BibTeX records: Wei Gao 0007

download as .bib file

@article{DBLP:journals/jaihc/LiXGCWM24,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Kefei Chen and
                  Guilin Wang and
                  Roberto Metere},
  title        = {A certificateless signature scheme and a certificateless public auditing
                  scheme with authority trust level 3+},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {1317--1326},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12652-017-0553-x},
  doi          = {10.1007/S12652-017-0553-X},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/LiXGCWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GaoCRLZY22,
  author       = {Wei Gao and
                  Liqun Chen and
                  Chunming Rong and
                  Kaitai Liang and
                  Xianghan Zheng and
                  Jiangshan Yu},
  title        = {Security Analysis and Improvement of a Redactable Consortium Blockchain
                  for Industrial Internet-of-Things},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {9},
  pages        = {2430--2438},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab080},
  doi          = {10.1093/COMJNL/BXAB080},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/GaoCRLZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ShengTHGH19,
  author       = {Gang Sheng and
                  Chunming Tang and
                  Hongyan Han and
                  Wei Gao and
                  Xing Hu},
  title        = {Authentication of outsourced linear function query with efficient
                  updates},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Supplement},
  pages        = {10031--10039},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-017-1064-4},
  doi          = {10.1007/S10586-017-1064-4},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/ShengTHGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/LiGWCT19,
  author       = {Fei Li and
                  Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Chunming Tang},
  title        = {Double-authentication-preventing signatures revisited: new definition
                  and construction from chameleon hash},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {20},
  number       = {2},
  pages        = {176--186},
  year         = {2019},
  url          = {https://doi.org/10.1631/FITEE.1700005},
  doi          = {10.1631/FITEE.1700005},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/LiGWCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GaoWCW18,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Efficient identity-based threshold decryption scheme from bilinear
                  pairings},
  journal      = {Frontiers Comput. Sci.},
  volume       = {12},
  number       = {1},
  pages        = {177--189},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11704-016-5271-6},
  doi          = {10.1007/S11704-016-5271-6},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/GaoWCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WangXG18,
  author       = {Feng Wang and
                  Li Xu and
                  Wei Gao},
  title        = {Comments on "SCLPV: Secure Certificateless Public Verification
                  for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors"},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {854--857},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCSS.2018.2858805},
  doi          = {10.1109/TCSS.2018.2858805},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/WangXG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/GaoWCW17,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Generic Construction of Certificate-Based Signature from Certificateless
                  Signature with Provable Security},
  journal      = {Informatica},
  volume       = {28},
  number       = {2},
  pages        = {215--235},
  year         = {2017},
  url          = {https://content.iospress.com/articles/informatica/inf1143},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/GaoWCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiGXT17,
  author       = {Fei Li and
                  Wei Gao and
                  Dongqing Xie and
                  Chunming Tang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_24},
  doi          = {10.1007/978-3-319-68542-7\_24},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShengTGCH17,
  author       = {Gang Sheng and
                  Chunming Tang and
                  Wei Gao and
                  Yunlu Cai and
                  Xing Hu},
  title        = {Authentication of Outsourced Linear Function Query with Efficient
                  Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/337},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ShengTGCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpsa/LiXGYW16,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Jianhua Yan and
                  Xu An Wang},
  title        = {Round-optimal ID-based dynamic authenticated group key agreement},
  journal      = {Int. J. High Perform. Syst. Archit.},
  volume       = {6},
  number       = {3},
  pages        = {153--161},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJHPSA.2016.10001542},
  doi          = {10.1504/IJHPSA.2016.10001542},
  timestamp    = {Mon, 09 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpsa/LiXGYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/LiXGWY16,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Xu An Wang and
                  Jianhua Yan},
  title        = {An ID-based Dynamic Authenticated Group Key Agreement Scheme with
                  Optimal Round Complexity from Pairings},
  booktitle    = {10th International Conference on Complex, Intelligent, and Software
                  Intensive Systems, {CISIS} 2016, Fukuoka, Japan, July 6-8, 2016},
  pages        = {468--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISIS.2016.63},
  doi          = {10.1109/CISIS.2016.63},
  timestamp    = {Mon, 09 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/LiXGWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShengTGY16,
  author       = {Gang Sheng and
                  Chunming Tang and
                  Wei Gao and
                  Ying Yin},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {MD-\emph{VC}\({}_{\mbox{Matrix}}\): An Efficient Scheme for Publicly
                  Verifiable Computation of Outsourced Matrix Multiplication},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {349--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_23},
  doi          = {10.1007/978-3-319-46298-1\_23},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShengTGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GaoWWC15,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Kefei Chen},
  title        = {Generic Construction of Certificate-Based Encryption from Certificateless
                  Encryption Revisited},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2747--2757},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxv045},
  doi          = {10.1093/COMJNL/BXV045},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GaoWWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/YuWG15,
  author       = {Jianhua Yu and
                  Xueli Wang and
                  Wei Gao},
  title        = {Improvement and applications of secure outsourcing of scientific computations},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {763--772},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12652-015-0280-0},
  doi          = {10.1007/S12652-015-0280-0},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/YuWG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/WangLQLGLX15,
  author       = {Yilei Wang and
                  Tao Li and
                  Hairong Qin and
                  Jin Li and
                  Wei Gao and
                  Zhe Liu and
                  Qiuliang Xu},
  title        = {A brief survey on secure multi-party computing in the presence of
                  rational parties},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {6},
  number       = {6},
  pages        = {807--824},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12652-015-0299-2},
  doi          = {10.1007/S12652-015-0299-2},
  timestamp    = {Sun, 21 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/WangLQLGLX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/LiGWCW14,
  author       = {Fei Li and
                  Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Efficient identity-based threshold signature scheme from bilinear
                  pairings in standard model},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {8},
  number       = {2/3},
  pages        = {107--115},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPT.2014.066373},
  doi          = {10.1504/IJIPT.2014.066373},
  timestamp    = {Thu, 16 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/LiGWCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuWMG14,
  author       = {Jiangshan Yu and
                  Guilin Wang and
                  Yi Mu and
                  Wei Gao},
  title        = {An Efficient Generic Framework for Three-Factor Authentication With
                  Provably Secure Instantiation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {12},
  pages        = {2302--2313},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2362979},
  doi          = {10.1109/TIFS.2014.2362979},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuWMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/GaoWWX13,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Dongqing Xie},
  title        = {Controllable Ring Signatures and Its Application to E-Prosecution},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {833--841},
  year         = {2013},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=67\&\#38;id=761},
  doi          = {10.4304/JCP.8.4.833-841},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/GaoWWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/LiGWW13,
  author       = {Fei Li and
                  Wei Gao and
                  Yilei Wang and
                  Xueli Wang},
  title        = {Short Convertible Undeniable Signature From Pairing},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {12},
  pages        = {2983--2990},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.12.2983-2990},
  doi          = {10.4304/JSW.8.12.2983-2990},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/LiGWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/GaoWWL12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Fei Li},
  title        = {Round-Optimal ID-Based Blind Signature Schemes without {ROS} Assumption},
  journal      = {J. Commun.},
  volume       = {7},
  number       = {12},
  pages        = {909--920},
  year         = {2012},
  url          = {https://doi.org/10.4304/jcm.7.12.909-920},
  doi          = {10.4304/JCM.7.12.909-920},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/GaoWWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/LiGWW12,
  author       = {Fei Li and
                  Wei Gao and
                  Yilei Wang and
                  Xueli Wang},
  title        = {An Efficient Certificateless Threshold Decryption Schemes Based On
                  Pairings},
  journal      = {J. Comput.},
  volume       = {7},
  number       = {12},
  pages        = {2987--2996},
  year         = {2012},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=54\&\#38;id=819},
  doi          = {10.4304/JCP.7.12.2987-2996},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/LiGWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoWL12,
  author       = {Wei Gao and
                  Zhenyou Wang and
                  Fei Li},
  title        = {On Generic Construction for Private Designated Verifier Signatures},
  booktitle    = {Eighth International Conference on Computational Intelligence and
                  Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012},
  pages        = {497--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIS.2012.117},
  doi          = {10.1109/CIS.2012.117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoWL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/GaoCWW12,
  author       = {Wei Gao and
                  Kefei Chen and
                  Guilin Wang and
                  Xueli Wang},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Designated Condition One-Time Signatures},
  booktitle    = {Internet and Distributed Computing Systems - 5th International Conference,
                  {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7646},
  pages        = {253--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34883-9\_20},
  doi          = {10.1007/978-3-642-34883-9\_20},
  timestamp    = {Mon, 24 Jun 2024 12:10:07 +0200},
  biburl       = {https://dblp.org/rec/conf/idcs/GaoCWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWWC12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Kefei Chen},
  title        = {Efficient identity-based threshold signature scheme from bilinear
                  pairings in the standard model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWWC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCWZ12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang and
                  Guoyan Zhang},
  title        = {Efficient identity-based threshold decryption scheme from bilinear
                  pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCW12,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Provably Secure Generic Construction of Certificate Based Signature
                  from Certificateless Signature in Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {104},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/104},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWCW12a,
  author       = {Wei Gao and
                  Guilin Wang and
                  Kefei Chen and
                  Xueli Wang},
  title        = {Generic Construction of Certificate Based Encryption from Certificateless
                  Encryption Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWCW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/GaoLW09,
  author       = {Wei Gao and
                  Fei Li and
                  Xueli Wang},
  title        = {Chameleon hash without key exposure based on Schnorr signature},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {2},
  pages        = {282--285},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2007.12.001},
  doi          = {10.1016/J.CSI.2007.12.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/GaoLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaLT/GaoWWY09,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Zhenguang Yang},
  title        = {One-Round ID-Based Threshold Signature Scheme from Bilinear Pairings},
  journal      = {Informatica},
  volume       = {20},
  number       = {4},
  pages        = {461--476},
  year         = {2009},
  url          = {http://content.iospress.com/articles/informatica/info20-4-01},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informaticaLT/GaoWWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoWLC09,
  author       = {Wei Gao and
                  Zhenyou Wang and
                  Fei Li and
                  Li'e Chen},
  title        = {An Efficient Threshold Signature Scheme Without Random Oracles},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {400--404},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.40},
  doi          = {10.1109/CIS.2009.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoWLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangGCL09,
  author       = {Zhenyou Wang and
                  Wei Gao and
                  Li'e Chen and
                  Fei Li},
  title        = {Perfect Subliminal Channel in a Paring-Based Digital Signature},
  booktitle    = {2009 International Conference on Computational Intelligence and Security,
                  {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
                  Papers},
  pages        = {455--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CIS.2009.24},
  doi          = {10.1109/CIS.2009.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangGCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GaoLX08,
  author       = {Wei Gao and
                  Fei Li and
                  Banghai Xu},
  title        = {An Abuse-Free Optimistic Fair Exchange Protocol Based on {BLS} Signature},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop
                  Papers},
  pages        = {278--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.44},
  doi          = {10.1109/CIS.2008.44},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/GaoLX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/GaoWWL08,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Fei Li},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {316--331},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_21},
  doi          = {10.1007/978-3-540-85538-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/GaoWWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/GaoWX07,
  author       = {Wei Gao and
                  Xueli Wang and
                  Dongqing Xie},
  title        = {Chameleon Hashes Without Key Exposure Based on Factoring},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {109--113},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9015-9},
  doi          = {10.1007/S11390-007-9015-9},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/GaoWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWWL07,
  author       = {Wei Gao and
                  Xueli Wang and
                  Guilin Wang and
                  Fei Li},
  title        = {One-Round ID-Based Blind Signature Scheme without {ROS} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {7},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GaoWWX06,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Dongqing Xie},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Controllable Ring Signatures},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_1},
  doi          = {10.1007/978-3-540-71093-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}