头像

姓名:吴戈

职称:讲师

电话:

办公室:无线谷6327

个人主页:

邮箱:gewu@seu.edu.cn

教育背景

博士(计算机科学),澳大利亚伍伦贡大学,2019

工学硕士(计算机软件与理论硕士),南京师范大学,2015

学术兼职

研究领域

密码学,信息安全

研究概况

博士期间从事公钥密码学的理论与实践研究,具体包括公钥密码方案的可证明安全和隐私保护的云审计技术。

研究课题

奖励与荣誉

课程信息

学术成果

第一作者论文:

1.Ge Wu, Futai Zhang, Limin Shen, Fuchun Guo, Willy Susilo: Certificateless aggregate signature scheme secure against fully chosen-key attacks. Information Sciences. 514: 288-301 (2020)

2.Ge Wu, Fuchun Guo and Willy Susilo: Generalized Public-Key Cryptography with Tight Security. Information Sciences. 504: 561-577 (2019)

3.Ge Wu, Jianchang Lai, Fuchun Guo, Willy Susilo and Futai Zhang. Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions. Journal of Computer Science and Technology. 34(6): 1366-1379 (2019)

4.Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo: Threshold Privacy-PreservingCloud Auditing with Multiple Uploaders. International Journal of Information Security. 18(3): 321-331 (2019)

5.Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo: Privacy-Preserving Certificateless Cloud Auditing with Multiple Uploaders. Wireless Personal Communications.106(3): 1161-1182 (2019)

6.Ge Wu, Yi Mu, Willy Susilo, Fuchun Guo: Privacy-Preserving Cloud Auditing with Multiple Uploaders. ISPEC 2016: 224-237

其他成果:

7.Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang and Yupu Hu: Accountable Identity-Based Encryption with Distributed Private Key Generators. Information Sciences. 505: 352-366 (2019)

8.Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu: Black-Box Accountable Authority Identity-Based Revocation System. Computer Journal. (online publication: 14 Nov. 2019, doi: 10.1093/comjnl/bxz092)

9.赵臻, 吴戈, 赖建昌, 蒋芃, 朱斌瑞, 穆怡, Willy Susilo, 郭福春: 公钥密码方案构造及安全证明的知识要点和方法论. 密码学报, 2019, 6(1): 1-17

10.Ruiyang Xu, Xin Huang, Jie Zhang, Yulin Lu, Ge Wu, Zheng Yan: Software Defined Intelligent Building. International Journal of Information Security and Privacy. 9(3): 84-99 (2015)

11.Futai Zhang, Limin Shen and Ge Wu: Notes on the security of certificateless aggregate signature schemes. Information Sciences, 287: 32-37 (2014)

其他