魏普文
-
教授
博士生导师
硕士生导师
- 性别:男
- 毕业院校:山东大学
- 学历:博士研究生毕业
- 学位:博士
- 在职信息:在职
- 所在单位:网络空间安全学院(研究院)
- 入职时间: 2010-05-13
- 办公地点:Zhixin Building B 1222
访问量:
-
[1]
吴世晨.
Improving Privacy of Anonymous Proof-of-Stake Protocols.
2023.
-
[2]
刘丽.
When MPC in the Head Meets VC.
2023.
-
[3]
.
CTA: Confidential Transactions Protocol with State Accumulator.
2023.
-
[4]
司淑敏.
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator.
COMPUTER JOURNAL,
2023.
-
[5]
.
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives.
2022.
-
[6]
.
Compressed Zero-Knowledge Proofs for Lattice-Based Accumulator.
The Computer Journal,
2023.
-
[7]
Quan Yuan , Puwen Wei , Keting Jia and Haiyang Xue.
Analysis of the Blockchain Protocol against Static Adversarial Miners Corrupted By Long Delay Attack.
SCIENCE CHINA Information Sciences,
volume 63, Article number: 130104,
2020.
-
[8]
Zhengyu Zhang , Puwen Wei and Haiyang Xue.
Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting.
CANS 2019,
LNCS 11829,
141-160,
2019.
-
[9]
Aijun Ge and Puwen Wei.
Identity-Based Broadcast Encryption with Efficient Revocation.
PKC 2019,
LNCS 11443,
405-435,
2019.
-
[10]
Puwen Wei , Quan Yuan and Yuliang Zheng.
Security of the Blockchain Against Long Delay Attack.
ASIACRYPT 2018,
LNCS 11274,
250-275,
2018.
-
[11]
Puwen Wei , Wei Wang , Bingxin Zhu and Siu Ming Yiu.
Tightly-Secure Encryption in the Multi-User, Multi-Challenge Setting with Improved Efficiency.
ACISP 2017,
LNCS 10342,
3-22,
2017.
-
[12]
Bingxin Zhu , Puwen Wei and Mingqiang Wang.
Adaptive Security of Broadcast Encryption, Revisited.
Security and Communication Networks,
2017,
https://doi.org/10.1155/2017/1404279,
2017.
-
[13]
Puwen Wei and Yuliang Zheng.
On the Construction of Public Key Encryption with Sender Recovery.
International Journal of Foundations of Computer Science, An extended abstract of this paper appears at EuroPKI 2012,
26,
1–31,
2015.
-
[14]
Puwen Wei , Yuliang Zheng and Wei Wang.
Multi-recipient Encryption in Heterogeneous Setting.
ISPEC 2014,
LNCS 8434,
462-480,
2014.
-
[15]
Puwen Wei and Yuliang Zheng.
Efficient Public Key Encryption Admitting Decryption by Sender.
EuroPKI 2012,
LNCS 7868,
37-52,
2013.
-
[16]
Puwen Wei , Yuliang Zheng and Xiaoyun Wang.
Public Key Encryption for the Forgetful.
Cryptography and Security: From Theory to Applications,
LNCS 6805,
185-206,
2012.
-
[17]
Puwen Wei , Xiaoyun Wang and Yuliang Zheng.
Public Key Encryption without Random Oracle Made Truly Practical (Full Version).
Computers and Electrical Engineering,
38,
975-985,
2012.
-
[18]
Puwen Wei , Xiaoyun Wang and Yuliang Zheng.
Public Key Encryption without Random Oracle Made Truly Practical (Extended Abstract).
ICICS2009,
LNCS 5927,
107-120,
2009.
-
[19]
Puwen Wei , Guoyan Zhang , Lijiang Zhang and Xiaoyun Wang.
Simplified Transformation from HVSZK Arguments to Concurrent SZK Arguments Based on DDH.
Tsinghua Science and Technology,
14,
255-263,
2009.
-
[20]
Puwen Wei , Mingqiang Wang and Wei Wang.
A Note on Shacham and Waters Ring Signatures.
2007 International Conference on Computational Intelligence and Security,
652-656,
2007.