Dr. Mingwu Zhang's Home Page    

Dr. Mingwu Zhang (ジヤン ミンプ) 

               (張明武)

 

Tel: 81-92-802-4415

Office: #106, Mathematics Bld.

mwzhang[at]imi.kyushu-u.ac.jp

http://imi.kyushu-u.ac.jp/~takagi/en/

 

 

Kyushu University

Institute of Mathematics for Industry

744, Motooka, Nishi-ku,

Fukuoka

819-0395

Japan

 




Currently, I am a JSPS postdoctoral fellow at Prof. Tsuyoshi Takagi's group, Institute of Mathematics for Industry in Kyushu University, Japan. The fellowship is supported by JSPS(Japan Society of the Promotion of Science) project of Japan. My research interests are in the area of applied cryptography and network security, distributed trust and privacy protection, secure and fair multiparty comptation etc. Especially, I am interested in design and analysis of privacy-carrying cryptographic technology with applications to decentrilized trust, security and privacy.

Applied Cryptographic

Trust, Security and Privacy (TSPs)

Secure Computation and Protocol (SMCs)

Functional Encryption (FE)


 

Book Contributions:

  1. Deqin Xiao, Mingwu Zhang, Min Zhou, Chunhua Pan. "Theory and Application for Advanced Computer Network". 2005.9, ISBN:978-7118-04107-1
  2. Mingwu Zhang, Chapter of "Advanced Interface Technology" in "Advaned Computer Interfaces and Communications", 2003.

 

To be of publication:

  1. Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi, "Anonymous encryption with partial-order subset delegation functionality", Prosec2011, to appear.
  2. Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, "Efficient identity-based signcryption in the standard model", Prosec2011, to appear.
  3. Youwen Zhu, Liusheng Huang, Tsuyoshi Takagi, Mingwu Zhang, “Privacy-reserving OLAP for accurate answer”, Journal of Circuits, Systems, and Computers (JCSC), to appear.

 

Publications in Journals:

  1. Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, "Group-oriented setting's multisigncryption scheme Wwth threshold designcryption", Information Sciences, Elsevier,181(2011): 4041-4050.
  2. Mingwu Zhang, Bo Yang, Jintao Yao, and Wenzheng Zhang. "Cryptanalysis and design of signature schemes with identity ambiguity in the standard model". Journal on Communications, 2011, (5): 40~46 . (in Chinese)
  3. Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, and Tsuyoshi Takagi, "Cryptanalysis and fixed of short signature scheme without random oracle from bilinear parings", International Journal of Network Security, 12(3): 130-136 .
  4. Yajun Jiang, Bo Yang, Mingwu Zhang, Xuri Chen. "Secure computation protocol for private matching and inclusion relation against outsourced database system", Computer Sciences, 2011,38(3):120-122,135 (in Chinese)
  5. Ximing Li, Bo Yang, Mingwu Zhang, "Provably semi-statically secure broadcast signcryption scheme with small ciphertext". ICIC Express Letters, 2011.3: 803-809.
  6. Mingwu Zhang, Bo Yang, Wenzheng Zhang, and Tsuyoshi Takagi, "Multibiometric based secure encryption and authentication scheme with fuzzy extractor", International Journal of Network Security,12(1): 50-57.
  7. Yajun Jiang, Bo Yang, Mingwu Zhang, "A Classified Credential Selection Scheme with Disclosure-minimizing Privacy". Journal of Digital Content Technology and its Applications, 4(9): 201-211 (2010)
  8. Ximing Li, Bo Yang, Mingwu Zhang, "Construction and performance of robust fingerprint key extractor". Journal of Information & Computational Science, 7(6), pp. 1297-1309, 2010.
  9. Ximing Li, Mingwu Zhang,"Construction and security of fuzzy extractor." , Journal of Chongqin Univ, 24(8), pp. 49-53, 2010.
  10. Mingwu Zhang, Bo Yang, Wenzheng Zhang, "Efficient short signcryption scheme with forward security and ciphertext anonymity".  Journal of Beijing University of Posts and Telecommunications, 2010,33(4):131-134 (in Chinese)
  11. Yajun Jiang, Mingwu Zhang, Bo Yang,Wenzheng Zhang, "An online ordering scheme for privacy protection", Journal of Hunan University(Natural Sciences), 2010, 37(3): 77-79. (in Chinese)
  12. Mingwu Zhang, Bo Yang, Min Zhou, Wenzheng Zhang, "Analysis and improvement of two signcryption schemes", Chinese Journal of Electronic and Information, 2010, 32(7):1731-1736 (in Chinese)
  13. Mingwu Zhang, Bo Yang, Shenlin Zhu, Wenzheng Zhang, “Ordered semiring-based trust establish model with risk evaluating”, International Journal of Network Security, Vol.8, No.2, pp.101-106, 2009.
  14. Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang, “Policy-based signature scheme for credential privacy protecting in trust negotiation”, Journal of Electornic & Information Technology, Vol.31, No.1, pp.224-229, 2009 .
  15. Mingwu Zhang, Bo Yang, Shenglin Zhu, “Privacy preserving self-certified signcryption scheme in trusted modules”,   Journal of Beijing University of Posts and Telecommunications, Vol. 32, No.1, pp.60-65, 2009 (In Chinese)
  16. Mingwu Zhang, Bo Yang, Yong Yu, “Distributed trust model based on D-S theory”, Journal of Wuhan University(Natural Scienct Edition), Vol.55, No.1, pp.41-44, 2009 (In Chinese)
  17. Mingwu Zhang, Bo Yang, Gangsheng Xie, “Efficient stateless directed transitive signature scheme in ubiquitous environments”, Journal of Informational and Computational Science, Vol5, No.5, pp.2131-2136, 2008.
  18. Mingwu Zhang, Bo Yang, Wenzheng Zhang, “Self-constraint reputation updating model”, Computer Engineering, Vol.33, No.18, pp.145-147, 2007.
  19. Mingwu Zhang, Bo Yang, Wenzheng Zhang. “Weighted strongest disjoint path search algorithm in trust management”, Application Research of Computers, Vol. 24, No. 9, pp.127-130, 2007.
  20. Mignwu Zhang, Bo Yang, Wenzheng Zhang, “Delegation graph search algorithms based DAG in distributed trust management”, Computer Engineering and Applications, Vol.43, No.4, pp.125-129, 2007.
  21. Yong Yu, Bo Yang, Fagen Li, Mingwu Zhang, “An efficient proxy ring signature scheme”, Journal of Beijing University of Posts and Telecommunications, Vol.30, No.3, pp.23-27, 2007 (In Chinese)
  22. Jintao Yao, Yaping Lin, Mingwu Zhang, Diaosheng Tong, “An improving strength pareto evolutionary algorithm based on bayesian network with decision graphs”, Chinese Journal of Computers, Vol.28, No.12, pp.1193-1199, 2005 (In Chinese)


Conference Papers:
  1. Mingwu Zhang and Tsuyoshi Takagi. "GeoEnc: Geometric Area based Keys and Policies in Functional Encryption Systems", U. Parampalli and P. Hawkes (Eds.): ACISP 2011, LNCS 6812, pp. 241-258. Springer, Heidelberg (2011)
  2. Mingwu Zhang, Tsuyoshi Takagi and Bo Yang. "Dual-verifiers dvs with message recovery for tolerant routing in wireless sensor networks", M. Chau et al. (Eds.): PAISI 2011, LNCS 6749, pp. 71-84. Springer, Heidelberg (2011)
  3. Jintao Yao,Bo Yang, Mingwu Zhang and Yuyan Kong, "PSO with predatory escaping behavior and its application on shortest path routing problems", ISA2011, IEEE, 2011.
  4. Jintao Yao,Bo Yang, Mingwu Zhang and Yuyan Kong," Multiobjective Particle Swarm Optimization with Predatory Escaping Behavior ", ISA2011, IEEE, 2011.
  5. Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen,and Wenzheng Zhang, "Towards confidentiality of ID-based signcryption schemes under without random oracle model", PAISI 2010, LNCS 6122, pp.77-83, 2010.
  6. Tao Lei, Bo Yang, Mingwu Zhang, Min Zhou, "An anonymous credential system based on short signature scheme". JWIS2010, Aug.4-6, Guangzhou, pp.293-301, 2010.
  7. Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, and Tsuyoshi Takagi, "Fuzzy biometric signcryption scheme with bilinear pairings in the standard model", PAISI 2010, LNCS 6122, pp.98-107, 2010.
  8. Yajun Jiang, Bo Yang, Mingwu Zhang, Jintao Yao, "Digital rights management scheme with privacy protection". JWIS2010, Aug.4-6, Guangzhou, pp. 287-292 , 2010.
  9. Shenglin Zhu, Mingwu Zhang , Bo Yang, "Decision-making based on risk attribute in decentralize system", ICFCC10, 2010.
  10. Shenglin Zhu, Mingwu Zhang, Bo Yang, "A mediator-based certified reputation scheme", ICCNS10, pp. 141-144, 2010.
  11. Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang, “Analysis and improvement of an ID-based anonymous signcryption model”, International Conference on Intelligent Computing, ICIC 2009, LNCS 5474, pp.433-442, 2009.
  12. Yusheng Zhong, Mingwu Zhang, Bo Yang, Wenzheng Zhang, "Enhancing privacy preservation framework in distributed trust model", DCABES09, 2009.
  13. Ximing Li, Bo Yang, Mingwu Zhang, “New construction of fuzzy identity-based encryption,” WASE International Conference on Information Engineering, ICIE 2009 , IEEE-CS, 2009.
  14. Mingwu Zhang, Bo Yang, Shenglin Zhu and Wenzheng Zhang, “Efficient secret authenticatable signcryption scheme with identity privacy,” IEEE Intelligence and Security Informatics Conference, IEEE-ISI 2008, LNCS 5075, pp.126-137, 2008.
  15. Mingwu Zhang,Bo Yang, Shenglin Zhu, Wenzheng Zhang, “Assertions signcryption scheme in decentralized autonomous trust environments,” The 5th International Conference on Autonomic and Trusted Computing, ATC 2008, LNCS 5060, pp.516-526, 2008.
  16. Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang, “Using trust metric to detect malicious behaviors in WSNs”, 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2007, IEEE-CS, pp.104-108, 2007.
  17. Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang, “A semiring privacy protect model,” 2007 IFIP International Conference on Network and Parallel Computing, NPC 2007, IEEE-CS, pp.255-259, 2007.
  18. Yong Yu, Bo Yang, Xinyi Huang, and Mingwu Zhang,“Efficient identity-based signcryption scheme for multiple receivers,” The 4th International Conference on Autonomic and Trusted Computing, ATC 2007, LNCS 4610, pp.13–21, 2007.
  19. Mingwu Zhang, Bo Yang, Shenglin Zhu,"Proxy caching scheme based multi-list structure mixed policies". International Conference on Distributed Computing and Applications for Business, Engineering and Sciences DCABES’07, 2007.
  20. Mingwu Zhang, Bo Yang, Wenzhang Zhang, “Web topology search based on multithread recursive model”, International Conference on Computer Science and Education, ICCSE 2007, pp.704-707, 2007.
  21. Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang, “Trust-based distributed authentication middleware in ubiquitous mobile environments,” Third International Conference on Natural Computation, ICNC 2007, IEEE-CS, pp.814-818, 2007.


Softwares Registration:
  1. "T-mail: Trusted Mail System Software (T-mail V1.0)";
  2. "A Mobiled handset controlled PC and Project Operating and Communicating Platform(MProject V1.0)";
  3. "Scau Logic Circuit Simulator Software(DigiLogic V1.0)";
  4. "Artdraw Printwork and Needlepoint Design Software (ARTDRAW V1.0)";
  5. "Internet Phone GateKeeper System(GateKeeper V1.0)";
  6. "Extraphone Internet Phone Software(Extraphone V1.0)";


Patents:
  • # CN101488911, # CN101420805, #200912368623.5, #200910192912.2, #200920236763.0, #200910211319.8, #CN201555840U, #CN201585309U

Professional Activities
:
  1. Organization Committee Chair: JWIS2010
  2. Program Committee: ISA2009, JWIS2010, ISA2011, CISIS2011,JWIS2011
  3. External Reviewer for Journals
    Information Sciences, IEICE Trans., Journal of communications, Journal of Engineering and Computer Innovations, Journal of Circuits, Systems, and Computers, International Journal of Distributed Sensor Networks, Internation Journal of Network Security, International Journal of Digital Content Technology and its Applications, Information Process letter, Journal of Electronic and Information(Chinese), Journal of Simulations(Chinese), International Journal of Communication Systems, RUASP Journal of Wireless Networks and Communication
  4. External Reviewer for International Conferences
    CIS06, CTCIS06, CCICS07, CWSD07,CWSD07,CCNIS07, ISDPE07, CTCIS08, ICCIT2009, ICIS2009, NCM2009, NISS2009, ICDL2008, JCIC09, ICICS09, InsCrypt09, ICISC09, JWIS10,ISPEC09, ACNS10, IWSEC10, SecureComm10, InsCrypt10, ASIACCS11, Ispec2011, ICCCT-2011, ProvSec2011, ChinaCrypt2011,ISC011,...


Grant Projects (ongoing):
  1. Privacy-carrying cryptographic and its application to decentrilized trust management. Support by JSPS fellowship project, Japan, 2010-2012.
  2. Research on sensitive information protect in trusted network environments. Foundation of National Laboratory for Modern Communications, 2009-2011.
  3. Trust model with privacy preservation in internet of things. Support by Natural Science Foundation of Guangdong Province, China, 2010-2012.
  4. Effect factors and evaluation models of trust in electronic commence. Foundation for Distinguished Young Talents in Higher Education of Guangdong, 2010-2011.
  5. Bioinfomation grid and its security. International cooperation fundation of SCAU, 2009-2010.
  6. Paltform and construction of biological molecular grid. Novel principle support project of scau, 2010-2011.

Last updated: June. 26, 2011.