姓名:王道顺

职称:副教授

电话:86-10-62782930(O)

邮箱:wangdaoshun@gmail.com or daoshun@mail.tsinghua.edu.cn

教育背景

理学学士 (数学系), 兰州大学, 中国, 1987;

理学博士 (应用数学), 四川大学, 中国, 2001.

社会兼职

国家新闻出版广电总局版权保护与应用重点实验室: 主任(2016-)。

 

研究领域

 

密码算法,密钥管理,多媒体安全与取证,

信息隐藏与数字水印技术, 票据防伪技术。

讲授课程                                                                                                                                                                                         

初等数论及其应用 (课号20240082, 本科);

信息隐藏和数字水印技术 (课号80240382, 研究生).

教学概况                                                                                                                                                                                         

初等数论及其应用是面向计算机科学与技术专业三年级本科生的限选课,我通过讲授初等数论的知识,培养学生的思维能力和逻辑推理能力;我同时在课中强调了初等数论理论在信息安全等相关领域的应用。在研究生课程信息隐藏和数字水印技术中,我给出很多开放式题目,学生可以选择感兴趣的内容去实现和设计新的水印技术。

研究课题                                                                                                                                                                                         

国家自然科学基金课题: 可视密存中的关键问题研究 (2004-2006);

国家自然科学基金课题: 构建线性阈值方案和可视分存方案的关系模型及关键问题研究 (2009-2011);

科技部863课题: 图案的多层可视防伪技术研究 (2008-2010);

国家自然科学基金课题: 优化的可视秘密分存方案及其应用研究 (2012-2015);

国家自然科学基金课题:基于视觉密码学的moiré纹度量和构建研究(2014-2017);

NSFC-通用技术基础研究联合基金:社会网秘密共享中的关键问题研究(2016-2018)。

 

奖励与荣誉

教育部技术发明一等奖     (2015);

中国电子学会科学技术一等奖   (2015)。

 

学术成果

 

部分国际期刊论文 (2007-)                                                                                                                                                     

[1] X.X. Jia, D.S. Wang, D.X. Nie, C,Y. Zhang. Collaborative visual cryptographic schemes. IEEE Transactions on Circuits and Systems for Video Technology. DOI: 10.1109/TCSVT.2016.2631404.

[2] L.M. Gong, S.D. Li, Q. Mao,D.S. Wang, J.W. Dou, A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle . Theoretical Computer Science, vol. 609, pp.253-261, 2016.

[3] C.N. Yang, D.S. Wang. Property analysis of xor based visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology, vol. 24(2), pp.189-197, 2014.

[4] S.D. Li, C.Y. Wu, D.S. Wang, Y.Q. Dai. Secure multiparty computation of solid geometric problems and their applications. Information Sciences, vol. 282, pp. 401-413, 2014.

[5] C.N. Yang, C. C. Wu, D.S. Wang. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences, vol.278(10), pp.141-173, 2014.

[6] D.S. Wang, T. Song, L. Dong, C.N. Yang .Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Transaction on Information Forensics and Security, vol. 8(12), pp.2059-2072, 2013.

[7] D.S. Wang, L. Dong, X. Li. Towards shift tolerant visual secret sharing schemes. IEEE Transactions on Information Forensics and Security, vol.6 (2), pp.323-337, 2011.

[8] D.S. Wang, F. Yi, X. Li. Probabilistic visual secret sharing schemes for gray-scale images and color images. Information Sciences, vol.181(11), pp.2189-2208, 2011.

[9] D.S. Wang, F. Yi, X. Li. On general construction for extended visual cryptography schemes. Pattern Recognition, vol. 42(11), pp. 3071-3082, 2009.

[10] S.D. Li, D.S. Wang, Y.Q. Dai, P. Luo. Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations. Information Sciences, vol. 178(1), pp. 244-255, 2008

[11] D.S. Wang, L. Zhang, N. Ma, X. Li. Two secret sharing schemes based on Boolean operations. Pattern Recognition, vol. 40, pp.2776-2785, 2007.