Address:
School of Computer Science and Technology,
Shandong University,
Jinan, Shandong 250100,
P.R. China.
Email: guoyanzhang@sdu.edu.cn
Born: September, 1977, Linyi, Shandong Province
Mailing Address: 27 Shanda Nanlu, Jinan, P.R.China 250100
Education:
B.S.: School of Mathematics & System Science, Shandong University, 1997-2001.
Ph.D.: School of Mathematics & System Science, Shandong University, 2003-2008
Research Interests:
Anaysis and design of the public key cryptography
Provable security theory
Professional Positions:
2001-2003: School of Information Science and Engineering, Shandong University
Main Curriculums:
Information theory: Basic theory and application, 2008-Present
Publications:
- Guoyan Zhang,
Shaohui Wang. A Certificateless Signature and
Group Signature Schemes against Malicious PKG.
The 22nd IEEE International Conference on
Advanced Information Networking and Applications
(AINA2008), 2008, pp. 334-341.
- Guoyan Zhang,
Shaohui Wang. Aggregate and Separate of
Signatures in Wireless Network. The Fourth
International Symposium on Frontiers in
Networking with Applications (FINA2008), 2008,
pp. 428-433.
- Guoyan Zhang. A
Generic Model For Proxy-Protected Proxy
Cryptography. The NIST Pairing-based
Cryptography Workshop, 2008.
- Guoyan Zhang,
Xiaoyun Wang. Certificateless Encryption Scheme
Secure in the Standard Model. Tsinghua Science
and Technology. 2009, 14(4), pp. 452-459.
- Guoyan Zhang.
Certificateless Threshold Decryption Scheme
Secure in the Standard Model.The 2nd
International Conference on Computer Science and
Information Technology, 2009, vol 2, pp.
414-418.
- Guoyan Zhang.
Practical One Time Proxy Signature Scheme. The
Sixth International Symposium on Frontiers in
Networking with Applications (FINA2010), 2010.
- Guoyan Zhang.
Certificateless Encryption Scheme With
Non-Black-Box Technology. The 3rd IEEE
International Conference on Computer Science and
Information Technology (ICCSIT),
2010,pp,454-459.
- Puwen Wei,Guoyan
Zhang,Lijiang Zhan Xiaoyun Wang. Simplied
Transformation from HVSZK Arguments to
Concurrent SZK Arguments Based on DDH. Tsinghua
Science and Technology, 2009, 14(1), pp. 56-62.
- Puwen Wei,Guoyan
Zhang,Lijiang Zhan Xiaoyun Wang. Simplied
Transformation from HVSZK Arguments to
Concurrent SZK Arguments Based on DDH. Tsinghua
Science and Technology.
- Shihui Zheng,
Guoyan Zhang. Group Key Agreement Protocol for
DGP[J].China Information Security. June, 2006.
- Hongbo Yu, Gaoli
Wang, Guoyan Zhang and Xiaoyun Wang. The
Second-Preimage Attack on MD4. CANS 2005, LNCS
3810, Springer-Verlag Berlin Heidelberg. 2005.
pp. 1-12.