2025
- Ruixuan Li, Chaoyi Lu, Baojun Liu*, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao*
HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists
NDSS 2025
Paper Link
- Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
Proceedings on Privacy Enhancing Technologies 2025(1): 6440-455 (2025)
Paper Link
2024
- Ruixuan Li, Shaodong Xiao, Baojun Liu*, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen, Jia Zhang*, Ximeng Liu, Xiuqi Lu, Jun Shao*
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
ACM IMC 2024: 659-673
Paper Link
- Ruixuan Li, Baojun Liu*, Chaoyi Lu, Haixin Duan, Jun Shao*
A Worldwide View on the Reachability of Encrypted DNS Services
The Web Conference (formerly WWW) 2024: 1193–1202
Paper Link
2023
- Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin*
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation
ESORICS 2023: 212-234
Paper Link
2022
- Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
The Web Conference (formerly WWW) 2022: 732-742
Paper Link
2021
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
IEEE/ACM IWQOS 2021: 1-10
Paper Link
- Genhua Lu, Yi Zhang, Zhongxiang Lu, Jun Shao*, Guiyi Wei
Blockchain-Based Sealed-Bid Domain Name Auction Protocol.
EAI AC3 2021: 25-38
Paper Link
2020
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
GLOBECOM 2020: 1-6
Paper Link
- Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
ACISP 2020: 408-424
Paper Link
- Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
ICC 2020: 1-6
Paper Link
2019
- Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei*, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
NSS 2019: 567-580
Paper Link
- Hui Zheng, Jun Shao*, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao
Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption.
NSS 2019: 552-566
Paper Link
- Yandong Zheng, Rongxing Lu, Jun Shao, Yonggang Zhang, Hui Zhu
Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
WCSP 2019
Paper Link
- Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
WCSP 2019
Paper Link
- Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
ESORICS (2) 2019: 283-303
Paper Link
- Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
ICC 2019: 1-6
Paper Link
2018
- Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
ESORICS (2) 2018: 228-246
Paper Link
- Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang
A New Design of Online/Offline Signatures Based on Lattice.
ISPEC 2018: 198-212
Paper Link
2017
- Xinxin Ma, Jun Shao*, Cong Zuo, Ru Meng
Efficient Certificate-Based Signature and Its Aggregation.
ISPEC 2017: 391-408
Paper Link
- Cong Zuo, Jun Shao*, Zhe Liu, Yun Ling, Guiyi Wei
Hidden-Token Searchable Public-Key Encryption.
TrustCom/BigDataSE/ICESS 2017: 248-254
Paper Link
2016
- Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
ACISP (1) 2016: 495-508
Paper Link
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
AsiaCCS 2016: 95-106
Paper Link
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
ICC 2016: 1-6
Paper Link
2015
- Jun Shao, Rongxing Lu, Xiaodong Lin, Cong Zuo
New threshold anonymous authentication for VANETs.
ICCC 2015: 1-6
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin
Fine-grained data sharing in cloud computing for mobile devices.
INFOCOM 2015: 2677-2685
Paper Link
2014
- Khalid Alharbi, Xiaodong Lin, Jun Shao
A framework for privacy-preserving data sharing in the Smart Grid.
ICCC 2014: 214-219
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
INFOCOM 2014: 244-252
Paper Link
- Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao
PLAM: A privacy-preserving framework for local-area mobile social networks.
INFOCOM 2014: 763-771
Paper Link
- Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
ProvSec 2014: 194-205
Paper Link
2013
- Jun Shao, Jinlin Zhang, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
Multiple Sources Network Coding Signature in the Standard Model.
IDCS 2013: 195-208
Paper Link
2012
- Jun Shao
Anonymous ID-Based Proxy Re-Encryption.
ACISP 2012: 364-375
Paper Link
2011
- Miroslaw Kutylowski, Jun Shao
Signing with multiple ID's and a single key.
CCNC 2011: 519-520
Paper Link
- Miroslaw Kutylowski, Jun Shao
1-out-of-2 signature.
AsiaCCS 2011: 391-395
Paper Link
- Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei
Multi-Use Unidirectional Proxy Re-Encryption.
ICC 2011: 1-5
Paper Link
- Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
Identity-Based Conditional Proxy Re-Encryption.
ICC 2011: 1-5
Paper Link
- Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
Unidirectional Identity-Based Proxy Re-Signature.
ICC 2011: 1-5
Paper Link
2010
- Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
CIT 2010: 1299-1305
Paper Link
- Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
How to Construct State Registries-Matching Undeniability with Public Security.
ACIIDS (1) 2010: 64-73
Paper Link
- Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
ACISP 2010: 216-232
Paper Link
- Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Inscrypt 2010: 1-17
Paper Link
2009
- Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao
Attribute based proxy re-encryption with delegating capabilities.
AsiaCCS 2009: 276-286
Paper Link
- Jun Shao, Zhenfu Cao
CCA-Secure Proxy Re-encryption without Pairings.
Public Key Cryptography 2009: 357-376
Paper Link
2008
- Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
INDOCRYPT 2008: 426-436
Paper Link
2007
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
Efficient Password-Based Authenticated Key Exchange Without Public Information.
ESORICS 2007: 299-310
Paper Link
- Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
Short Group Signature Without Random Oracles.
ICICS 2007: 69-82
Paper Link
- Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
Proxy Re-signature Schemes Without Random Oracles.
INDOCRYPT 2007: 197-209
Paper Link
- Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
INDOCRYPT 2007: 297-311
Paper Link
- Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
An Efficient Certified Email Protocol.
ISC 2007: 145-157
Paper Link