Effective Randomness and Ω numbers Page
Teaching | Research | Erdos | CV
Industry contributions
Selected course projects

Representative Research Areas:
For a complete list of my publications, check HERE or Google Scholar or DBLP.

  1. Survey
    • Yongge Wang. A Review of Threshold Digital Signature Schemes (pdf)
    • Yongge Wang. Encryption Based Covert Channel for Large Language Models (pdf)
    • Yongge Wang. DeepSeek Improvement on Transformers (pdf)
    • Yongge Wang. Smart Grid, Automation, and SCADA Systems Security (pdf, 200K). Chapter of "Security and Privacy in Smart Grids", 2013, CRC Press (Taylor & Grancis Group). ISBN 978-1-4398-7783-8
    • Yongge Wang. Public Key Cryptography Standards: PKCS (pdf, 150K). Chapter of "Handbook of Information Security", John Wiley & Sons, Inc., 2005 Publisher's ToC
  2. Blockchain
    • Yongge Wang. Prediction Markets, Automated Market Makers, and Decentralized Finance (DeFi). In 3rd International Conference on Mathematical Research for Blockchain Economy (MARBLE 2022). See also aRxiv, September 2020 (pdf).
    • Yongge Wang. Deterministic Blockchain BFT Protocol XP for Complete Asynchronous Network.
    • Yongge Wang. Byzantine Fault Tolerance For Distributed Ledgers Revisited. In ACM Distributed Ledger Technologies: Research and Practice , ACM 2022 (pdf or DOI).
    • Yongge Wang. The Adversary Capabilities In Practical Byzantine Fault Tolerance. In International Workshop on Security and Trust Management, (pp. 20-39). Springer LNCS 13075 (pdf or DOI).
    • Israa Alsarsour, Qutaibah Malluhi, and Yongge Wang. Free Chain: Enabling Freedom of Expression through Public Blockchains. In IEEE DependSys 2020, December 2020. (pdf)
    • Yongge Wang. Byzantine Fault Tolerance in Partially Connected Asynchronous Networks IACR ePrint, December 2019 (pdf, GitHub implementation).
    • Yongge Wang and Q.M.Malluhi. The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract. Communications of the ACM, May 2019 (pdf).
    • M. Ahmed, J. Wei, Yongge Wang, Ehab Al-Shaer: A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154. (pdf)
  3. Post-Quantum Cryptgraphy
    • Liu, Jingang, Yongge Wang, Zongxinag Yi, and Dingyi Pei. "Quantum Resistant Public Key Encryption Scheme polarRLCE." In International Conference on Algebra, Codes and Cryptology, pp. 114-128. Springer, Cham, 2019. Online
    • Haoyu Li, Renzhang Liu, Qutaibah M. Malluhi, Yanbin Pan, Yongge Wang, and Tianyuan Xie. Breaking HK17 in Practice. Proc. ISIT 2019. (pdf).
    • Yongge Wang. Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes. (pdf)
    • Yongge Wang: Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE. Proc. IEEE ISIT 2016 (Barcelona), pages 2519-2523 (pdf).
    • Yongge Wang: Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Schemes. Manuscripts 2017. (pdf)
  4. Fully Homomorphic Encryption (FHE) and garbled computation
    • Y.Wang and Q. Malluhi. Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs (pdf, PPT). Proc. 25th Information Security Conference 3--19. LNCS, Springer-Verlag, 2022.
    • Y.Wang and Q. Malluhi. Reusable Garbled Turing Machines without FHE (pdf). Proc. 3rd Conference C2SI, Codes, Cryptology and Information Security. LNCS, Springer-Verlag, 2019.
    • Y.Wang and Q. Malluhi. Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. Proc. AfricaCrypt 2024. (paper and PowerPoint Presentation).
    • Wang, Y. and Desmedt, Y. (2015). Towards fully homomorphic encryption schemes from codes. In Submitted, pages 1-1.
    • Y.Wang and Q. Malluhi. Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. ESORICS 2016, LNCS 9878. (pdf)
    • Y.Wang and Q. Malluhi and K.Khan: Garbled computation in cloud. Future Generation of Computer Systems 62(C):54--65, 2016
  5. Pseudorandomness and statistical testing. Software tool: LIL package, 432KB. The JAR file runs on all platforms. For instructions, run: java -jar LILtest.jar
    • P.Li, X.Liu, X.Yi, Y.Wang and Yongge Wang. Brownian Motion Properties of Random Bit Generators Based on Laser Chaos. Optics Express 24(14):15822-15833 (pdf, Publisher version, impact factor: 3.148 for 2015)
    • Yongge Wang: On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results (pdf)
    • Yongge Wang and Tony Nicol: Statistical Properties of Pseudo Random Sequences and Experiments with PHP and Debian OpenSSL. Computers and Security (53):44-64, September 2015. An extended abstract appeared in ESORICS 2014, LNCS 8712, pp. 454--471. (pdf) Elsevier version.
  6. LDPC based erasure codes, LT-codes, digital fountain, efficient perfectly secure secret sharing schemes and applications to cloud storage.
    • M. Paterson, Douglas R. Stinson, and Yongge Wang: On Encoding Symbol Degrees of Array BP-XOR Codes. Cryptography and Communications 8(1):19--32, 2016, 2015. (pdf)
    • Yongge Wang: Privacy-preserving data storage in cloud using array BP-XOR codes. IEEE Transactions on Cloud Computing (TCC) 3(4):425--435, 2015. (pdf)
    • Yongge Wang and Yvo Desmedt. Efficient Secret Sharing Schemes Achieving Optimal Information Rate. In IEEE Information Theory Workshop (ITW), pages 516--520, 2014. (pdf)
    • Yongge Wang: Array BP-XOR Codes for Reliable Cloud Storage Systems. Proc. IEEE ISIT 2013, pages 326--330. (pdf) and (presentation slide).
  7. Secure authenticated communications: identity based or password based (avoiding off line dictionary attacks). Two of my protocols have been included in the IEEE 1363 Standards. They are: secure remote authentication protocol with passwords SRP5 in IEEE 1363.2 and identity based key agreement WANG-KE in IEEE 1363.3. IEEE 1363 is one of the most important standards for industry cryptographic techniques. Recently, I am also interested in secure password protocols for smart cards and memory sticks (or multi factor authentication).
    • Y.Wang: Efficient Identity-Based and Authenticated Key Agreement Protocol (pdf). M.L. Gavrilova and C.J.K. Tan (Eds.) Trans. on Comput. Sci. XVII, LNCS 7420, pp. 172--197. Springer, Heidelberg (2013)
    • Z.Zhao, Z.Dong, and Y.Wang. Security Analysis of a Password-Based Authentication Protocol Proposed to IEEE 1363 Theoretical Computer Science, 352(1-3):280--287, 7 March 2006. (pdf). Publisher's version.
    • Y.Wang. Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks. In: D. Gritzalis, S. Furnell, and M. Theoharidou (Eds.): SEC 2012, IFIP AICT 376, pp. 489-500, 2012. (pdf).
  8. PSMT (perfectly secure message transmission)
    • Y.Wang and Y.Desmedt. Perfectly Secure Message Transmission Revisited. IEEE Transaction on Information Theory 54(6):2582--2595, June 2008. (pdf). Abstract in EuroCrypt'02, pages 502-517, LNCS 2332.
    • Y.Wang and Y.Desmedt: Secure communication in multicast channels. Journal of Cryptology 14(2):121--135, 2001. (pdf). Abstract in Eurocrypt 99, pages 443--455. LNCS 1592.
    • Y.Wang and Y.Desmedt. Edge-Colored Graphs with Applications To Homogeneous Faults. Information Processing Letters 111(2011) 634-641 (pdf). The publisher version.
    • Y.Desmedt, Y.Wang and M.Burmester. A complete characterization of tolerable adversary structures for secure point-to-point transmissions. In Proc. 16th ISAAC (ratio: 112/549), LNCS 3827, pages 277-287, 2005. (pdf).
  9. Critical Infrastruction Protection
    • Yongge Wang. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems. In Proc. CyberICPS 2016 (ESORICS Workshop), LNCS 10166, pages xxx-xxx, 2017. (pdf).
    • Yongge Wang. Smart Grid, Automation, and SCADA Systems Security (pdf). Invited and anonymously refereed Chapter of "Security and Privacy in Smart Grids", 2013, CRC Press (Taylor & Grancis Group). ISBN 978-1-4398-7783-8
    • Y.Wang. sSCADA: Securing SCADA Infrastructure Communications (pdf). Int. J. Communication Networks and Distributed Systems, 6(1):59--78, 2011.
    • Y.Desmedt and Y.Wang: Analyzing vulnerabilities of critical infrastructures using flows and critical vertices in AND/OR graphs. International Journal of Foundations of Computer Science, 15(1):107--125, 2004 (pdf)
    • Y.Wang. Cryptographic Challenges In Smart Grid System Security IEEE Smart Grid Newsletter, December, 2012.
  10. Algorithmic Information Theory and Complexity. Several of my papers have laid the foundation for effective randomness. In particular, we have showed that a computably enumerable infinite string is Martin-Lof random if and only if it is the halting probability of the universal Turing machine. Furthermore, I have showed the separation of several randomness concepts such as recursive randomness and recursively constructive randomness (Schnorr randomness). I have a separate Omega Randomness page.
    • C.Calude, P.Hertling, B.Khoussainov, and Y.Wang: Recursively enumerable reals and Chaitin's Ω numbers. Theoretical Computer Science 255:125--149, 2001. (pdf)
    • Y.Wang: Genericity, randomness, and polynomial time approximations. SIAM Journal on Computing, 28(2):394-408, 1999. (pdf)
    • Y.Wang: A separation of two randomness concepts. Information Processing Letters, 69(3):115--118, 1999. (pdf)
    • Y.Wang: Resource bounded randomness and computational complexity. Theoretical Computer Science 237(1-2):33--55, 2000. (pdf)
    • Y.Wang: Randomness, stochasticity, and approximations. Theory of Computing Systems 32:517--529, 1999. (pdf)
    • Y.Wang: NP-hard sets are superterse unless NP is small. Information Processing Letters 61(1):1-6, 1997. (pdf)
    • Y.Wang: Randomness and Complexity. PhD Thesis, 1996. (pdf)
Industry Standards:
  • Secure Remote Password Authentication Protocol SRP5. Included in IEEE 1363.2 standards (SRP5). There is a EC-SRP (SRP5) Android Library implementation here. and a Java Card Applet implementation here. (both by Michael Holzl).
  • Identity Based Authenticated Key Agreement Protocol WANG-KE. Included in IEEE 1363.3) Standards (WANG-KE).
  • S.Blake-Wilson, G. Karlinger, T. Kobayashi, and Y.Wang: ECDSA with XML-Signature Syntax, IETF RFC 4050, 2005.

Effective Randomness and Ω numbers Page
Teaching | Research | Erdos | CV
Industry contributions
Selected course projects

J1 Visitors from China


Please use my GMAIL account at: yongge.wang-at-gmail-dot-com