KANG Baoyuan

The publisher:陈海Delivery time:2019-03-28Views:124

KANG Baoyuan








Baoyuan Kang received M.S. in algebra from the shanxi University, and ph.D. in cryptography from Xidian University, People’s Republic of China in 1993 and 1999, respectively. From 1993 to 1999, he taught mathematics in Northwestern Polytechnic University. Since 1999 he has taught mathematics and computer science in Central South University. Now he is a professor at Tianjin Polytechnic University. His current research interests are cryptography and information security.


Courses :
1, cryptography;
2, Information security technology;
3, Discrete mathematics;
4, Algorithm design and analysis


Research interests:
1, information security
2, digital signature
3, cryptographic protocols
4, some mathematical problems in cryptography


[1] Baoyuan Kang, Colin Boyd, Ed Dawson, A novel identity-based strong designated verifier signature scheme, Journal of Systems and Software, v 82, n 2, February, 2009, pp 270-273.
[2] Baoyuan Kang, Colin Boyd, Ed Dawson, Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, v35, n1, January, 2009, pp 49-53.
[3] Baoyuan Kang, Colin Boyd, Ed Dawson, A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification, Computers and Electrical Engineering, v 35, n 1, January, 2009, pp 9-17.
[4] Baoyuan Kang, ID-based aggregate signature scheme with constant pairing computations: attack and new construction, Journal of Computational Information Systems, v 8, n 16, p 6611-6618, 2012.
[5] Baoyuan Kang, Attacks on One Designated Verifier Proxy Signature Scheme,  Journal of applied mathematics, Volume 2012, Article ID 508981
[6] Baoyuan Kang, On the security of some aggregate signature schemes, Journal of applied mathematics, Volume 2012, Article ID 416137
[7] Baoyuan Kang, New types of verifiably encrypted signature schemes, Advanced Materials Research, v 490-495, p 914-918, 2012, Mechatronics and Intelligent Materials II.
[8] Baoyuan Kang, Verifiably encrypted signature schemes: attacks and general constructions, Advances in information science and service sciences, v 5, n 7, 2013, pp 573-580.
[9] Baoyuan Kang, Jinguang Han and Qingju Wang, An Improvement on Conference Key Agreement Protocol with User Anonymity, 2010 2nd International Conference on Computer Engineering and Technology. Vol.1, April, 2010, pp 58-61.(
[10] Baoyuan Kang, Cryptanalysis on an e-voting scheme over computer network, International Conference on Computer Science and Software Engineering, v 3, December, 2008, pp 826-829.