计算机科学与技术系

Department of Computer Science and Technology

  • Daoshun WANG
  • Associate professor
  • Department of Computer Science and Technology
  • Joined Department: 2003
  • Email:wangdaoshun @ gmail.com or daoshun@mail.tsinghua.edu.cn
  • Phone:+86-10-62782930
  • Fax:+86-10-62781138

Education background

Bachelor of Mathematics, Lanzhou University, Lanzhou, China, 1987;

Ph.D. in Applied Mathematics, Sichuan University, Chengdu, China, 2001.

Social service

Key Lab of Copyright Protection and Applications, State Administration of Press Publication, Radio, Film and Television of The Reople’s Republic of China, Tsinghua University: Director (2016-);

Areas of Research Interests/ Research Projects

Encryption Algorithms, Key Distribution and Key Agreement Schemes, Security of Digital Multimedia and Security Forensics, Information Hiding and Digital Watermarking, Anti-Counterfeiting Technology. 

National Natural Science Foundation of China: Research on Key Problems of Visual Cryptography Scheme (2004-2006);

National Natural Science Foundation of China: Constructing Relationship Model of Linear Threshold Scheme and Visual Secret Sharing Scheme, and Research on Some Problems of the Two Schemes (2009-2011);

National 863 High-Tech Program: Multi-Layer Visual Anti-Counterfeit Technology for Images (2008-2010);

National Natural Science Foundation of China: Research on optimal visual secret sharing schemes and their applications (2012-2015).

National Natural Science Foundation of China: How to evaluate moiré patterns and construct specified moiré patterns based on visual cryptography (2014-2017).

NSFC- Joint Fund for Basic Technology Research : Research on Key Problems of secret sharing schemes in social network (2016-2018)

Honors And Awards

Ministry of Education, The People's Republic of China, Award for Technological Invention, First Class (2015);

Science and Technology Award by China Electronic Science and technology, First Class (2015).

Academic Achievement

List of Papers Published in Partial Journals (From 2007 to Now)                                                                                        

[1]    X.X. Jia, D.S. Wang, D.X. Nie, C,Y. Zhang. Collaborative visual cryptographic schemes. IEEE Transactions on Circuits and Systems for Video Technology. DOI: 10.1109/TCSVT.2016.2631404.

[2]   L.M. Gong, S.D. Li, Q. Mao,D.S. Wang, J.W. Dou. A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle . Theoretical Computer Science, vol. 609, pp.253-261, 2016.

[3]   C.N. Yang, D.S. Wang. Property analysis of xor based visual cryptography. IEEE Transactions on Circuits and Systems for Video Technology, vol. 24(2), pp.189-197, 2014.

[4]   S.D. Li, C.Y. Wu, D.S. Wang, Y.Q. Dai. Secure multiparty computation of solid geometric problems and their applications. Information Sciences, vol. 282, pp. 401-413, 2014.

[5]   C.N. Yang, C. C. Wu, D.S. Wang. A discussion on the relationship between probabilistic visual cryptography and random grid. Information Sciences, vol.278(10), pp.141-173, 2014.

[6]   D.S. Wang, T. Song, L. Dong, C.N. Yang .Optimal contrast grayscale visual cryptography schemes with reversing. IEEE Transaction on Information Forensics and Security, vol. 8(12), pp.2059-2072, 2013.

[7]   D.S. Wang, L. Dong, X. Li. Towards shift tolerant visual secret sharing schemes. IEEE Transactions on Information Forensics and Security, vol.6 (2), pp.323-337, 2011.

[8]   D.S. Wang, F. Yi, X. Li. Probabilistic visual secret sharing schemes for gray-scale images and color images. Information Sciences, vol.181(11), pp.2189-2208, 2011.

[9]   D.S. Wang, F. Yi, X. Li. On general construction for extended visual cryptography schemes. Pattern Recognition, vol. 42(11), pp. 3071-3082, 2009.

[10]    S.D. Li, D.S. Wang, Y.Q. Dai, P. Luo. Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations. Information Sciences, vol. 178(1), pp. 244-255, 2008

[11]    D.S. Wang, L. Zhang, N. Ma, X. Li. Two secret sharing schemes based on Boolean operations. Pattern Recognition, vol. 40, pp.2776-2785, 2007.