376, pp. 489-500, 2012.
(pdf).
- M.Tozal, Y.Wang, E.Al-Shaer, K.Sarac, B.Thuraisingham, B.Chu.
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
In Mobile Networks and Applications MONET, 18(5):697-711. 2011
(pdf)
- M.Tozal, Y.Wang, E.Al-Shaer, K.Sarac, B.Thuraisingham, B.Chu.
On Secure and Resilient Telesurgery Communications over Unreliable Networks.
In
INFOCOM Cyber-Physical Networking Systems (CPNS), pages 714--719, IEEE 2011.
(pdf)
- Y.Wang and Y.Desmedt. Edge-Colored Graphs with Applications To Homogeneous Faults.
Information Processing Letters 111(2011) 634-641 (pdf).
Publisher's version.
- Y.Wang and Y.Desmedt. Homogeneous Faults, Colored Edge Graphs, and Cover Free Families.
In Proc. 5th International Conference on Information Theoretic Security (ICITS 2011), pages 58-72. LNCS 6673.
pdf
- Y.Wang. sSCADA: Securing SCADA Infrastructure Communications (pdf).
Int. J. Communication Networks and Distributed Systems, 6(1):59--78, 2011.
- M.Boujettif and Y.Wang. Constructivist Approach To Information Security Awareness In The Middle East.
BWCCA, pp.192-199, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, 2010,
IEEE press.
(pdf, pptx).
- Y.Wang and Y.Desmedt. Perfectly Secure Message Transmission Revisited. IEEE Transaction on Information Theory 54(6):2582--2595, June 2008.
- Y.Desmedt, Y.Wang and M.Burmester.
Revisiting Colored Networks and Privacy Preserving Censorship.
Proc. 1st International Workshop on
Critical Information Infrastructures Security (CRITIS'06)
August 30 - September 2, 2006, Samos Island, Greece. LNCS 4347, pages
140-150, 2006.
(pdf),
(Yvo Desmedt's slide),
(
Springer Verlag version).
- Z.Zhao, Z.Dong, and Y.Wang.
Security Analysis of a Password-Based Authentication
Protocol Proposed to IEEE 1363
Theoretical Computer Science,
352(1-3):280--287, 7 March 2006.
(pdf).
Publisher's
version.
- Y.Desmedt and Y. Wang. Survey of Models for Critical Infrastructures and Methods to Measure Robustness.
Proc. of the first CRIS International Workshop on Critical Information Infrastructures (CIIW'05).
- Y.Desmedt, Y.Wang and M.Burmester.
A complete characterization of tolerable adversary structures for
secure point-to-point transmissions.
In Proc. 16th ISAAC (ratio: 112/549), LNCS 3827, pages 277-287, 2005.
(pdf). Publisher's
version.
- Y.Wang and X.Wu.
Approximate inverse frequent itemset mining:
privacy, complexity, and approximation.
In Proc. 5th IEEE ICDM, (ratio: 69/630),
pages 482-289, 2005.
(pdf, 79K)
- Y.Zheng and Y.Wang.
Efficient and provably secure ciphers for storage device
block level encryption.
In Proc. ACM StorageSS workshop.
pages 103-107, 2005.
(pdf, 72K)
- X.Wu, C.Sanghvi, Y.Wang, and Y.Zheng.
Privacy aware data generation for testing database applications.
Proc. of Ninth International Database Engineering and
Applications Symposium (IDEAS 2005)}, pages 317--326. IEEE Press.
- Y.Desmedt, Y.Wang, R.Safavi-Naini, and H.Wang.
Radio networks with reliable communications.
In Proc. COCOON (ratio: 96/360), pages 156-166, LNCS 3595, 2005.
(pdf, 79K)
- X.Wu, Y.Wu, Y.Wang, and Y.Li.
Privacy aware market basket data set generation: a feasible approach
for inverse frequent set mining. In Proc. 5th SIAM
International Conference on Data Mining, April 2005.
- Y.Wang, X. Wu, and Y. Zheng.
Privacy preserving data generation for database application
performance testing.
In: Proc. 1st International Conference on Trust and Privacy in Digital Business
(TrustBus '04) (together with DEXA conference,
Zaragoza, Spain), LNCS 3184, pages 142-151.
Springer-Verlag.
(pdf, 79K)
- Y.Wang.
Robust key establishment in sensor networks.
ACM SIGMOD Record, 33(1):14--19, March 2004.
(pdf, 79K,
publisher's
version)
- Y.Desmedt and Y.Wang: Analyzing vulnerabilities of
critical infrastructures using flows and critical vertices
in AND/OR graphs.
International Journal of Foundations of Computer Science,
15(1):107--125, 2004
(pdf, 61K)
- Y.Wang and Y.Zheng. Fast and secure WORM storage systems.
In: Proceedings of the IEEE Security in Storage Workshop (SISW),
pages 11-19, 2003
(pdf, 73K).
Publisher's
version
- M.Burmester, Y.Desmedt, and Y.Wang.
A Critical Analysis of Models for Fault-Tolerant and Secure Computation.
In: Proceedings of the IASTED Communication, Network, and Information Security (CNIS)
2003, pages 147-152, 2003
(pdf, 73K).
- X.Wu, Y.Wang, and Y.Zheng: Privacy preserving database
application testing. Proceedings of
the ACM Workshop on Privacy in Electronic Society,
(ratio 16/50) pages 118--128, 2003
(pdf, 150K)
- Z.Liu and Y.Wang: A secure agent architecture for sensor networks.
Proceedings of The 2003 International Conference on Artificial
Intelligence--Intelligent Pervasive Computing Workshop
(IC-AI'03 June 23-26, 2003, Las Vegas, Nevada, USA), pages 10--16, 2003
(Eds. H.R.Arabnia, R. Joshua, and Y.Mun), CSREA Press
(pdf, 61K)
- Y.Wang, Y.Zheng, and B.Chu: Efficient and secure storage systems based on
peer-to-peer systems.
Proceedings of The 2003 International Conference on Artificial
IntelligenceIntelligent Pervasive Computing Workshop
(IC-AI'03 June 23-26, 2003, Las Vegas, Nevada, USA), pages 17--22, 2003
(Eds. H.R.Arabnia, R. Joshua, and Y.Mun) CSREA Press
(pdf, 61K)
- Y.Desmedt and Y.Wang: Efficient Zero-knowledge proofs for some
practical graph problems. Proceedings of
Third Conference on Security in Communication Networks,
LNCS 2576, pages 296--308, 2002
(pdf, 150K)
- Y.Wang: A comparison of two approaches to pseudorandomness.
Theoretical Computer Science
276(1-2):449--459, 2002. (pdf, 170K,
publisher's version)
- Y.Wang: The algebraic structure of the isomorphic types of
tally polynomial time sets. Archive for Mathematical
Logic 41(3): 215--244, 2002.
(pdf, 301K, publisher's
version)
- Y.Desmedt and Y.Wang: Maximum Flows and Critical Vertices in AND/OR
Graphs COCOON '02 2002, pages 238-248. LNCS 2387, Springer-Verlag.
(pdf, 202K). Preliminary results was
presented at INFORMS '99 Cincinnati, section SA34.1
- Y.Desmedt and Y.Wang: Perfectly Secure Message Transmission Revisited.
EuroCrypt'02 2002, pages 502-517. LNCS 2332, Springer-Verlag.
(pdf, 259K)
- W.Merkle and Y.Wang: Separations by random oracles and almost-classes
for generalized reducibilities.
Mathematical Logic Quarterly 47(2):249--269, 2001.
(pdf, 301K, publisher's
version).
A preliminary version of this paper appeared in: Proc. of 20th MFCS.
LNCS 969, pages 179-190, 1995.
- Y.Wang and Y.Desmedt: Secure communication in multicast channels.
Journal of Cryptology 14(2):121--135, 2001.
(pdf, 264K, publisher's
version). A preliminary version of this paper appeared
in: Proc. Eurocrypt 99, pages 443--455. LNCS 1592, Springer Verlag.
(publisher's
version)
- C.Calude, P.Hertling, B.Khoussainov, and Y.Wang: Recursively enumerable
reals and Chaitin's
Ω numbers.
Theoretical Computer Science 255:125--149, 2001.
(pdf, 200K, publisher's version).
A preliminary version of this paper appeared in: Proc. 15th STACS,
pages 596--606. LNCS 1373, Springer Verlag, 1998.
- Y.Wang, Y.Desmedt, and M.Burmester: Models for dependable computation
with multiple inputs and some hardness results.
Fundamenta Informaticae, 42(1):61--73, 2000.
(pdf, 251K, publisher's version)
- Y.Wang: Resource bounded randomness and computational complexity.
Theoretical Computer Science 237(1-2):33--55, 2000.
(pdf, 164K, publisher's version)
- Y.Wang: Using mobile agent results to create hard-to-detect computer viruses
In: Information Security for Global Information Infrastructures,
the 16th IFIP SEC (2000), pages 161--170,
Kluwer Academic Publishers.
(pdf, 159K)
- Y.Wang: Genericity, randomness, and polynomial time approximations.
SIAM Journal on Computing,
28(2):394-408, 1999. (pdf, 253K, publisher's version)
- Y.Wang: A separation of two randomness concepts.
Information Processing Letters, 69(3):115--118, 1999.
(pdf, 154K, publisher's version)
- Y.Wang: Randomness, stochasticity, and approximations.
Theory of Computing Systems (formerly: Mathematical
Systems Theory) 32:517--529, 1999.
(pdf, 77K, publisher's
version). A preliminary version of this paper appeared in:
Proc. of RANDOM 97
(Italy), pages 213--225. LNCS 1269, Springer Verlag.
- Y.Wang: Linear complexity versus pseudorandomness:
on Beth and Dai's result.
In: Proc. Asiacrypt 99,
pages 288--298. LNCS 1716, Springer
Verlag. (pdf, 170K)
- Y.Desmedt and Y.Wang: Approximation hardness and secure communication
in broadcast channels.
In: Proc. Asiacrypt 99, pages 247--257.
LNCS 1716, Springer Verlag. (pdf, 180K)
- Y.Wang: Abuses of probabilistic encryption schemes.
IEE Electronics Letters, 34(8):753--754, 1998.
(pdf, 92K).
- Y.Desmedt, M.Burmester, and Y.Wang: Using approximation hardness
to achieve dependable computation. In: Proc. of RANDOM 98,
pages 172-186. LNCS 1518, Springer
Verlag. (pdf, 201K, publisher's version)
- P.Hertling and Y.Wang: Invariance properties of random sequences.
Journal of Universal Computer Science, 3(11):1241-1449, 1997.
(pdf, 153K, publisher's version)
- Y.Wang: NP-hard sets are superterse unless NP is small.
Information Processing Letters 61(1):1-6, 1997.
(pdf, 153K, publisher's version)
- Y.Wang: The law of the iterated logarithm for p-random sequences. In: Proc.
11th IEEE Conference on Computational Complexity (CCC),
pages 180-189. IEEE Computer Society Press, 1996.
(pdf, 212K)
- K.Ambos-Spies, E.Mayordomo, Y.Wang, and X. Zheng: Resource bounded
balanced genericity, stochasticity and weak randomness. In: Proc. 13rd
STACS, pages 63-74. LNCS 1046,
1996. (pdf, 185K)
- Y.Wang: Modified data-flow models and their applications.
Chinese Journal of Software, 5(3):43-48, 1994.
(pdf,
85K; guobiao, 37K)
- G.Hu and Y.Wang: The fundamental theory for object-oriented languages.
Chinese Journal of Computer Science,
20(4):1-6, 1993. (pdf,
174K; Word, 86K)
- Y.Wang: The computing power of ordered Petri nets. Chinese
Journal of Software, 4(3):35-41,
1993. (pdf, 106K;
Word, 75K)
- S.Xu and Y.Wang: Blum's speedup theorem and the hierarchy of recursive
functions. Chinese Journal of Software, 4(4):38-43, 1993.
(pdf,
97K; Word, 80K)
- G.Hu and Y.Wang: An algorithm and its data structure from sequential US
MMCM to parallel machine. In: Computer Mathematics, pages 58-65, World
Sci. Publishing, River Edge, NJ, 1993 (MR: 94m:68041).
(tex,
18K) The software to implement the
algorithm.
- Y.Wang: Randomness and Complexity. PhD Thesis, 1996.
(pdf, 523K)
Co-authors
Over the past years I have benefited from joint works with
following co-authors:
-
Prof. Klaus Ambos-Spies, Universitaet Heidelberg, Germany
- Prof. Mike Burmester,
Florida State University
- Prof. Cris Calude,
Auckland University, New Zealand
-
Prof. Bei-tseng Chu,University of North Carolina at Charlotte
- Prof. Yvo Desmedt,
Florida State University
-
Dr. Peter Hertling, Universitaet Duisburg-Essen, Germany
- Prof Guoding Hu, Nankai University, China
-
Prof. Zhaoyu Liu,University of North Carolina at Charlotte
-
Prof. Elvira Mayordomo,Universidad de Zaragoza, Spain
-
Dr. Wolfgang Merkle, Universitaet Heidelberg, Germany
-
Prof. Xintao Wu,University of North Carolina at Charlotte
- Prof Shurun Xu, Nankai University, China
-
Prof. Yuliang Zheng,University of North Carolina at Charlotte
-
Prof. Xizhong Zheng, Brandenburgischen Technischen Universitaet Cottbus,
Germany