Academic Profile : Faculty
Prof Wang Huaxiong
Professor, School of Physical & Mathematical Sciences - Division of Mathematical Sciences
Co-Director, The National Centre for Research in Digital Trust (NCDT)
Deputy Director, Strategic Centre for Research in Privacy-Preserving Technologies & Systems (SCRIPTS)
Email
External Links
Journal Articles
(Not applicable to NIE
staff as info will be
pulled from PRDS)
(Not applicable to NIE
staff as info will be
pulled from PRDS)
Highly Cited:
Yang, G., Wong, D. S., Wang, H., & Deng, X. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160-1172.
Poschmann, A., Moradi, A., Khoo, K., Lim, C. W., Wang, H., & Ling, S. (2011). Side-channel resistant crypto for less than 2,300 GE. Journal of Cryptology, 24(2), 322-345.
Wang, H., Xing, C., & Safavi-Naini, R. (2003). Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory, 49(4), 866-872.
Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223-234.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419-440.
Yuan, J., Ding, C., Wang, H., & Pieprzyk, J. (2008). Permutation polynomials of the form (xp− x+ δ) s+ L (x). Finite Fields and Their Applications, 14(2), 482-493.
Safavi-Naini, R., & Wang, H. (1999). Multireceiver authentication codes: models, bounds, constructions, and extensions. Information and Computation, 151(1-2), 148-172.
Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193-207.
Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 18(3), 1019-1032.
Sun, H. M., He, B. Z., Chen, C. M., Wu, T. Y., Lin, C. H., & Wang, H. (2015). A provable authenticated group key agreement protocol for mobile environment. Information Sciences, 321, 224-237.
Click here for more publications.
Recent Publication:
Xu, Y., Safavi-Naini, R., Nguyen, K., & Wang, H. (2022). Traceable policy-based signatures and instantiation from lattices. Information Sciences, 607, 1286-1310.
Zhang, X., Huang, C., Gu, D., Zhang, J., Xue, J., & Wang, H. (2022). Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. Journal of Systems Architecture, 127, 102508.
Ding, J., Ke, P., Lin, C., & Wang, H. (2022). Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Information Sciences, 593, 398-414.
Jiang, S., Chee, Y. M., Ling, S., Wang, H., & Xing, C. (2022). A new framework for deniable secure key exchange. Information and Computation, 104866.
Huang, C., Zhao, Y., Chen, H., Wang, X., Zhang, Q., Chen, Y., ... & Lam, K. Y. (2021). ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet of Things Journal, 9(6), 4330-4342.
Yang, G., Wong, D. S., Wang, H., & Deng, X. (2008). Two-factor mutual authentication based on smart cards and passwords. Journal of Computer and System Sciences, 74(7), 1160-1172.
Poschmann, A., Moradi, A., Khoo, K., Lim, C. W., Wang, H., & Ling, S. (2011). Side-channel resistant crypto for less than 2,300 GE. Journal of Cryptology, 24(2), 322-345.
Wang, H., Xing, C., & Safavi-Naini, R. (2003). Linear authentication codes: bounds and constructions. IEEE Transactions on Information Theory, 49(4), 866-872.
Zhang, X., Wang, H., & Xu, C. (2019). Identity-based key-exposure resilient cloud storage public auditing scheme from lattices. Information Sciences, 472, 223-234.
Lee, H. T., Ling, S., Seo, J. H., & Wang, H. (2016). Semi-generic construction of public key encryption and identity-based encryption with equality test. Information Sciences, 373, 419-440.
Yuan, J., Ding, C., Wang, H., & Pieprzyk, J. (2008). Permutation polynomials of the form (xp− x+ δ) s+ L (x). Finite Fields and Their Applications, 14(2), 482-493.
Safavi-Naini, R., & Wang, H. (1999). Multireceiver authentication codes: models, bounds, constructions, and extensions. Information and Computation, 151(1-2), 148-172.
Zhang, X., Tang, Y., Wang, H., Xu, C., Miao, Y., & Cheng, H. (2019). Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage. Information Sciences, 494, 193-207.
Zhang, X., Xu, C., Wang, H., Zhang, Y., & Wang, S. (2019). FS-PEKS: Lattice-based forward secure public-key encryption with keyword search for cloud-assisted industrial Internet of Things. IEEE Transactions on Dependable and Secure Computing, 18(3), 1019-1032.
Sun, H. M., He, B. Z., Chen, C. M., Wu, T. Y., Lin, C. H., & Wang, H. (2015). A provable authenticated group key agreement protocol for mobile environment. Information Sciences, 321, 224-237.
Click here for more publications.
Recent Publication:
Xu, Y., Safavi-Naini, R., Nguyen, K., & Wang, H. (2022). Traceable policy-based signatures and instantiation from lattices. Information Sciences, 607, 1286-1310.
Zhang, X., Huang, C., Gu, D., Zhang, J., Xue, J., & Wang, H. (2022). Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. Journal of Systems Architecture, 127, 102508.
Ding, J., Ke, P., Lin, C., & Wang, H. (2022). Bivariate polynomial-based secret sharing schemes with secure secret reconstruction. Information Sciences, 593, 398-414.
Jiang, S., Chee, Y. M., Ling, S., Wang, H., & Xing, C. (2022). A new framework for deniable secure key exchange. Information and Computation, 104866.
Huang, C., Zhao, Y., Chen, H., Wang, X., Zhang, Q., Chen, Y., ... & Lam, K. Y. (2021). ZkRep: A Privacy-Preserving Scheme for Reputation-Based Blockchain System. IEEE Internet of Things Journal, 9(6), 4330-4342.