To appear
- Qinglei Kong, Yifan Wang, Songnian Zhang, Bo Chen, Sudong Xiao, Haiyong Bao, Jun Shao
Achieving Secure On-Orbit Comparison in LEO Satellite-Enabled Offshore Wind Farm Surveillance
IEEE Internet of Things Journal
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
Efficient and Privcy-Preserving Weighted Range Set Sampling in Cloud
IEEE Transactions on Dependable and Secure Computing
Paper Link
- Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query over Encrypted Data
IEEE Transactions on Services Computing
Paper Link
- Yandong Zheng, Rongxing Lu, Songnian Zhang, Jun Shao, Hui Zhu
Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data
IEEE Transactions on Dependable and Secure Computing
Paper Link
- Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
Efficient and Privacy-Preserving Aggregate Query over Public Property Graphs
IEEE Transactions on Big Data
Paper Link
- Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data
IEEE Transactions on Dependable and Secure Computing
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
IEEE Transactions on Dependable and Secure Computing
Paper Link
2024
- Yandong Zheng, Hui Zhu, Rongxing Lu, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
Secure Similarity Queries over Vertically Distributed Data via TEE-Enhanced Cloud Computing
IEEE Transactions on Information Forensics and Security 19: 1556-6013 (2024)
Paper Link
- Songnian Zhang, Rongxing Lu, Hui Zhu, Yandong Zheng, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Li
Performance Enhanced Secure Spatial Keyword Similarity Query with Arbitrary Spatial Ranges
IEEE Transactions on Information Forensics and Security 19: 5272-5285 (2024)
Paper Link
- Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao*, Liming Fang, Rongxing Lu, Guiyi Wei
Anonymous Multi-Hop Payment for Payment Channel Networks
IEEE Transactions on Dependable and Secure Computing 21(1): 476-485 (2024)
Paper Link
- Ruixuan Li, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Xiaoqi Jia, Guiyi Wei
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services
IEEE Transactions on Dependable and Secure Computing 21(1): 125-138 (2024)
Paper Link
2023
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
SecBerg: Secure and Practical Iceberg Queries in Cloud
IEEE Transactions on Services Computing 16(5): 3696-3710 (2023)
Paper Link
- Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy
IEEE/ACM Transactions on Networking 31(6): 2793-2808 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query
IEEE Transactions on Services Computing 16(4): 2620-2631 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 20(5): 4387-4402 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 20(5): 3770-3786 (2023)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Achieving Privacy-Preserving Discrete Frchet Distance Range Queries
IEEE Transactions on Dependable and Secure Computing 20(3): 2097-2110 (2023)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Achieving Efficient and Privacy-Preserving (\alpha,\beta)-Core Query over Bipartite Graphs in Cloud
IEEE Transactions on Dependable and Secure Computing 20(3): 1979-1993 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Towards Efficient and Privacy-Preserving Interval Skyline Queries over Time Series Data
IEEE Transactions on Dependable and Secure Computing 20(2): 1348-1363 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Towards Efficient and Privacy-Preserving User-Defined Skyline Query over Single Cloud
IEEE Transactions on Dependable and Secure Computing 20(2): 1319-1334 (2023)
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
Efficient and Privacy-Preserving Aggregated Reverse kNN Query over Crowd-sensed Data
IEEE Transactions on Information Forensics and Security 18: 4285-4299 (2023)
Paper Link
- Xiaofeng Jia, Zhe Yu, Jun Shao*, Rongxing Lu, Guiyi Wei, Zhenguang Liu
Cross-Chain Virtual Payment Channels
IEEE Transactions on Information Forensics and Security 18: 3401-3413 (2023)
Paper Link
- Xin Hou, Xiaofeng Jia*, Jun Shao
Public key encryption with public-verifiable decryption delegation and its application
Journal of Information Security and Applications 75: 103513 (2023)
Paper Link
- Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao*, Guiyi Wei
A domain name management system based on account-based consortium blockchain
Peer-to-Peer Networking and Applications 16: 1211–1226 (2023)
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
PGSim: Efficient and Privacy-Preserving Graph Similarity Query over Encrypted Data in Cloud
IEEE Transactions on Information Forensics and Security 18: 2030-2045 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
IEEE Transactions on Information Forensics and Security 18: 888-903 (2023)
Paper Link
- Wei Liu, Zhiguo Wan*, Jun Shao, Yong Yu
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain
IEEE Transactions on Dependable and Secure Computing 20(1): 360-376 (2023)
Paper Link
2022
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
EPGQ: Efficient and Private Feature-based Group Nearest Neighbor Query over Road Networks
IEEE Internet of Things Journal 9(20): 20492-20502 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks
IEEE Internet of Things Journal 9(20): 20178-20188 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Towards Practical and Privacy-Preserving Multi-dimensional Range Query over Cloud
IEEE Transactions on Dependable and Secure Computing 19(5): 3478-3493 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Efficient Privacy-Preserving Similarity Range Query with Quadsector Tree in eHealthcare.
IEEE Transactions on Services Computing 15(5): 2742-2754 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Achieving Efficient and Privacy-Preserving Set Containment Search over Encrypted Data.
IEEE Transactions on Services Computing 15(5): 2604-2618 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series Data.
IEEE Transactions on Dependable and Secure Computing 19(4): 2501-2516 (2022)
Paper Link
- Yunguo Guan, Hui Zheng, Jun Shao*, Rongxing Lu, Guiyi Wei
Fair Outsourcing Polynomial Computation Based on the Blockchain.
IEEE Transactions on Services Computing 15(5): 2795-2808 (2022)
Paper Link Demo
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Zhu
PMRQ: Achieving Efficient and Privacy-Preserving Multi-Dimensional Range Query in eHealthcare
IEEE Internet of Things Journal 9(18): 17468-17479 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
Toward Privacy-Preserving Aggregate Reverse Skyline Query with Strong Security
IEEE Transactions on Information Forensics and Security 17: 2538-2552 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Jun Shao, Fan Yin, Hui Zhu
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
IEEE Transactions on Services Computing 15(3): 1358-1370 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Yunguo Guan, Jun Shao
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis
IEEE Internet of Things Journal 9(12): 9973-9986 (2022)
Paper Link
- Xichen Zhang, Rongxing Lu*, Jun Shao, Fengwei Wang, Hui Zhu, Ali A. Ghorbani
FedSky: An Efficient and Privacy-preserving Scheme for Federated Mobile Crowdsensing
IEEE Internet of Things Journal 9(7): 5344-5356 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu
Efficient and Privacy-Preserving Similarity Query with Access Control in eHealthcare
IEEE Transactions on Information Forensics and Security 17(2): 880-893 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 19(2): 1090-1103 (2022)
Paper Link
- Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
IEEE Transactions on Services Computing 15(1): 124-137 (2022)
Paper Link Demo
- Xue Yang, Rongxing Lu*, Jun Shao, Xiaohu Tang, Ali Ghorbani
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
IEEE Transactions on Dependable and Secure Computing 19(1): 591-606 (2022)
Paper Link
- Cong Zuo, Shifeng Sun*, Joseph K. Liu*, Jun Shao, Josef Pieprzyk, Lei Xu
Forward and Backward Private DSSE for Range Queries
IEEE Transactions on Dependable and Secure Computing 19(1): 328-338 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Hui Zhu
Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud.
IEEE Internet of Things Journal 9(2): 1276-1288. (2022)
Paper Link
2021
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Toward Privacy-Preserving Cybertwin-Based Spatio-Temporal Keyword Query for ITS in 6G Era.
IEEE Internet of Things Journal 8(22): 16243-16255. (2021)
Paper Link
- Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali Ghorbani
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud
IEEE Transactions on Services Computing 14(5): 1292-1305. (2021)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
IEEE Internet of Things Journal 8(18): 14219-14231 (2021)
Paper Link
- Fan Yin, Rongxing Lu*, Yandong Zheng, Jun Shao, Xue Yang, Xiaohu Tang
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Computers & Security 110, 2021, 102432
Paper Link
- Guiyi Wei, Xiaohang Mao, Rongxing Lu, Jun Shao*, Yunguo Guan, Genhua Lu
Achieve space-efficient key management in lightning network.
Computer Networks 108346 (2021)
Paper Link
- Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
Continuous probabilistic skyline query for secure worker selection in mobile crowdsensing.
IEEE Internet of Things Journal 8(14): 11758-11772 (2021)
Paper Link
- Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning*, Jun Sun, Joseph K. Liu, Yibao Bao
hPRESS: A Hardware-enhanced Proxy Re-encryption Scheme using Secure Enclave
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40(6): 1144-1157 (2021)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Jun Shao
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing
IEEE Internet of Things Journal 8(11): 9139-9150 (2021)
Paper Link
- Hassan Mahdikhani, Rongxing Lu*, Jun Shao, Ali Ghorbani
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT
IEEE Internet of Things Journal 8(6): 4762-4774 (2021)
Paper Link
- Xiaopeng Zhao, Zhenfu Cao*, Xiaolei Dong, Jun Shao
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
Designs, Codes and Cryptography 89(2): 241-253 (2021)
Paper Link
2020
- Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS
IEEE Internet of Things Journal 7(12): 11524-11535 (2020)
Paper Link
- Hui Zheng, Jun Shao*, Guiyi Wei
Attribute-based encryption with outsourced decryption in blockchain
Peer-to-Peer Networking and Applications 13(5): 1643-1655 (2020)
Paper Link
- Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Jun Shao, Ali Ghorbani
Achieving ${O(\log^3n)}$ Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT
IEEE Internet of Things Journal 7(6): 5220-5232 (2020)
Paper Link
- Jingcheng Song, Yining Liu, Jun Shao, Chunming Tang
A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid
IEEE Systems Journal 14(1): 900-908 (2020)
Paper Link
2019
- Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
The Computer Journal 62(12): 1840-1848 (2019) Paper Link
- Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Haomiao Yang
An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare
IEEE Internet of Things Journal 6(2): 3284-3297 (2019) Paper Link
- Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
Information Sciences 498: 91-105 (2019) Paper Link
- Yandong Zheng, Rongxing Lu, Jun Shao
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
Journal of Medical Systems 43(5): 123:1-123:13 (2019) Paper Link
- Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang
Cryptographic primitives in blockchains
Journal of Network and Computer Applications 127: 43-58 (2019) Paper Link
2018
- Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali A. Ghorbani
A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment
IEEE Access 6: 48946-48957 (2018) Paper Link
- Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
CCA-secure ABE with outsourced decryption for fog computing
Future Generation Computer Systems 78: 730-738 (2018) Paper Link
- Jun Shao, Guiyi Wei
Secure Outsourced Computation in Connected Vehicular Cloud Computing
IEEE Network 32(3): 36-41 (2018) Paper Link
- Yunguo Guan, Jun Shao, Guiyi Wei*, Mande Xie
Data Security and Privacy in Fog Computing
IEEE Network 32(5): 106-111 (2018)
Paper Link
- Cong Zuo, Jun Shao*, Joseph K. Liu, Guiyi Wei, Yun Ling
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
IEEE Transactions on Information Forensics and Security 13(1): 186-196 (2018) Paper Link
2017
- Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang
Minimal logarithmic signatures for one type of classical groups
Applicable Algebra in Engineering, Communication and Computing 28(2): 177-192 (2017)
Paper Link
- Khalid Alharbi, Xiaodong Lin, Jun Shao
A Privacy-Preserving Data-Sharing Framework for Smart Grid
IEEE Internet of Things Journal 4(2): 555-562 (2017)
Paper Link
- Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
Information Sciences 420: 37-48 (2017)
Paper Link
- Cong Zuo, Kaitai Liang, Zoe L. Jiang*, Jun Shao, Jun-bin Fang
Cost-effective privacy-preserving vehicular urban sensing system
Personal and Ubiquitous Computing 21(5): 893-901 (2017)
Paper Link
- Hao Hu, Rongxing Lu, Zonghua Zhang, Jun Shao
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET
IEEE Transactions on Vehicular Technology 66(2): 1786-1797 (2017)
Paper Link
2016
- Yong Deng, Guiyi Wei, Mande Xie, Jun Shao
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications
Mobile Information Systems 2016: 8686945:1-8686945:10 (2016)
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang
Secure bidirectional proxy re-encryption for cryptographic cloud storage
Pervasive and Mobile Computing 28: 113-121 (2016)
Paper Link
- Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, Jun Shao
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
IEEE Transactions on Information Forensics and Security 11(8): 1847-1861 (2016)
Paper Link
- Jun Shao, Xiaodong Lin, Rongxing Lu, Cong Zuo
A Threshold Anonymous Authentication Protocol for VANETs
IEEE Transactions on Vehicular Technology 65(3): 1711-1720 (2016)
Paper Link
2015
- Jinlin Zhang, Jun Shao*, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
Efficient multiple sources network coding signature in the standard model
Concurrency and Computation: Practice and Experience 27(10): 2616-2636 (2015)
Paper Link
- Guiyi Wei, Jun Shao*, Yang Xiang, Pingping Zhu, Rongxing Lu
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
Information Sciences 318: 111-122 (2015)
Paper Link
- Kai Chen, Jun Shao
Preface to special issue on miscellaneous emerging security problems
EAI Endorsed Transactions on Security and Safety 2(4): e1 (2015)
Paper Link
2014
- Jun Shao
Efficient verifiable multi-secret sharing scheme based on hash function
Information Sciences 278: 104-109 (2014)
Paper Link
- Guiyi Wei, Rongxing Lu, Jun Shao*
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Journal of Computer and System Sciences 80(8): 1549-1562 (2014)
Paper Link
- Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao
Toward efficient and privacy-preserving computing in big data era
IEEE Network 28(4): 46-50 (2014)
Paper Link
2013
- Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences 247: 188-201 (2013)
Paper Link
- Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
IEEE Transactions on Information Forensics and Security 8(6): 985-997 (2013)
Paper Link
2012
- Jun Shao, Zhenfu Cao
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
Information Sciences 206: 83-95 (2012)
Paper Link
- Guiyi Wei, Xianbo Yang, Jun Shao
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
KSII Transactions on Internet and Information Systems 6(12): 3352-3365 (2012)
Paper Link
- Jun Shao, Peng Liu, Yuan Zhou
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software 85(3): 655-665 (2012)
Paper Link
- Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
Anonymous proxy re-encryption
Security and Communication Networks 5(5): 439-449 (2012)
Paper Link
2011
- Jun Shao, Zhenfu Cao, Peng Liu
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
Security and Communication Networks 4(2): 122-135 (2011)
Paper Link
2010
- Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin
Proxy re-encryption with keyword search
Information Sciences 180(13): 2576-2587 (2010)
Paper Link
- Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences 180(13): 2618-2632 (2010)
Paper Link
2008
- Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang
New (t, n) threshold directed signature scheme with provable security
Information Sciences 178(3): 756-765 (2008)
Paper Link
2007
- Rongxing Lu, Zhenfu Cao, Jun Shao
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
International Journal of Network Security 4(3): 248-253 (2007)
Paper Link
- Jun Shao, Zhenfu Cao, Rongxing Lu
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software 80(2): 172-177 (2007)
Paper Link
2006
- Jun Shao, Zhenfu Cao
A traceable threshold signature scheme with multiple signing policies
Computers & Security 25(3): 201-206 (2006)
Paper Link
- Jun Shao, Zhenfu Cao, Rongxing Lu
An improved deniable authentication protocol
Networks 48(4): 179-181 (2006)
Paper Link
2005
- Jun Shao, Zhenfu Cao
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
Applied Mathematics and Computation 168(1): 135-140 (2005)
Paper Link