基本信息
王明生 男 博导 中国科学院信息工程研究所
电子邮件: wangmingsheng@iie.ac.cn
通信地址: 北京市海淀区树村路12号
邮政编码: 100093
电子邮件: wangmingsheng@iie.ac.cn
通信地址: 北京市海淀区树村路12号
邮政编码: 100093
招生信息
招生专业
083900-网络空间安全
招生方向
密码理论与技术
工作经历
工作简历
2012-01~现在, 中科院信工所, 研究员2003-01~2011-12,中科院软件研究所, 研究员1999-07~2002-12,中科院软件研究所, 副研究员
教授课程
密码学的数学基础密码学的数学基础I
专利与奖励
专利成果
( 1 ) 群组内基于不均匀随机源的随机数生成、再生、追踪方法及电子装置, 2023, 第 4 作者, 专利号: CN112835554B( 2 ) 基于不均匀随机源的随机数生成、再生方法及电子装置, 2023, 第 4 作者, 专利号: CN112631552B( 3 ) 一种轻量级区块链系统及构造方法, 2023, 第 1 作者, 专利号: CN111798234B( 4 ) 一种高效的秘密唯一领导人选举方法, 2022, 第 1 作者, 专利号: CN114444090A( 5 ) 一种恶意模型下高效的阈值安全多方计算方法, 2022, 第 1 作者, 专利号: CN114444069A( 6 ) 一种恶意模型下高效的阈值安全多方计算方法, 2022, 第 1 作者, 专利号: CN114444069A( 7 ) 一种高效的秘密唯一领导人选举方法, 2022, 第 1 作者, 专利号: CN114444090A( 8 ) 一种基于区块链的基金会系统, 2021, 第 1 作者, 专利号: CN112988887A( 9 ) 一种基于区块链的数据库管理方法及系统, 2021, 第 1 作者, 专利号: CN112835977A( 10 ) 一种轻量级区块链系统及构造方法, 2020, 第 1 作者, 专利号: CN111798234A
出版信息
发表论文
(1) YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation, IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 第 6 作者(2) Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers., ACISP 2023, 2023, 第 5 作者(3) A secure image evidence management framework using multi-bits watermark and blockchain in IoT environments, WIRELESS NETWORKS, 2023, 第 5 作者(4) Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm, Differential Analysis of ARX Block Ciphers Based on an Improved Genetic Algorithm, CHINESE JOURNAL OF ELECTRONICS, 2023, 第 4 作者(5) Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis, ACNS workshop, 2023, 第 6 作者(6) New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes, COMPUTER JOURNAL, 2022, 第 4 作者(7) Alzette 的安全性分析, 密码学报, 2022, 第 3 作者(8) On the upper bound of squared correlation of SIMON-like functions and its applications, IET INFORMATION SECURITY, 2022, 第 4 作者(9) A new method for optimal differnetial and linear trails in ARX ciphers, IEEE IT, 2021, 第 1 作者(10) New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes, COMPUTER JOURNAL, 2021, 第 4 作者(11) Observations on the Security of COMET, COMPUTER JOURNAL, 2021, 第 3 作者(12) Blockchain-based Fair and Decentralized Data Trading Model, COMPUTER JOURNAL, 2021, 第 3 作者(13) Observations on the Security of COMET, The Computer Journal, 2021, 第 3 作者(14) A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers, IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 第 4 作者(15) Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2019, 2019, 第 11 作者(16) 基于区块链的去中心化信贷系统及应用, Decentralized credit system based on blockchain and its application, 通信学报, 2019, 第 1 作者(17) ARX结构分组密码积分区分器的自动化搜索, Automatic method for searching integral distinguishers of ARX block ciphers, 通信学报, 2018, 第 2 作者(18) On the Generalization of Butterfly Structure, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 第 4 作者(19) Compact Inner Product Encryption from LWE, INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 第 3 作者(20) ${\rm{GF}}\left( {{2^{2m}}} \right)$上一个具有轻量硬件实现和已知最优密码学性质的完全置换, A Complete Permutation Over ${\rm{GF}}\left( {{2^{2m}}} \right)$ With Easy Hardware Implementation and the Best Known Cryptography Properties, ADVANCES IN MATHEMATICS (CHINA), 2017, 第 2 作者(21) Single-component small-molecule white light organic phosphors, CHEMICAL COMMUNICATIONS, 2017, 第 7 作者 通讯作者(22) CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds, WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 第 4 作者(23) Optimal Differential Trails in SIMON-like Ciphers, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2017, 第 3 作者(24) On the Construction of Lightweight Circulant Involutory MDS Matrices, FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 第 2 作者(25) A new framework for compting Grobner baes, Mathematics of Computation, 2016, 第 1 作者 通讯作者(26) Verifiable attribute-based proxy re-encryption for secure public cloud data sharing, SECURITY AND COMMUNICATION NETWORKS, 2016, 第 3 作者 通讯作者(27) Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 第 4 作者(28) A NEW FRAMEWORK FOR COMPUTING GROBNER BASES, MATHEMATICS OF COMPUTATION, 2015, 第 3 作者(29) Further remarks on multivariate polynomial matrix factorizations, LINEAR ALGEBRA AND ITS APPLICATIONS, 2015, 第 2 作者 通讯作者(30) Constructing S-boxes for Lightweight Cryptography with Feistel Structure, CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 第 2 作者(31) Constructing differentially 4-uniform permutations over GF(2(2m) ) from quadratic APN permutations over GF(2(2m+1)), DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者 通讯作者(32) A matrix approach for constructing quadratic APN functions, DESIGNS CODES AND CRYPTOGRAPHY, 2014, 第 2 作者 通讯作者(33) A matrix approach for constructing qudratic APN functions, Desin, Codes, Cryptography, 2014, 第 1 作者 通讯作者(34) 一种基于扩展加减覆盖集的隐写方法, Steganography Based on Extended Sum and Difference Covering Set, 电子学报, 2014, 第 3 作者(35) On Annihilators in Fewer Variables: Basic Theory and Applications, On Annihilators in Fewer Variables: Basic Theory and Applications, 电子学报:英文版, 2013, 第 2 作者(36) Constructing Differentially 4 Uniform Permutations from Known Ones, CHINESE JOURNAL OF ELECTRONICS, 2013, 第 2 作者(37) The Nonexistence of Permutations EA-Equivalent to Certain AB Functions, IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 第 2 作者(38) Constructing Differentially 4 Uniform Permutations from Known Ones, Constructing Differentially 4 Uniform Permutations from Known Ones, 电子学报:英文版, 2013, 第 2 作者(39) Permutation polynomials and their differential properties over residue class rings, DISCRETE APPLIED MATHEMATICS, 2013, 第 2 作者 通讯作者(40) New results on multivariate polynomial matrix factorizations, LINEAR ALGEBRA AND ITS APPLICATIONS, 2013, 第 2 作者 通讯作者(41) The Nonexistence of Permutaions EA-Equivalent to Certain AB Functions, IEEE Trans. ON Information Theory, 2013, 第 1 作者 通讯作者(42) On annihilators in fewer variables: basic theory and applications, CHINESE JOURNAL OF ELECTRONICS, 2013, 第 2 作者(43) Automatic search of truncated impossible differentials for word-oriented block ciphers, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), 2012, 第 2 作者(44) Recursive Diffusion Layers for Block Ciphers and Hash Functions, FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, (45) Permutation polynomials EA-equivalent to the inverse function over GF(2(n)), CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2011, 第 2 作者 通讯作者(46) On EA-equivalence of certain permutations to power mappings, DESIGNS CODES AND CRYPTOGRAPHY, 2011, 第 2 作者 通讯作者
科研活动
科研项目
( 1 ) XX融合XX设计, 负责人, 其他国际合作项目, 2023-01--2026-01( 2 ) 隐私保护的关键技术研究, 参与, 国家任务, 2021-01--2024-12( 3 ) XXX前沿技术研究, 负责人, 国家任务, 2020-07--2024-07( 4 ) 国家重点研发计划-XXX, 负责人, 国家任务, 2019-07--2023-10( 5 ) 基于ARX的密码算法的密码分析研究, 负责人, 国家任务, 2018-01--2021-12( 6 ) 同态密码算法的研究与实现, 负责人, 中国科学院计划, 2017-06--2018-08( 7 ) 密码向量函数的关键问题研究, 负责人, 国家任务, 2014-01--2017-12( 8 ) 973, 负责人, 国家任务, 2012-09--2017-08( 9 ) Grobner基快速计算的理论与算法的研究, 负责人, 国家任务, 2012-01--2015-12