Position: Home >> Academic Staff >> Guoyan Zhang
¡¡

Address:

School of Computer Science and Technology,
Shandong University,
Jinan, Shandong 250100,
P.R. China.
Email: guoyanzhang@sdu.edu.cn

Born: September, 1977, Linyi, Shandong Province
Mailing Address: 27 Shanda Nanlu, Jinan, P.R.China ¡¡250100

Education:

B.S.: School of Mathematics & System Science, Shandong University, 1997-2001.
Ph.D.: School of Mathematics & System Science, Shandong University, 2003-2008


Research Interests:

Anaysis and design of the public key cryptography
Provable security theory


Professional Positions:

2001-2003: School of Information Science and Engineering, Shandong University

Main Curriculums:

Information theory: Basic theory and application, 2008-Present

Publications:

  1. Guoyan Zhang, Shaohui Wang. A Certificateless Signature and Group Signature Schemes against Malicious PKG. The 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA2008), 2008, pp. 334-341.
  2. Guoyan Zhang, Shaohui Wang. Aggregate and Separate of Signatures in Wireless Network. The Fourth International Symposium on Frontiers in Networking with Applications (FINA2008), 2008, pp. 428-433.
  3. Guoyan Zhang. A Generic Model For Proxy-Protected Proxy Cryptography. The NIST Pairing-based Cryptography Workshop, 2008.
  4. Guoyan Zhang, Xiaoyun Wang. Certificateless Encryption Scheme Secure in the Standard Model. Tsinghua Science and Technology. 2009, 14(4), pp. 452-459.
  5. Guoyan Zhang. Certificateless Threshold Decryption Scheme Secure in the Standard Model.The 2nd International Conference on Computer Science and Information Technology, 2009, vol 2, pp. 414-418.
  6. Guoyan Zhang. Practical One Time Proxy Signature Scheme. The Sixth International Symposium on Frontiers in Networking with Applications (FINA2010), 2010.
  7. Guoyan Zhang. Certificateless Encryption Scheme With Non-Black-Box Technology. The 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), 2010,pp,454-459.
  8. Puwen Wei£¬Guoyan Zhang£¬Lijiang Zhan Xiaoyun Wang. Simplied Transformation from HVSZK Arguments to Concurrent SZK Arguments Based on DDH. Tsinghua Science and Technology, 2009, 14(1), pp. 56-62.
  9. Puwen Wei£¬Guoyan Zhang£¬Lijiang Zhan Xiaoyun Wang. Simplied Transformation from HVSZK Arguments to Concurrent SZK Arguments Based on DDH. Tsinghua Science and Technology.
  10. Shihui Zheng, Guoyan Zhang. Group Key Agreement Protocol for DGP[J].China Information Security. June, 2006.
  11. Hongbo Yu, Gaoli Wang, Guoyan Zhang and Xiaoyun Wang. The Second-Preimage Attack on MD4. CANS 2005, LNCS 3810, Springer-Verlag Berlin Heidelberg. 2005. pp. 1-12.

¡¡