2024
- Ruixuan Li, Baojun Liu*, Chaoyi Lu, Haixin Duan, Jun Shao*
A Worldwide View on the Reachability of Encrypted DNS Services
The Web Conference (formerly WWW) 2024: 1193–1202
Paper Link
2023
- Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin*
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation
ESORICS 2023: 212-234
Paper Link
2022
- Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
The Web Conference (formerly WWW) 2022: 732-742
Paper Link
2021
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
IEEE/ACM IWQOS 2021: 1-10
Paper Link
- Genhua Lu, Yi Zhang, Zhongxiang Lu, Jun Shao*, Guiyi Wei
Blockchain-Based Sealed-Bid Domain Name Auction Protocol.
EAI AC3 2021: 25-38
Paper Link
2020
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
GLOBECOM 2020: 1-6
Paper Link
- Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
ACISP 2020: 408-424
Paper Link
- Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
ICC 2020: 1-6
Paper Link
2019
- Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei*, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
NSS 2019: 567-580
Paper Link
- Hui Zheng, Jun Shao*, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao
Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption.
NSS 2019: 552-566
Paper Link
- Yandong Zheng, Rongxing Lu, Jun Shao, Yonggang Zhang, Hui Zhu
Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
WCSP 2019
Paper Link
- Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
WCSP 2019
Paper Link
- Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
ESORICS (2) 2019: 283-303
Paper Link
- Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
ICC 2019: 1-6
Paper Link
2018
- Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
ESORICS (2) 2018: 228-246
Paper Link
- Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang
A New Design of Online/Offline Signatures Based on Lattice.
ISPEC 2018: 198-212
Paper Link
2017
- Xinxin Ma, Jun Shao*, Cong Zuo, Ru Meng
Efficient Certificate-Based Signature and Its Aggregation.
ISPEC 2017: 391-408
Paper Link
- Cong Zuo, Jun Shao*, Zhe Liu, Yun Ling, Guiyi Wei
Hidden-Token Searchable Public-Key Encryption.
TrustCom/BigDataSE/ICESS 2017: 248-254
Paper Link
2016
- Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
ACISP (1) 2016: 495-508
Paper Link
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
AsiaCCS 2016: 95-106
Paper Link
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
ICC 2016: 1-6
Paper Link
2015
- Jun Shao, Rongxing Lu, Xiaodong Lin, Cong Zuo
New threshold anonymous authentication for VANETs.
ICCC 2015: 1-6
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin
Fine-grained data sharing in cloud computing for mobile devices.
INFOCOM 2015: 2677-2685
Paper Link
2014
- Khalid Alharbi, Xiaodong Lin, Jun Shao
A framework for privacy-preserving data sharing in the Smart Grid.
ICCC 2014: 214-219
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
INFOCOM 2014: 244-252
Paper Link
- Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao
PLAM: A privacy-preserving framework for local-area mobile social networks.
INFOCOM 2014: 763-771
Paper Link
- Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
ProvSec 2014: 194-205
Paper Link
2013
- Jun Shao, Jinlin Zhang, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
Multiple Sources Network Coding Signature in the Standard Model.
IDCS 2013: 195-208
Paper Link
2012
- Jun Shao
Anonymous ID-Based Proxy Re-Encryption.
ACISP 2012: 364-375
Paper Link
2011
- Miroslaw Kutylowski, Jun Shao
Signing with multiple ID's and a single key.
CCNC 2011: 519-520
Paper Link
- Miroslaw Kutylowski, Jun Shao
1-out-of-2 signature.
AsiaCCS 2011: 391-395
Paper Link
- Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei
Multi-Use Unidirectional Proxy Re-Encryption.
ICC 2011: 1-5
Paper Link
- Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
Identity-Based Conditional Proxy Re-Encryption.
ICC 2011: 1-5
Paper Link
- Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
Unidirectional Identity-Based Proxy Re-Signature.
ICC 2011: 1-5
Paper Link
2010
- Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
CIT 2010: 1299-1305
Paper Link
- Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
How to Construct State Registries-Matching Undeniability with Public Security.
ACIIDS (1) 2010: 64-73
Paper Link
- Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
ACISP 2010: 216-232
Paper Link
- Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Inscrypt 2010: 1-17
Paper Link
2009
- Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao
Attribute based proxy re-encryption with delegating capabilities.
AsiaCCS 2009: 276-286
Paper Link
- Jun Shao, Zhenfu Cao
CCA-Secure Proxy Re-encryption without Pairings.
Public Key Cryptography 2009: 357-376
Paper Link
2008
- Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
INDOCRYPT 2008: 426-436
Paper Link
2007
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Efficient Password-Based Authenticated Key Exchange Without Public Information.
ESORICS 2007: 299-310
Paper Link
- Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Short Group Signature Without Random Oracles.
ICICS 2007: 69-82
Paper Link
- Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Proxy Re-signature Schemes Without Random Oracles.
INDOCRYPT 2007: 197-209
Paper Link
- Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
INDOCRYPT 2007: 297-311
Paper Link
- Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
An Efficient Certified Email Protocol.
ISC 2007: 145-157
Paper Link