Home

Professor Yi Mu received his PhD from the Australian National University in 1994. He is a full professor in the School of Computing and Information Technology, University of Wollongong. He was the Head of School of Computer Science and Software Engineering, University of Wollongong, during 2011 and 2015, before the school had its new name: School of Computing and Information Technology, in 2015. Prior to joining University of Wollongong in 2003, he was a senior lecturer in the Department of Computing, Macquarie University. He also worked in Department of Computing and IT, University of Western Sydney as a lecturer. His current research interest includes cryptography, network security, access control, and computer security. He also previously worked in the areas of quantum cryptography, quantum computers, atomic computations, and quantum optics.

Professor Mu is Editor-in-Chief of International Journal of Applied Cryptography and serves as associate editor or guest editor for many international Journals. He has served in program committees for a number of international security conferences, including ACM CCS, ACM AisaCCS, ESORICS, ACISP, CANS, EuroPKI, ICICS, ICISC, ProvSec, ISPEC, etc. He is a senior member of the IEEE and a member of the IACR.

Further information of Professor Mu can be found at https://www.uow.edu.au/~ymu/index.html

Publications:

  1. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang, and Yi Mu, Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample, Crypto 2017, Lecture Notes in Computer Science. Springer
  2. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, and Mingwu Zhang, ``Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions," Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.844-876, 2016
  3. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai, and Guomin Yang, ``Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction," Asiacrypt 2016, Lecture Notes in Computer Science 10031, Springer, pp.745-776, 2016
  4. Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, ``Strongly Leakage-Resilient Authenticated Key Exchange," Lecture Notes in Computer Science 9610, CT-RSA 2016, pp.19-36, 2016.
  5. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships," Fast Software Encryption (FSE 2010), Lecture Notes in Computer Science 6147, Springer Verlag, 2010, pp. 192-211.
  6. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu, Yang Xiao, ``Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting," 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), Lecture Notes in Computer Science 6056, 2010, pp.124-141.
  7. Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Yi Mu, Kwangjo Kim. ``Three-round Abuse-free Optimistic Contract Signing With Everlasting Secrecy," Financial Cryptography and Data Security (FC 2010), Lecture Notes in Computer Science 6052, Springer Verlag, 2010, pp. 304-311.
  8. Qianhong Wu, Yi Mu, Willy Susilo, Josep Domingo, and Qin Bo, ``Asymmetric Group Key Agreement," Advances in Cryptology - Eurocrypt 2009, Lecture Notes in Computer Science 5479, Springer Verlag, pp153-170
  9. Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu, ``Enhanced Target Collision Resistant Hash Functions Revisited," Fast Software Encryption (FSE 2009), Lecture Notes in Computer Science 5665, Springer Verlag, pp. 327-344.
  10. Man Ho Au and Patrick P. Tsang and Willy Susilo and Yi Mu, ``Dynamic Multiversal Accumulators and Their Application to Attribute-Based Anonymous Credential Systems," CT-RSA 2009, Lecture Notes in Computer Science 5473, Springer Verlag, pp. 295-308.
  11. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.247-261.
  12. Man Ho Au, Willy Susilo, and Yi Mu, ``Practical Anonymous Divisible E-Cash From Bounded Accumulators," Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science 5143, Springer Verlag, 2008, pp.287-301.
  13. Man Ho Au, Qianhong Wu, Willy Susilo and Yi Mu, ``Compact E-Cash from Bounded Accumulator," RSA Conference 2007, Cryptographers' Track (CT-RSA 2007), Lecture Notes in Computer Science, Springer-Verlag, 2007, pp. 178-195.
  14. Huafei Zhu, Willy Susilo and Yi Mu. ``Multi-party stand-alone and setup-free verifiably committed signatures." International Conference on Theory and Practice of Public-Key Cryptography 2007 (PKC 2007), Lecture Notes in Computer Science 4450, Springer Verlag, 2007, pp. 134-149
  15. Yi Mu, Jennifer Seberry, and Yuliang Zheng, "Shared cryptographic bits via quantized quadrature phase amplitudes of light," Journal of Optics Communications, Vol 123, pp. 344-352, 1996.
  16. Yi Mu and Craig M. Savage, ``One-atom lasers," Physical Review A, 46, 5944 (1992)