Publication

Papers marked with Alpha use alphabetic ordering of authors, following the convention of theoretical computer science and mathematics.

🎉 Papers by area:

Cryptography

2023

  • Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead

    Y. Liu, J. Lai, Q. Wang, X. Qin, A. Yang, and J. Weng.

    In Proceedings of The 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (Asiacrypt 2023), Guangzhou, China, Dec. 4-8, 2023.

  • Transparent registration-based encryption through blockchain

    Qin Wang, Rujia Li, Qi Wang, David Galindo, Shiping Chen, Yang Xiang

    ACM Distributed Ledger Technologies: Research and Practice, vol. 2, no. 1, pp. 1-14, 2023.

  • Time-manipulation attack: breaking fairness against proof of authority Aura

    Xinrui Zhang, Rujia Li, Qin Wang, Qi Wang

    The 2023 ACM Web Conference (WWW), Austin, USA, Apr. 30-May 4, 2023.

2022

  • Towards practical homomorphic time-lock puzzles: applicability and verifiability

    Yi Liu, Qi Wang, Siu-Ming Yiu

    The 27th European Symposium on Research in Computer Security (ESORICS'22), Copenhagen, Denmark, Sep. 26-30, 2022.

  • SoK: TEE-assisted confidential smart contract

    Rujia Li, Qin Wang, Qi Wang, David Galindo, Mark Ryan

    The 22nd Privacy Enhancing Technologies Symposium (PETS'22), Sydney, Australia, Jul. 11-15, 2022

  • Exploring unfairness on proof of authority: order manipulation attacks and remidies

    Qin Wang, Rujia Li, Qi Wang, Shiping Chen, Yang Xiang

    The 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS'22), Nagasaki, Japan, May 30-June 2, 2022

  • Frontrunning block attack in PoA Clique: a case study

    Xinrui Zhang, Qin Wang, Rujia Li, Qi Wang

    The 4th IEEE International Conference on Blockchain and Cryptocurrency (ICBC'22), online, May 2-5, 2022

  • Making Private Function Evaluation Safer, Faster, and Simpler

    Yi Liu, Qi Wang, Siu-Ming Yiu

    The 25th International Conference on Practice and Theory of Public-Key Cryptography (PKC 2022), virtually, March 8–11, 2022. [ePrintopen in new window]

2021

  • Improved Zero-Knowledge Argument of Encrypted Extended Permutation

    Yi Liu, Qi Wang, Siu-Ming Yiu

    The 17th International Conference on Information Security and Cryptology (Inscrypt'21), virtually, Aug. 12-14, 2021. [ePrintopen in new window] [Slidesopen in new window]

  • Blind Polynomial Evaluation and Data Trading

    Yi Liu, Qi Wang, Siu-Ming Yiu

    The 19th International Conference on Applied Cryptography and Network Security (ACNS'21), online, Kamakura, Japan, Jun. 21-24, 2021. [ePrintopen in new window] [Slidesopen in new window]

  • A Weak Consensus Algorithm and Its Application to High-Performance Blockchain

    Qin Wang, Rujia Li

    40th IEEE Conference on Computer Communications (INFOCOM 2021), Online, Vancouver, BC, Canada, May 10-13, 2021

  • An offline delegatable cryptocurrency system

    Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang

    The 3rd IEEE International Conference on Blockchain and Cryptocurrency (ICBC'21), online, May 3-6, 2021.

  • An Offline Delegatable Cryptocurrency System Poster

    Rujia Li, Qin Wang, Xinrui Zhang, Qi Wang, David Galindo, Yang Xiang

    28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021

  • A Weak Consensus Algorithm and Its Application to High-Performance Blockchain Poster

    Qin Wang, Rujia Li, Qi Wang

    28th Annual Network and Distributed System Security Symposium, (NDSS 2021), virtually, Feb. 21-25, 2021

2020

  • An Accountable Decryption System Based on Privacy-Preserving Smart Contracts

    Rujia Li, Qin Wang, Feng Liu, Qi Wang, David Galindo

    The 23rd International Conference on Information Security (ISC'20), Bali, Indonesia, Dec. 16-18, 2020

  • An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster

    Yi Liu, Qi Wang, Siu-Ming Yiu

    The 16th International Conference on Information Security and Cryptology (Inscrypt'20), Guangzhou, China, Dec. 11-14, 2020. [ePrintopen in new window] [Slidesopen in new window]

  • Transparent Certificate Revocation for CBE Based on Blockchain Poster

    Qin Wang, Rujia Li, Qi Wang, David Galindo

    The 41st IEEE Symposium on Security and Privacy (S&P'20), online, May 18-20, 2020

2019

  • IBRS: an efficient identity-based batch verification scheme for VANETs based on ring signature

    Feng Liu and Qi Wang

    The 2019 IEEE Vehicular Networking Conference (VNC'19), Los Angeles, California, USA, Dec. 4-6, 2019.

  • Auditable credential anonymity revocation based on privacy-preserving smart contracts

    Rujia Li, David Galindo, Qi Wang

    The 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT'19), LNCS no. 11737, Luxembourg, Sep. 26-27, 2019

Coding theory and Combinatorics

2023

  • The solution to an open problem on the bentness of Mesnager's functions

    Chunming Tang, Peng Han, Qi Wang, Jun Zhang, Yanfeng Qi

    Finite Fields and Their Applications (FFA), vol. 88, 102170, 2023.

2022

  • Steiner systems S(2,4,2m)S(2,4,2^m) supported by a family of extended cyclic codes

    Qi Wang

    Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1011-1022, 2022.

  • Two classes of LDPC codes from the space of hermitian matrices over finite fields

    Meng Zhao, Changli Ma, Yanan Feng, and Qi Wang

    Advances in Mathematics of Communications (AMC), vol. 16, no. 4, pp. 1211-1222, 2022.

  • Q-ary non-overlapping codes: a generating function approach

    Geyang Wang, Qi Wang

    IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5154-5164, 2022.

  • The subfield codes and subfield subcodes of a family of MDS codes

    Chunming Tang, Qi Wang, Cunsheng Ding

    IEEE Transactions on Information Theory (TIT), vol. 68, pp. 5792-5801, 2022.

  • A class of binary cyclic codes with optimal parameters

    Kaiqiang Liu, Qi Wang, and Haode Yan

    Cryptography and Communications (CCDS), vol. 14, pp. 663-675, 2022.

  • Infinite families of 2-designs from linear codes

    Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang

    Applicable Algebra in Engineering, Communication and Computing (AAECC), vol. 22, pp. 193-211, 2022.

  • On the size distribution of Levenshtein balls with radius oneAlpha

    Geyang Wang, Qi Wang

    The Twelfth International Workshop on Coding and Cryptography (WCC'22), Rostock, Germany, Mar. 7-11, 2022

  • Parameters and characterizations of hulls of some projective narrow-sense BCH codes

    Yuwen Huang, Chengju Li, Qi Wang, and Zongrun Du

    Designs Codes and Cryptography, vol. 90, pp. 87-106, 2022

  • Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros

    Xiaoni Du, Rong Wang, Chunming Tang, and Qi Wang

    Advances in Mathematics of Communications, vol. 16, pp. 157-168, 2022

2021

  • New construction of optimal type-II binary Z-complementary pairs

    Zhi Gu, Zhengchun Zhou, Qi Wang, and Pingzhi Fan

    IEEE Transactions on Information Theory, vol. 67, pp. 3497-3508, 2021

2020

  • Placement delivery arrays from combinations of strong edge colorings Alpha

    Jerod Michel and Qi Wang

    IEEE Transactions on Communications, vol. 68, pp. 5953-5964, 2020

  • New nonexistence results on (m,n)(m,n)-generalized bent functions Alpha

    Ka Hin Leung and Qi Wang

    Designs Codes and Cryptography, vol. 88, pp. 755-770, 2020

  • Combinatorial tt-designs from quadratic functions

    Can Xiang, Xin Ling, and Qi Wang

    Designs Codes and Cryptography, vol. 88, pp. 553-565, 2020

2019

  • Cyclotomy, difference sets, sequences with low correlation, strongly regular graphs and related geometric substructures

    Koji Momihara, Qi Wang and Qing Xiang

    In Kai-Uwe Schmidt, Arne Winterhof (Eds.) Combinatorics and Finite Fields, RICAM Radon Series on Computational and Applied Mathematics vol. 23, pp. 173-198, Berlin, Boston: De Gruyter, 2019

  • An OACF-preserving operation based on Parker's transformation Alpha

    Geyang Wang and Qi Wang,

    The 9th International Workshop on Signal Design and its Applications in Communications (IWSDA'19), Dongguan, China, Oct. 20-24, 2019.

  • Partial geometric designs from group actions Alpha

    Jerod Michel and Qi Wang

    Designs Codes and Cryptography, vol. 87, pp. 2655-2670, 2019

  • Differential spectrum of Kasami power permutations over odd characteristic finite fields

    Haode Yan, Zhengchun Zhou, Jian Weng, Jinming Wen, Tor Helleseth, and Qi Wang

    IEEE Transactions on Information Theory, vol. 65, pp. 6819-6826, 2019

  • Almost designs and their links with balanced incomplete block designs Alpha

    Jerod Michel and Qi Wang

    Designs Codes and Cryptography, vol. 87, pp. 1945-1960, 2019

  • Almost difference sets in nonabelian groups Alpha

    Jerod Michel and Qi Wang

    Designs Codes and Cryptography, vol. 87, pp. 1243-1251, 2019

  • Some new balanced and almost balanced quaternary sequences with low autocorrelation Alpha

    Jerod Michel and Qi Wang

    Cryptography and Communications, vol. 11, pp. 191-206, 2019

2017

  • LDPC codes based on the space of symmetric matrices over finite fields Alpha

    Changli Ma, Qi Wang, and Meng Zhao

    IEEE Transactions on Information Theory, vol. 63, no. 7, pp. 4332-4343, 2017

  • Some cyclic codes with prime length from cyclotomy of order 4

    Qi Wang

    Cryptography and Communications, vol. 9, no. 1, pp. 85-92, 2017

2015

  • Difference balanced functions and their generalized difference sets Alpha

    Alexander Pott and Qi Wang

    Journal of Combinatorial Theory, Series A, vol. 131, pp. 61-70, 2015

  • Skew Hadamard difference sets from Dickson polynomials of order 7 Alpha

    Cunsheng Ding, Alexander Pott, and Qi Wang,

    Journal of Combinatorial Designs, vol. 23, no. 10, pp. 436-461, 2015

2014

  • Some results on difference balanced functions Alpha

    Alexander Pott and Qi Wang

    The International Workshop on the Arithmetic of finite fields (WAIFI'14), LNCS no. 9061, Springer, Heidelberg, Gebze, Turkey, Sep. 26-28, 2014

  • Three new families of zero-difference balanced functions with applications Alpha

    Cunsheng Ding, Qi Wang, and Maosheng Xiong

    IEEE Transactions on Information Theory, vol. 60, no. 4, pp. 2407-2413, 2014

  • Sets of zero-difference balanced functions and their applications Alpha

    Qi Wang and Yue Zhou

    Advances in Mathematics of Communications, vol. 8, no. 1, pp. 83-101, 2014

  • Constructions of almost difference sets from finite fields Alpha

    Cunsheng Ding, Alexander Pott, and Qi Wang

    Designs Codes and Cryptography, vol. 72, no. 3, pp. 581-592, 2014

2013

  • On the size of Kakeya sets in finite vector spaces Alpha

    Gohar Kyureghyan, Peter Müller, and Qi Wang

    The Electronic Journal of Combinatorics, vol. 20, no. 3, #P36, 2013

  • An upper bound on the size of Kakeya sets in finite vector spaces Alpha

    Gohar Kyureghyan and Qi Wang

    International Workshop on Coding and Cryptography (WCC'13), Bergen, Norway, Apr. 15-19, 2013

2012

  • Sequences and functions derived from projective planes and their difference sets Alpha

    Alexander Pott, Qi Wang, and Yue Zhou

    The International Workshop on the Arithmetic of finite fields (WAIFI'12), LNCS no. 7369, Springer, Heidelberg, Bochum, Germany, Jul. 16-19, 2012

2011

  • The linear span of the frequency hopping sequences in optimal sets

    Qi Wang

    Designs Codes and Cryptography, vol.61, pp. 331-344, 2011

2010

  • The linear complexity of binary sequences with optimal autocorrelation (presented in part at ISIT 2010))

    Qi Wang and Xiaoni Du

    IEEE Transactions on Information Theory, vol. 56, no. 12, pp. 6388-6397, 2010

  • The linear complexity of binary sequences with optimal autocorrelation

    Qi Wang and Xiaoni Du

    The 2010 IEEE International Symposium on Information Theory (ISIT 2010), Austin, Texas, USA, Jun. 13-18, 2010.

  • The linear complexity of some binary sequences with three-level autocorrelation

    Qi Wang

    IEEE Transactions on Information Theory, vol. 56, no. 8, pp. 4046-4052, 2010

  • Optimal sets of frequency hopping sequences with large linear spans

    Qi Wang

    IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1729-1736, 2010