The personal data
ResumeProfessor Yang Ming received the Ph.D. degree from Xidian University, China, in 2008. He is currently a Professor and Vice Dean with the School of Information Engineering, Chang’an University, China. I am an Associated Editor of IEEE Transactions on Dependable and Secure Computing. He has published more than 20 papers in top journals (e.g., IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Mobile Computing, IEEE Transactions on Services Computing, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Cloud Computing, IEEE Transactions on Vehicular Technology, IEEE Internet of Things Journal, IEEE Systems Journal, Future Generation Computer Systems, Designs, Codes, and Cryptography). His current research interests include Data Security and Privacy, Security and Privacy in Vehicular Ad Hoc Network, Security and Privacy in Cloud Computing, and Artificial Intelligence Security. He has been the leader of three National Natural Science Foundation of China, one China Postdoctoral Science Foundation, three Key Research and Development Programs of Shaanxi Province, two Natural Science Foundation of Shaanxi Province, and four Xi’an Science and Technology Planning Programs, etc. He has served as a reviewer for the National Natural Science Foundation of China, China Postdoctoral Science Foundation, and Technology Program of Shaanxi Province, Chongqing City, Jiangxi Province, and Anhui Province. He has always served as a reviewer for several prestigious Journals, such as IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics & Security, IEEE Transactions on Mobile Computing, IEEE Transactions on Services Computing, IEEE Transactions on Industrial Informatics, IEEE Transactions on Intelligent Transportation Systems, IEEE Transactions on Vehicular Technology, IEEE Transactions on Network Science and Engineering, IEEE Transactions on Network and Service Management, IEEE Internet of Things Journal, IEEE Systems Journal, Future Generation Computer Systems, Expert Systems with Applications. Social positionIEEE Member, China Computer Federation Senior Member, Chinese Association for Cryptologic Research Member, Chinese Institute of Electronics Member Research
Open CourseB.S. Course: 《Information and Coding Technology》&《Communication network security and confidentiality technology》 M.S. Course: 《Computer Security and Cryptography》 Research project[1] 2025.01-2028.12: Research on key technologies of privacy protection for vehicular digital twin networks, National Natural Science Foundation of China, PI [2] 2021.01-2024.12: Research on data security and privacy preserving techniques in fog-based 5G vehicular ad hoc network, National Natural Science Foundation of China, PI [3] 2024.01-2025.12: Research on key technologies of data security in vehicular digital twin networks, Key Research and Development Program of Shaanxi Province, PI [4] 2022.07-2024.06: Research on security-enhanced federated learning algorithm, Xi'an Science and Technology Planning Program, PI [5] 2021.01-2022.12: Research on key technologies of data security in vehicular digital twin networks, Key Research and Development Program of Shaanxi Province, PI [6] 2018.01-2019.12: Research on provable secure digital signature algorithm with privacy protection, Natural Science Foundation of Shaanxi Province, PI [7] 2017.01-2018.12: Research on image data encryption technologies in big data environment, Xi'an Science and Technology Planning Program, PI [8] 2015.01-2016.12: Research and implementation on key technologies for information security in vehicular ad hoc networks, Key Research and Development Program of Shaanxi Province, PI [9] 2014.01-2015.12: Research on key technologies of security in cloud computing, Xi'an Science and Technology Planning Program, PI [10] 2013.01-2015.12: Design and research on digital signature scheme with verification right control, National Natural Science Foundation of China, PI [11] 2012.01-2013.12: Research and implementation on secure communication technologies in mobile vehicular networks, Xi’an Science and Technology Planning Program, PI [12] 2011.10-2013.10: Research on digital signature scheme with privacy protection, China Postdoctoral Science Foundation, PI [13] 2011.01-2013.12: Research on universal designed verifier signature mechanism, Natural Science Foundation of Shaanxi Province, PI Thesis[82] Chenhao Wang, Yang Ming*, Hang Liu, Yutong Deng, Mengmeng Yang and Jie Feng. Puncturable registered ABE for vehicular social networks: Enhancing security and practicality. IEEE Transactions on Dependable and Secure Computing, Accepted to appear. [81] Yang Ming, Xinlin Zhang, Hang Liu, Chenhao Wang, and Shan Wang. Communication-Efficient conditional privacy-preserving authentication based on ring signature in VANETs. IEEE Transactions on Vehicular Technology, Accepted to appear. [80] Yang Ming, Hongyu Wang, Chenhao Wang, Hang Liu, Jie Feng, and Keqin Li. Registration-based bilateral fine-grained access control in vehicular social networks. IEEE Internet of Things Journal, 2025, 12(15): 31986-31997. [79] Chenhao Wang, Yang Ming*, Hang Liu, Jie Feng, Mengmeng Yang and Yang Xiang. Blockchain-assisted privacy-preserving and synchronized key agreement scheme for VDTNs. IEEE Transactions on Dependable and Secure Computing, 2025, 22(4): 3415-3430. [78] Chenhao Wang, Yang Ming*, Hang Liu, Songnian Zhang, and Rongxing Lu. Puncturable signature and applications in privacy-aware data reporting for VDTNs. IEEE Transactions on Services Computing, 2025, 18(3): 1669-1682. [77] Chenhao Wang, Yang Ming*, Hang Liu, and Yutong Deng. Dual fine-grained authentication without trusted authority for data collection in TDT systems. IEEE Transactions on Mobile Computing, 2025, 24(7): 5951-5963. [76] Hang Liu, Yang Ming*, Chenhao Wang, and Yi Zhao. Verifiable and fair identity-based broadcast proxy re-encryption based on SM9. Chinese Journal of Computers, 2025, 48(3): 721-737 (in Chinese). [75] Chenhao Wang, Yang Ming*, Hang Liu, Yutong Deng, Yi Zhao, and Songnian Zhang. Security-enhanced data transmission with fine-grained and flexible revocation for DTWNs. IEEE Transactions on Information Forensics & Security, 2025, 20: 1237-1250. [74] Hang Liu, Yang Ming*, Chenhao Wang, Yi Zhao, Songnain Zhang, and Rongxing Lu. Server-assisted data sharing system supporting conjunctive keyword search for vehicular social networks. IEEE Transactions on Services Computing, 2024, 17(6): 4281-4295. [73] Hang Liu, Yang Ming*, Chenhao Wang, Yi Zhao, and Yabin Li. Comments on “enabling verifiable privacy-preserving multi-type data aggregation in smart grids”. IEEE Transactions on Dependable and Secure Computing, 2024, 21(6): 5308-5310. [72] Hang Liu, Yang Ming*, Chenhao Wang, and Yi Zhao. Flexible selective data sharing with fine-grained erasure in VANETs. IEEE Transactions on Information Forensics & Security, 2024, 19: 9582-9597. [71] Yang Ming*, Shan Wang, Chenhao Wang, Hang Liu, Yutong Deng and Jie Feng. VCSA: Privacy-preserving and collusion-resistant secure aggregation for federated learning using symmetric homomorphic encryption. Journal of Systems Architecture, 2024, 156: 103279. [70] Chenhao Wang, Yang Ming*, Hang Liu, Jie Feng, and Ning Zhang. Secure and flexible data sharing with dual privacy protection in vehicular digital twin networks. IEEE Transactions on Intelligent Transportation Systems, 2024, 25(9): 12407-12420. [69] Yang Ming, Hang Liu, Chenhao Wang, and Yi Zhao. Generic construction: cryptographic reverse firewalls for public key encryption with keyword search in cloud storage. IEEE Transactions on Cloud Computing, 2024, 12(2): 405-418. [68] Yi Zhao, Hang Liu, Yang Ming*, and Bo Yang. Construction method of complete cryptographic reverse firewall for IBE. Journal of Software, 2024, 35(7): 3482-3486 (in Chinese). [67] Chenhao Wang, Yang Ming*, Hang Liu, Songnian Zhang, and Rongxing Lu. Towards synchronized privacy-preserving authentication for MDTEN-Driven VANETs. IEEE Transactions on Vehicular Technology, 2024: 73(3): 4107-4120. [66] Hang Liu, Yang Ming*, Chenhao Wang, and Yi Zhao, Multi-recipient certificate-based searchable encryption scheme. Chinese Journal of Computers, 2024, 47(3): 544-557 (in Chinese). [65] Hang Liu, Yang Ming*, Chenhao Wang, Yi Zhao, Songnian Zhang and Rongxing Lu. Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for industrial internet of things. Future Generation Computer Systems, 2024, 153: 97-112. [64] Hang Liu, Yang Ming*, Chenhao Wang, and Yi Zhao.Identity-based proxy re-encryption based on SM9. International Conference on Information Security and Cryptology. Springer, 2023: 320-339. [63] Yang Ming, Weixin Zhang, Hang Liu, and Chenhao Wang. Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage, Journal of Systems Architecture, 2023, 143: 102965. [62] Yang Ming, Pengfei Yang, Hassan Mahdikhani, and Rongxing Lu. A secure one-to-many authentication and key agreement scheme for industrial IoT. IEEE Systems Journal, 2023, 17(2): 2225-2236. [61] Yang Ming, Chenhao Wang, Hang Liu, Jie Feng, Ning Zhang, and Weisong Shi. Blockchain-enabled efficient dynamic cross-domain deduplication in edge computing. IEEE Internet of Things Journal, 2022, 9(17): 15639-15656. [60] Chunlei Xie, Yu Sun, and Yang Ming*. Constructions of optimal binary Z-complementary sequence sets with large zero correlation zone. IEEE Signal Processing Letters, 2021, 28: 1694-1698. [59] Yang Ming, Yabin Li, Yi Zhao, and Pengfei Yang. Efficient privacy-preserving data aggregation scheme with fault tolerance in smart grid. Security and Communication Networks, 2022, Article ID 5895176. [58] Yang Ming, Baokang He and Chenghao Wang. Efficient revocable multi-authority attribute-based encryption for cloud storage. IEEE Access, 2021, 9: 42593-42603. [57] Yang Ming, Xiaopeng Yu and Xiaoqin Shen. Efficient anonymous certificate-based multi-message and multi-receiver signcryption scheme for healthcare internet of things. IEEE Access, 2020, 8: 153561-153576. [56] Yang Ming, Xiaopeng Yu. Efficient privacy-preserving data sharing for fog-assisted vehicular sensor networks. Sensors, 2020, 20(2), 514. [55] Yang Ming, Baokang He. Attribute revocation and verifiable outsourcing supported multi-authority attribute-based encryption scheme. Journal of Computer Applications, 2019, 39(12): 3556-3563 (in Chinese). [54] Yang Ming, Wenchang Shi. Efficient privacy-preserving certificateless provable data possession scheme for cloud storage. IEEE Access, 2019, 7: 122091-122105. [53] Yang Ming, Erxiu Wang. Identity-based encryption with filtered equality test for smart city applications. Sensors, 2019, 19(14), 3046. [52] Yang Ming, Xuanyi Zhang, and Xiaoqin Shen. Efficient privacy-preserving multi-dimensional data aggregation scheme in smart grid. IEEE Access, 2019, 7: 32907-32921. [51] Yang Ming, Hongliang Cheng. Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mobile Information Systems, 2019, Article ID 7593138. [50] Yang Ming, Hongping Yuan. Anonymous identity based broadcast encryption with group of prime order. International Journal of Network Security, 2019, 21(1): 7-16. [49] Yang Ming, Tingting Zhang. Efficient privacy-preserving access control scheme in electronic health records system. Sensors, 2018, 18(10): 3520. [48] Yang Ming, Xiaoqin Shen. PCPA: A practical certificateless conditional privacy preserving authentication scheme for vehicular ad hoc networks. Sensors, 2018, 18(5): 1573. [47] Yang Ming, Yumin Wang. Certificateless proxy signature scheme in the standard model. Fundamenta Informaticae, 2018, 160(4): 409-445. [46] Xiaoqing Shen, Yang Ming, and Jie Feng. Identity based generalized signcryption scheme in the standard model. Entropy, 2017, 19(3): 121. [45] Yang Ming, Yumin Wang. Cryptanalysis of an identity based signcryption scheme in the standard model. International Journal of Network Security, 2016, 18(1): 165-171. [44] Yang Ming, Yumin Wang. Identity based broadcast encryption with group of prime order. International Arab Journal of Information Technology (IAJIT), 2016, 13(5): 531-541. [43] Yang Ming, Pinghong Yuan, Bian Sun, and Zhengyang Qiao. Efficient identity-based anonymous broadcast encryption scheme in standard model. Journal of Computer Applications, 2016, 36(10): 2762-2766 (in Chinese). [42] Yang Ming, Juan Han, Lin Zhang, and Jun Zhou. Reducing trust in the PKG and anonymous identity-based encryption scheme in the standard model. Computer Engineering & Science, 2015, 37(2): 269-275 (in Chinese). [41] Yang Ming, Yumin Wang. Proxy signcryption scheme in the standard model. Security and Communication Networks, 2015, 8(8): 1431-1446. [40] Yang Ming, Yumin Wang. On the security of three public auditing schemes in cloud computing. International Journal of Network Security, 2015, 17(6): 795-802. [39] Yang Ming, Lin Zhang, Juan Han, and Jun Zhou. Universal designated verifier signcryption scheme in standard model. Journal of Computer Applications, 2014, 34(2): 464-468 (in Chinese). [38] Yang Ming, Jie Feng, and Junqi Hu. Secure identity-based proxy signcryption scheme in standard model. Journal of Computer Applications, 2014, 34(10): 2834-2839 (in Chinese). [37] Yang Ming, Xiangmo Zhao, and Yumin Wang. Certificateless aggregate signature scheme. Journal of University of Electronic Science and Technology of China, 2014, 43(2): 188-193 (in Chinese). [36] Yang Ming, Qiang Jin, and Xiangmo Zhao. Designated verifier proxy signature scheme with multi-warrant in the standard model. Journal of Information & Computational Science, 2013, 10(7): 2097-2107. [35] Yang Ming, Qiang Jin, and Xiangmo Zhao. A multi-signer universal designated multi-verifier signature scheme in the standard model. Journal of Computational Information Systems, 2013, 9(9): 3751-3758. [34] Yang Ming, Yumin Wang. Provably secure identity-based encryption scheme with wildcardin the standard model. Acta Electronica Sinica, 2013, 41(10): 2082-2086 (in Chinese). [33] Yang Ming, Rui Li. Efficient identity-based sanitizable signature scheme in standard model. Computer Science, 2013, 40(5): 158-163 (in Chinese). [32] Yang Ming, Xiangmo Zhao. Identity based encryption with backward recovery. Journal of Computational Information Systems, 2012, 6(8): 2575-2582. [31] Yang Ming, Yumin Wang. Identity-based threshold decryption scheme without random oracles. Chinese Journal of Electronics, 2011, 20(2): 323-328. [30] Yang Ming, Xiangmo Zhao, and Yumin Wang. Multi-receiver identity-based signcryption scheme in the standard model. 2011 International Conference on Information Computing and Applicaitons, LNCS 7030, Berlin: Springer-Verlag, 2011: 487-494. [29] Yang Ming, Yumin Wang. Identity-based broadcast group-oriented encryption under simple assumptions. Journal of Information and Computational Science, 2011, 12(8): 2315-2325. [28] Yang Ming, Xiaoqin Shen, and Yamian Peng. Provably security identity-based sanitizable signature scheme without random oracles. Journal of Software, 2011, 6(10): 1890-1897. [27] Yang Ming, Yumin Wang. Directed proxy signature in the standard model. Journal of Shanghai Jiaotong University (Science), 2011, 16(6): 663-671. [26] Yang Ming, Xiaoqin Shen. Efficient ID-based online/offline encryption scheme in the standard model. ICIC Express Letter, 2011, 5(4A): 993-998. [25] Yang Ming, Xiaoqin Shen, Liaojun Pang, and Yumin Wang. Provably secure identity-based signature scheme in the standard model. Journal of Beijing University of Posts and Telecommunications, 2011, 32(1): 99-102 (in Chinese). [24] Yang Ming, Xiaoqin Shen, and Yamian Peng. Identity-based sanitizable signature scheme in the standard model. 2010 International Conference on Information Computing and Applications, Part I, CCIS 105, Berlin: Springer-Verlag , 2010: 9-16. [23] Yang Ming, Yumin Wang. Improved identity based online/offline signature scheme. 2010 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, IEEE Computer Science, 2010: 126-131. [22] Yang Ming, Yumin Wang. Multi-receiver identity-based key encapsulation in the standard model. 2010 International Conference of Information Science and Management Engineering, IEEE Computer Science, Xi’an, China, 2010: 382- 385. [21] Yang Ming, Yumin Wang, and Liaojun Pang. Provably secure multi-identity single-key decryption scheme in the standard model. Computer Seience, 2010, 37(3): 73-75 (in Chinese). [20] Yang Ming, Xiaoqin Shen, and Yumin Wang. Identity-based encryption with wildcards in the standard model. The Journal of China Universities of Posts and Telecommunications, 2009, 16(1): 64-68. [19] Yang Ming, Yumin Wang. An efficient verifiably encrypted signature scheme without random oracles. International Journal of Network Security, 2009, 8(2): 125-130. [18] Yang Ming, Yumin Wang. Efficient certificate-based signature scheme. The Fifth International Conference on Information Assurance and Security, IEEE Computer Science, Xi'an, China, vol. II, 2009: 87-90. [17] Yang Ming, Yumin Wang. Provably secure proxy multi-signature scheme in the standard model. Advances in Cryptology-ChinaCrypt 2009, Science Press USA, Guangzhou, Guang Dong, 2009, 211-220 (in Chinese). [16] Yang Ming, Yumin Wang. Designated verifier proxy signature scheme without random oracles. Journal of Electronics & Information Technology, 2008, 30(3): 668-671 (in Chinese). [15] Yang Ming, Yumin Wang. Efficient certificateless signature scheme based on bilinear pairings. Journal of University of Electronic Science and Technology of China, 2008, 37(2): 175-177 (in Chinese). [14] Yang Ming, Yumin Wang. A new efficient ID-based proxy blind signature scheme. Journal of Electronics (China), 2008, 25(2): 226-231. [13] Yang Ming, Yumin Wang. Universal designated multi verifier signature scheme without random oracles. Wu Han University Journal of Natural Sciences, 2008, 13(6): 685-691. (Advances in Cryptology-ChinaCrypt2008) [12] Yang Ming, Yang Zhan, Yumin Wang, and Liaojun Pang. Improved certificateless signature scheme. Journal of Xidian University, 2008, 35(6): 1094-1099 (in Chinese). [11] Yang Ming, Xiaoqin Shen, and Yumin Wang. Certificateless universal designated verifier signature schemes. The Journal of China Universities of Posts and Telecommunications, 2007, 14(3): 85-90. [10] Yang Ming, Yumin Wang. Efficient ID-based blind signature schemes. The First International Symposium on Data, Privacy, & E-Commerce, IEEE Computer Science, Chengdu, China, 2007: 260-264. [9] Yang Ming, Xiaoqin Shen, and Yumin Wang. Limited universal designated verifier signature in standard model. Journal of Jilin University, 2007, 37(6): 1369-1363 (in Chinese). [8] Yang Ming, Yumin Wang. Certificateless universal designated verifier signature scheme. Advances in Cryptology-ChinaCrypt 2007, Southwest Jiaotong University Press, Chengdu, Si chuan, 2007, 159-165 (in Chinese). [7] Yang Ming, Yumin Wang. Cryptanalysis of some provably secure short signature schemes. Computer Science, 2007, 34(5): 83-84 (in Chinese). [6] Yang Ming, Yumin Wang. Cryptanalysis of two provably secure short signature schemes. Computer Engineering, 2007, 33(22): 21-22 (in Chinese). [5] Yang Ming, Shuhai Li, and Yumin Wang. An efficient universal designated verifier signature proof. Acta Electronica Sinica, 2006, 34(12A): 2434-2437 (in Chinese). [4] Yang Ming, Zhengtao Jiang, and Yumin Wang. An improved strong proxy signature schemes. Journal of Xidian University, 2006, 33(5): 778-781 (in Chinese). [3] Yang Ming, Shuhai Li, and Yumin Wang. Subliminal channels in the ID-based signature schemes. Journal of Harbin Institute of Technology, 2006, 38(sup): 784-787 (in Chinese). [2] Yang Ming, Yumin Wang. Cryptanalysis of two proxy signatures schemes. Computer Science, 2006, 33(8): 128-129 (in Chinese). [1] Yang Ming, Shangping Wang, and Xiaofeng Wang. Strong (t, N) key-insulated blind signature scheme. Computer Engineering, 2005, 31(16): 54-56 (in Chinese). Technological AchievementsHonor RewardWork experience2018.09-Current School of Information Engineering, Chang'an University, Professor, Vice Dean 2015.11-2018.09 School of Information Engineering, Chang'an University, Professor 2010.11-2015.11 School of Information Engineering, Chang'an University, Associate Professor 2014.02-2015.02 Department of Software and Information Systems, University of North Carolina at Charlotte, Academic Visitor 2010.12-2013.12 Transportation Engineering Mobile Station, Chang'an University, Postdoctoral 2008.04-2010.11 School of Information Engineering, Chang'an University, Lecturer |

