CONFERENCE

2025

  1. Ruixuan Li, Chaoyi Lu, Baojun Liu*, Yunyi Zhang, Geng Hong, Haixin Duan, Yanzhong Lin, Qingfeng Pan, Min Yang, Jun Shao*
    HADES Attack: Understanding and Evaluating Manipulation Risks of Email Blocklists
    NDSS 2025 Paper Link
  2. Cong Zuo, Shangqi Lai, Shi-Feng Sun, Xingliang Yuan, Joseph K. Liu, Jun Shao, Huaxiong Wang, Liehuang Zhu, Shujie Cui
    Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy
    Proceedings on Privacy Enhancing Technologies 2025(1): 6440-455 (2025) Paper Link

2024

  1. Ruixuan Li, Shaodong Xiao, Baojun Liu*, Yanzhong Lin, Haixin Duan, Qingfeng Pan, Jianjun Chen, Jia Zhang*, Ximeng Liu, Xiuqi Lu, Jun Shao*
    Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider
    ACM IMC 2024: 659-673 Paper Link
  2. Ruixuan Li, Baojun Liu*, Chaoyi Lu, Haixin Duan, Jun Shao*
    A Worldwide View on the Reachability of Encrypted DNS Services
    The Web Conference (formerly WWW) 2024: 1193–1202 Paper Link

2023

  1. Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin*
    Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation
    ESORICS 2023: 212-234 Paper Link

2022

  1. Xue Yang, Yan Feng, Weijun Fang, Jun Shao, Xiaohu Tang, Shu-Tao Xia, Rongxing Lu
    An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning
    The Web Conference (formerly WWW) 2022: 732-742 Paper Link

2021

  1. Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao
    Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
    IEEE/ACM IWQOS 2021: 1-10 Paper Link
  2. Genhua Lu, Yi Zhang, Zhongxiang Lu, Jun Shao*, Guiyi Wei
    Blockchain-Based Sealed-Bid Domain Name Auction Protocol.
    EAI AC3 2021: 25-38 Paper Link

2020

  1. Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
    Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
    GLOBECOM 2020: 1-6 Paper Link
  2. Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu
    New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
    ACISP 2020: 408-424 Paper Link
  3. Yunguo Guan, Rongxing Lu, Yandong Zheng, Jun Shao, Guiyi Wei
    Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
    ICC 2020: 1-6 Paper Link

2019

  1. Rongxin Zheng, Cuiwen Ying, Jun Shao, Guiyi Wei*, Hongyang Yan, Jianmin Kong, Yekun Ren, Hang Zhang, Weiguang Hou
    New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
    NSS 2019: 567-580 Paper Link
  2. Hui Zheng, Jun Shao*, Guiyi Wei, Li Hu, Bianjing Pan, Kai Liu, Xiaohang Mao
    Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption.
    NSS 2019: 552-566 Paper Link
  3. Yandong Zheng, Rongxing Lu, Jun Shao, Yonggang Zhang, Hui Zhu
    Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
    WCSP 2019 Paper Link
  4. Xichen Zhang, Rongxing Lu, Jun Shao, Hui Zhu, Ali A. Ghorbani
    Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
    WCSP 2019 Paper Link
  5. Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
    Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
    ESORICS (2) 2019: 283-303 Paper Link
  6. Yandong Zheng, Rongxing Lu, Xue Yang, Jun Shao
    Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
    ICC 2019: 1-6 Paper Link

2018

  1. Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
    Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
    ESORICS (2) 2018: 228-246 Paper Link
  2. Mingmei Zheng, Shao-Jun Yang, Wei Wu, Jun Shao, Xinyi Huang
    A New Design of Online/Offline Signatures Based on Lattice.
    ISPEC 2018: 198-212 Paper Link

2017

  1. Xinxin Ma, Jun Shao*, Cong Zuo, Ru Meng
    Efficient Certificate-Based Signature and Its Aggregation.
    ISPEC 2017: 391-408 Paper Link
  2. Cong Zuo, Jun Shao*, Zhe Liu, Yun Ling, Guiyi Wei
    Hidden-Token Searchable Public-Key Encryption.
    TrustCom/BigDataSE/ICESS 2017: 248-254 Paper Link

2016

  1. Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
    Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
    ACISP (1) 2016: 495-508 Paper Link
  2. Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin
    FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
    AsiaCCS 2016: 95-106 Paper Link
  3. Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin
    EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
    ICC 2016: 1-6 Paper Link

2015

  1. Jun Shao, Rongxing Lu, Xiaodong Lin, Cong Zuo
    New threshold anonymous authentication for VANETs.
    ICCC 2015: 1-6 Paper Link
  2. Jun Shao, Rongxing Lu, Xiaodong Lin
    Fine-grained data sharing in cloud computing for mobile devices.
    INFOCOM 2015: 2677-2685 Paper Link

2014

  1. Khalid Alharbi, Xiaodong Lin, Jun Shao
    A framework for privacy-preserving data sharing in the Smart Grid.
    ICCC 2014: 214-219 Paper Link
  2. Jun Shao, Rongxing Lu, Xiaodong Lin
    FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
    INFOCOM 2014: 244-252 Paper Link
  3. Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Jun Shao
    PLAM: A privacy-preserving framework for local-area mobile social networks.
    INFOCOM 2014: 763-771 Paper Link
  4. Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang
    RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
    ProvSec 2014: 194-205 Paper Link

2013

  1. Jun Shao, Jinlin Zhang, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
    Multiple Sources Network Coding Signature in the Standard Model.
    IDCS 2013: 195-208 Paper Link

2012

  1. Jun Shao
    Anonymous ID-Based Proxy Re-Encryption.
    ACISP 2012: 364-375 Paper Link

2011

  1. Miroslaw Kutylowski, Jun Shao
    Signing with multiple ID's and a single key.
    CCNC 2011: 519-520 Paper Link
  2. Miroslaw Kutylowski, Jun Shao
    1-out-of-2 signature.
    AsiaCCS 2011: 391-395 Paper Link
  3. Jun Shao, Peng Liu, Zhenfu Cao, Guiyi Wei
    Multi-Use Unidirectional Proxy Re-Encryption.
    ICC 2011: 1-5 Paper Link
  4. Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
    Identity-Based Conditional Proxy Re-Encryption.
    ICC 2011: 1-5 Paper Link
  5. Jun Shao, Guiyi Wei, Yun Ling, Mande Xie
    Unidirectional Identity-Based Proxy Re-Signature.
    ICC 2011: 1-5 Paper Link

2010

  1. Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu
    CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
    CIT 2010: 1299-1305 Paper Link
  2. Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
    How to Construct State Registries-Matching Undeniability with Public Security.
    ACIIDS (1) 2010: 64-73 Paper Link
  3. Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu
    The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
    ACISP 2010: 216-232 Paper Link
  4. Lihua Wang, Licheng Wang, Zhenfu Cao, Eiji Okamoto, Jun Shao
    New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
    Inscrypt 2010: 1-17 Paper Link

2009

  1. Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao
    Attribute based proxy re-encryption with delegating capabilities.
    AsiaCCS 2009: 276-286 Paper Link
  2. Jun Shao, Zhenfu Cao
    CCA-Secure Proxy Re-encryption without Pairings.
    Public Key Cryptography 2009: 357-376 Paper Link

2008

  1. Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
    Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority.
    INDOCRYPT 2008: 426-436 Paper Link

2007

  1. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
    Efficient Password-Based Authenticated Key Exchange Without Public Information.
    ESORICS 2007: 299-310 Paper Link
  2. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
    Short Group Signature Without Random Oracles.
    ICICS 2007: 69-82 Paper Link
  3. Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
    Proxy Re-signature Schemes Without Random Oracles.
    INDOCRYPT 2007: 197-209 Paper Link
  4. Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura
    A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
    INDOCRYPT 2007: 297-311 Paper Link
  5. Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
    An Efficient Certified Email Protocol.
    ISC 2007: 145-157 Paper Link

Menu

  • ABOUT ME
  • PUBLICATIONS
    • JOURNAL
    • CONFERENCE
  • DEMO
  • SUPERVISION
  • PUBLIC SERVICE
  • 中文主页