Guomin Yang is a Senior Lecturer & DECRA Fellow in the School of Computing and Information Technology at the University of Wollongong.

Email: gyang AT uow.edu.au

Education

  • Ph.D. Computer Science, City University of Hong Kong, 2009
    Thesis Title: Security and Privacy in Wireless and Roaming Networks
    Supervisors: Prof. Xiaotie Deng and Dr. Duncan S. Wong
  • M.Phil. Computer Science, City University of Hong Kong, 2006
    Thesis Title: Anonymous and Authenticated Key Exchange
    Supervisors: Prof. Xiaotie Deng and Dr. Duncan S. Wong
  • B.S. Computer Science (First Class Honors), City University of Hong Kong, 2004
  • Undergraduate Study, Mathematics Department, Fudan University, Shanghai, China, 1999-2000


Research Interests

  • Applied cryptography: Authentication and key exchange protocols, Digital signature, Public key encryption
  • Wireless network security, User privacy
  • Cloud security: Searchable encryption, Cloud data integrity, Deduplication


Awards and Honors

  • ARC Discovery Early Career Researcher Award (DECRA), 2015 - 2017
  • (ISC)2 Information Security Scholarship, International Information Systems Security Certification Consortium (ISC)2, 2007
  • Outstanding Academic Performance Award, City University of Hong Kong, 2007
  • Hong Kong Jockey Club Scholarship, 2000 – 2004


Selected Publications

Journal:

  1. Willy Susilo, Guomin Yang, Fuchun Guo, Qiong Huang: Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes. Inf. Sci. 429: 349-360 (2018)
  2. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, XinyiHuang, Xiaofen Wang: Server-Aided Public Key Encryption with Keyword Search. IEEE Trans. Information Forensics and Security, accepted.
  3. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo: Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions. IEEE Trans. Information Forensics and Security 11(1): 35-45 (2016)
  4. Hoon Wei Lim, Guomin Yang: Authenticated Key Exchange Protocols for Parallel Network File Systems. IEEE Trans. Parallel Distrib. Syst. 27(1): 92-105 (2016)
  5. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang: Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Information Forensics and Security 11(4): 789-798 (2016)
  6. Jiannan Wei, Guomin Yang, Yi Mu, Kaitai Liang: Anonymous Proxy Signature with Hierarchical Traceability. Comput. J. 59(4): 559-569 (2016)
  7. Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo: BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication. IEEE Transactions on Information Forensics and Security 10(12): 2643-2652 (2015)
  8. Xinyu Fan, Guomin Yang, Yi Mu, Yong Yu. On Indistinguishability in Remote Data Integrity Checking. Comput. J. 58(4), 2015: 823-830.
  9. Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang: A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Generation Comp. Syst. 52: 95-108 (2015)
  10. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo. Ambiguous optimistic fair exchange: Definition and constructions. Theor. Comput. Sci., 562 (2015): 177-193.
  11. Guomin Yang, Chik How Tan, Yi Mu, Willy Susilo, Duncan S. Wong: Identity based identification from algebraic coding theory. Theor. Comput. Sci. 520: 51-61 (2014)
  12. Liqun Chen, Hoon Wei Lim, Guomin Yang: Cross-Domain Password-Based Authenticated Key Exchange Revisited. ACM Trans. Inf. Syst. Secur. 16(4): 15 (2014)
  13. Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie: A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Transactions on Information Forensics and Security 9(10): 1667-1680 (2014)
  14. Man Ho Au, Guomin Yang, Willy Susilo, Yunmei Zhang: (Strong) multidesignated verifiers signatures secure against rogue key attack. Concurrency and Computation: Practice and Experience 26(8): 1574-1592 (2014)
  15. Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo: On the security of auditing mechanisms for secure cloud storage. Future Generation Comp. Syst. 30: 127-132 (2014)
  16. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: A new efficient optimistic fair exchange protocol without random oracles. Int. J. Inf. Sec. 11(1): 53-63 (2012)
  17. Guomin Yang, Chik How Tan: Certificateless cryptography with KGC trust level 3. Theor. Comput. Sci. 412(39): 5446-5457, 2011.
  18. Qiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient strong designated verifier signature schemes without random oracle or with non-delegatability. Int. J. Inf. Sec. 10(6): 373-385, 2011.
  19. Guomin Yang and Chik How Tan, Certificateless Public Key Encryption: A New Generic Construction and Two Pairing-Free Schemes, Theoretical Computer Science, vol. 412, no. 8, pp. 662-674, 2011.
  20. Qiong Huang, Duncan S. Wong and Guomin Yang, Heterogeneous Signcryption with Key Privacy, Computer Journal, vol. 54, no. 4, pp. 525-536, 2011.
  21. Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo, Identity-based Strong Designated Verifier Signature Revisited, Journal of Systems and Software, vol. 84, no. 1, pp. 120-129, 2011.
  22. Guomin Yang, Qiong Huang, Duncan S. Wong, and Xiaotie Deng, Universal Authentication Protocols for Anonymous Wireless Communications, IEEE Transactions on Wireless Communications, vol. 9, no. 1, pp. 168 – 174, 2010.
  23. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, and Dongsheng Wang, A new framework for the design and analysis of identity-based identification schemes, Theoretical Computer Science, vol. 407, Nov. 2008, pp. 370 – 388.
  24. Guomin Yang, Duncan S. Wong, Huaxiong Wang and Xiaotie Deng, Two-factor mutual authentication based on smart cards and passwords, Journal of Computer and System Sciences, Vol. 74, No. 7, Nov. 2008, pp. 1160 – 1172.
  25. Guomin Yang, Duncan S. Wong and Xiaotie Deng, Formal security definition and efficient construction for roaming with a privacy-preserving extension, Journal of Universal Computer Science, 14(3), 441 - 462, 2008.
  26. Guomin Yang, Duncan S. Wong and Xiaotie Deng, Anonymous and authenticated key exchange for roaming networks, IEEE Transactions on Wireless Communications, vol. 6, no. 9, pp. 3461 – 3472, 2007.
  27. Robert W. Zhu, Guomin Yang and Duncan S. Wong, An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, Theoretical Computer Science, vol. 378, no. 2, 2007, pp. 198 – 207.

Conference:

  1. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, Yi Mu: Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample. CRYPTO (2) 2017: 517-547
  2. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo and Mingwu Zhang. Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT 2016, accepted.
  3. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. ASIACRYPT 2016, accepted.
  4. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:Strongly Leakage-Resilient Authenticated Key Exchange. CT-RSA  2016: 19-36
  5. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Xiaofeng Chen: Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key. ESORICS (2) 2015: 252-269
  6. Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo: Efficient Hidden Vector Encryption with Constant-Size Ciphertext. ESORICS 2014: 472-487
  7. Liqun Chen, Hoon Wei Lim, Guomin Yang: Cross-domain password-based authenticated key exchange revisited. INFOCOM 2013: 1052-1060
  8. Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan and Huaxiong Wang, Authenticated Key Exchange under Bad Randomness, Financial Cryptography and Data Security (FC) 2011, accepted.
  9. Guomin Yang and Chik How Tan, Strongly Secure Certificateless Key Exchange without Pairing, ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, pp. 71-79, Hong Kong.
  10. Guomin Yang and Chik How Tan, Dynamic Group Key Exchange Revisited, Ninth International Conference on Cryptology and Network Security (CANS), pp. 261 – 277, 2010, Kuala Lumpur, Malaysia.
  11. Guomin Yang, Chik How Tan, Qiong Huang, and Duncan S. Wong, Probabilistic Public Key Encryption with Equality Test, RSA Conference 2010, Cryptographers' Track (CT-RSA), pp. 119 – 131, San Francisco, USA.
  12. Tsz Hon Yuen, Qiong Huang, Yi Mu, Willy Susilo, Duncan S. Wong and Guomin Yang, Efficient Non-Interactive Range Proof, 15th International Computing and Combinatorics Conference (COCOON) 2009, Niagara Falls, New York, USA.
  13. Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo, Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles, RSA Conference 2008, Cryptographers' Track (CT-RSA), pp. 106 – 120, San Francisco, USA.
  14. Qiong Huang, Guomin Yang, Duncan S. Wong and Willy Susilo, Ambiguous Optimistic Fair Exchange, Advances in Cryptology - ASIACRYPT 2008, pp. 74 – 89, Melbourne, Australia.
  15. Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong and Guomin Yang, Traceable and retrievable identity-based encryption, International Conference on Applied Cryptography and Network Security (ACNS) 2008, pp. 94 - 110, New York, USA.
  16. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng and Dongsheng Wang, A more natural way to construct identity-based identification schemes, International Conference on Applied Cryptography and Network Security (ACNS) 2007, pp. 307 – 322, Zhuhai, China.
  17. Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, and Guomin Yang, Malicious KGC Attacks in Certificateless Cryptography, ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2007, pp. 302 – 311, Singapore.
  18. Guomin Yang, Duncan S. Wong, Xiaotie Deng and Huaxiong Wang, Anonymous signature schemes, International Workshop on Practice and Theory in Public Key Cryptography (PKC) 2006, LNCS 3958, pp. 347 – 363, New York, USA.
  19. Guomin yang, Duncan S. Wong and Xiaotie Deng, Analysis and improvement of a signcryption scheme with key privacy, Information Security Conference (ISC) 2005, LNCS 3650, pp. 218 – 232, Singapore.
  20. Guomin Yang, Duncan S. Wong and Xiaotie Deng, Deposit-case attack against secure roaming, Australasian Conference on Information Security and Privacy (ACISP) 2005, LNCS 3574, pp. 417 – 428, Brisbane, Australia.
  21. Guomin Yang, Duncan S. Wong and Xiaotie Deng, Efficient anonymous roaming and its security analysis, International Conference on Applied Cryptography and Network Security (ACNS) 2005, LNCS 3531, pp. 334 – 349, New York, USA.