Publication
Papers marked with Alpha use alphabetic ordering of authors, following the convention of theoretical computer science and mathematics.
🎉 Papers by area:
Cryptography
2023
Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead
Y. Liu, J. Lai, Q. Wang, X. Qin, A. Yang, and J. Weng.
In Proceedings of The 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2023), Guangzhou, China, Dec. 4-8, 2023.
Transparent registration-based encryption through blockchain
Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang
ACM Distributed Ledger Technologies: Research and Practice, vol. 2, no. 1, pp. 1-14, 2023.
Time-manipulation attack: breaking fairness against proof of authority Aura
Xinrui Zhang, Rujia Li, Qin Wang, Qi Wang
The 2023 ACM Web Conference (WWW), Austin, USA, Apr. 30-May 4, 2023.
2022
Towards practical homomorphic time-lock puzzles: applicability and verifiability
Yi Liu, Qi Wang, Siu-Ming Yiu
The 27th European Symposium on Research in Computer Security (ESORICS'22), Copenhagen, Denmark, Sep. 26-30, 2022.
SoK: TEE-assisted confidential smart contract
Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan
The 22nd Privacy Enhancing Technologies Symposium (PETS'22), Sydney, Australia, Jul. 11-15, 2022
Exploring unfairness on proof of authority: order manipulation attacks and remidies
Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang
The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), Nagasaki, Japan, May 30-June 2, 2022
Frontrunning block attack in PoA Clique: a case study
Xinrui Zhang, Qin Wang, Rujia Li, Qi Wang
The 4th IEEE International Conference on Blockchain and Cryptocurrency (ICBC'22), online, May 2-5, 2022
Making Private Function Evaluation Safer, Faster, and Simpler
Yi Liu, Qi Wang, Siu-Ming Yiu
The 25th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022), virtually, March 8–11, 2022. [ePrintopen in new window]
2021
Improved Zero-Knowledge Argument of Encrypted Extended Permutation
Yi Liu, Qi Wang, Siu-Ming Yiu
The 17th International Conference on Information Security and Cryptology (Inscrypt'21), virtually, Aug. 12-14, 2021. [ePrintopen in new window] [Slidesopen in new window]
Blind Polynomial Evaluation and Data Trading
Yi Liu, Qi Wang, Siu-Ming Yiu
The 19th International Conference on Applied Cryptography and Network Security (ACNS'21), online, Kamakura, Japan, Jun. 21-24, 2021. [ePrintopen in new window] [Slidesopen in new window]
A Weak Consensus Algorithm and Its Application to High-Performance Blockchain
Qin Wang, Rujia Li
40th IEEE Conference on Computer Communications (INFOCOM 2021), Online, Vancouver, BC, Canada, May 10-13, 2021
An offline delegatable cryptocurrency system
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang
The 3rd IEEE International Conference on Blockchain and Cryptocurrency (ICBC'21), online, May 3-6, 2021.
An Offline Delegatable Cryptocurrency System Poster
Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang
28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021
A Weak Consensus Algorithm and Its Application to High-Performance Blockchain Poster
Qin Wang, Rujia Li, Qi Wang
28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021
2020
An Accountable Decryption System Based on Privacy-Preserving Smart Contracts
Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo
The 23rd International Conference on Information Security (ISC'20), Bali, Indonesia, Dec. 16-18, 2020
An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster
Yi Liu, Qi Wang, Siu-Ming Yiu
The 16th International Conference on Information Security and Cryptology (Inscrypt'20), Guangzhou, China, Dec. 11-14, 2020. [ePrintopen in new window] [Slidesopen in new window]
Transparent Certificate Revocation for CBE Based on Blockchain Poster
Qin Wang, Rujia Li, Qi Wang, David Galindo
The 41st IEEE Symposium on Security and Privacy (S&P'20), online, May 18-20, 2020
2019
IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature
Feng Liu and Qi Wang
The 2019 IEEE Vehicular Networking Conference (VNC'19), Los Angeles, California, USA, Dec. 4-6, 2019.
Auditable credential anonymity revocation based on privacy-preserving smart contracts
Rujia Li, David Galindo, Qi Wang
The 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT'19), LNCS no. 11737, Luxembourg, Sep. 26-27, 2019
Coding theory and Combinatorics
2023
The solution to an open problem on the bentness of Mesnager's functions
Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi
Finite Fields and Their Applications (FFA), vol. 88, 102170, 2023.
2022
Steiner systems supported by a family of extended cyclic codes
Qi Wang
Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1011-1022, 2022.
Two classes of LDPC codes from the space of hermitian matrices over finite fields
Meng Zhao, Changli Ma, Yanan Feng, and Qi Wang
Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1211-1222, 2022.
Q-ary non-overlapping codes: a generating function approach
Geyang Wang, Qi Wang
IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5154-5164, 2022.
The subfield codes and subfield subcodes of a family of MDS codes
Chunming Tang, Qi Wang, Cunsheng Ding
IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5792-5801, 2022.
A class of binary cyclic codes with optimal parameters
Kaiqiang Liu, Qi Wang, and Haode Yan
Cryptography and Communications (CCDS), vol. 14, pp. 663-675, 2022.
Infinite families of 2-designs from linear codes
Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang
Applicable Algebra in Engineering, Communication and Computing (AAECC), vol. 22, pp. 193-211, 2022.
On the size distribution of Levenshtein balls with radius oneAlpha
Geyang Wang, Qi Wang
The Twelfth International Workshop on Coding and Cryptography (WCC'22), Rostock, Germany, Mar. 7-11, 2022
Parameters and characterizations of hulls of some projective narrow-sense BCH codes
Yuwen Huang, Chengju Li, Qi Wang, and Zongrun Du
Designs Codes and Cryptography, vol. 90, pp. 87-106, 2022
Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros
Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang
Advances in Mathematics of Communications, vol. 16, pp. 157-168, 2022
2021
New construction of optimal type-II binary Z-complementary pairs
Zhi Gu, Zhengchun Zhou, Qi Wang, and Pingzhi Fan
IEEE Transactions on Information Theory, vol. 67, pp. 3497-3508, 2021
2020
Placement delivery arrays from combinations of strong edge colorings Alpha
Jerod Michel and Qi Wang
IEEE Transactions on Communications, vol. 68, pp. 5953-5964, 2020
New nonexistence results on -generalized bent functions Alpha
Ka Hin Leung and Qi Wang
Designs Codes and Cryptography, vol. 88, pp. 755-770, 2020
Combinatorial -designs from quadratic functions
Can Xiang, Xin Ling, and Qi Wang
Designs Codes and Cryptography, vol. 88, pp. 553-565, 2020
2019
Cyclotomy, difference sets, sequences with low correlation, strongly regular graphs and related geometric substructures
Koji Momihara, Qi Wang and Qing Xiang
In Kai-Uwe Schmidt, Arne Winterhof (Eds.) Combinatorics and Finite Fields, RICAM Radon Series on Computational and Applied Mathematics vol. 23, pp. 173-198, Berlin, Boston: De Gruyter, 2019
An OACF-preserving operation based on Parker's transformation Alpha
Geyang Wang and Qi Wang,
The 9th International Workshop on Signal Design and its Applications in Communications (IWSDA'19), Dongguan, China, Oct. 20-24, 2019.
Partial geometric designs from group actions Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 2655-2670, 2019
Differential spectrum of Kasami power permutations over odd characteristic finite fields
Haode Yan, Zhengchun Zhou, Jian Weng, Jinming Wen, Tor Helleseth, and Qi Wang
IEEE Transactions on Information Theory, vol. 65, pp. 6819-6826, 2019
Almost designs and their links with balanced incomplete block designs Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 1945-1960, 2019
Almost difference sets in nonabelian groups Alpha
Jerod Michel and Qi Wang
Designs Codes and Cryptography, vol. 87, pp. 1243-1251, 2019
Some new balanced and almost balanced quaternary sequences with low autocorrelation Alpha
Jerod Michel and Qi Wang
Cryptography and Communications, vol. 11, pp. 191-206, 2019
2017
LDPC codes based on the space of symmetric matrices over finite fields Alpha
Changli Ma, Qi Wang, and Meng Zhao
IEEE Transactions on Information Theory, vol. 63, no. 7, pp. 4332-4343, 2017
Some cyclic codes with prime length from cyclotomy of order 4
Qi Wang
Cryptography and Communications, vol. 9, no. 1, pp. 85-92, 2017
2015
Difference balanced functions and their generalized difference sets Alpha
Alexander Pott and Qi Wang
Journal of Combinatorial Theory, Series A, vol. 131, pp. 61-70, 2015
Skew Hadamard difference sets from Dickson polynomials of order 7 Alpha
Cunsheng Ding, Alexander Pott, and Qi Wang,
Journal of Combinatorial Designs, vol. 23, no. 10, pp. 436-461, 2015
2014
Some results on difference balanced functions Alpha
Alexander Pott and Qi Wang
The International Workshop on the Arithmetic of finite fields (WAIFI'14), LNCS no. 9061, Springer, Heidelberg, Gebze, Turkey, Sep. 26-28, 2014
Three new families of zero-difference balanced functions with applications Alpha
Cunsheng Ding, Qi Wang, and Maosheng Xiong
IEEE Transactions on Information Theory, vol. 60, no. 4, pp. 2407-2413, 2014
Sets of zero-difference balanced functions and their applications Alpha
Qi Wang and Yue Zhou
Advances in Mathematics of Communications, vol. 8, no. 1, pp. 83-101, 2014
Constructions of almost difference sets from finite fields Alpha
Cunsheng Ding, Alexander Pott, and Qi Wang
Designs Codes and Cryptography, vol. 72, no. 3, pp. 581-592, 2014
2013
On the size of Kakeya sets in finite vector spaces Alpha
Gohar Kyureghyan, Peter Müller, and Qi Wang
The Electronic Journal of Combinatorics, vol. 20, no. 3, #P36, 2013
An upper bound on the size of Kakeya sets in finite vector spaces Alpha
Gohar Kyureghyan and Qi Wang
International Workshop on Coding and Cryptography (WCC'13), Bergen, Norway, Apr. 15-19, 2013
2012
Sequences and functions derived from projective planes and their difference sets Alpha
Alexander Pott, Qi Wang, and Yue Zhou
The International Workshop on the Arithmetic of finite fields (WAIFI'12), LNCS no. 7369, Springer, Heidelberg, Bochum, Germany, Jul. 16-19, 2012
2011
The linear span of the frequency hopping sequences in optimal sets
Qi Wang
Designs Codes and Cryptography, vol.61, pp. 331-344, 2011
2010
The linear complexity of binary sequences with optimal autocorrelation (presented in part at ISIT 2010))
Qi Wang and Xiaoni Du
IEEE Transactions on Information Theory, vol. 56, no. 12, pp. 6388-6397, 2010
The linear complexity of binary sequences with optimal autocorrelation
Qi Wang and Xiaoni Du
The 2010 IEEE International Symposium on Information Theory (ISIT 2010), Austin, Texas, USA, Jun. 13-18, 2010.
The linear complexity of some binary sequences with three-level autocorrelation
Qi Wang
IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 4046-4052, 2010
Optimal sets of frequency hopping sequences with large linear spans
Qi Wang
IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1729-1736, 2010