Accepted But not Officially Published
- Yandong Zheng, Rongxing Lu, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query over Encrypted Data
IEEE Transactions on Services Computing
Paper Link
- Yandong Zheng, Rongxing Lu, Songnian Zhang, Jun Shao, Hui Zhu
Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data
IEEE Transactions on Dependable and Secure Computing
Paper Link
- Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
Efficient and Privacy-Preserving Aggregate Query over Public Property Graphs
IEEE Transactions on Big Data
Paper Link
- Yunguo Guan, Rongxing Lu*, Songnian Zhang, Yandong Zheng, Jun Shao, Guiyi Wei
kTCQ: Achieving Privacy-Preserving k-Truss Community Queries Over Outsourced Data
IEEE Transactions on Dependable and Secure Computing
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud
IEEE Transactions on Dependable and Secure Computing
Paper Link
2024
- Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao*, Liming Fang, Rongxing Lu, Guiyi Wei
Anonymous Multi-Hop Payment for Payment Channel Networks
IEEE Transactions on Dependable and Secure Computing 21(1): 476-485 (2024)
Paper Link
- Ruixuan Li, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Xiaoqi Jia, Guiyi Wei
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services
IEEE Transactions on Dependable and Secure Computing 21(1): 125-138 (2024)
Paper Link
2023
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
SecBerg: Secure and Practical Iceberg Queries in Cloud
IEEE Transactions on Services Computing 16(5): 3696-3710 (2023)
Paper Link
- Ruixuan Li, Xiaofeng Jia, Zhenyong Zhang, Jun Shao*, Rongxing Lu, Jingqiang Lin, Xiaoqi Jia, Guiyi Wei
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy
IEEE/ACM Transactions on Networking 31(6): 2793-2808 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Fengwei Wang, Hui Zhu
Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query
IEEE Transactions on Services Computing 16(4): 2620-2631 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Fengwei Wang, Jun Shao, Hui Zhu
PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 20(5): 4387-4402 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 20(5): 3770-3786 (2023)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Achieving Privacy-Preserving Discrete Frchet Distance Range Queries
IEEE Transactions on Dependable and Secure Computing 20(3): 2097-2110 (2023)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Achieving Efficient and Privacy-Preserving (\alpha,\beta)-Core Query over Bipartite Graphs in Cloud
IEEE Transactions on Dependable and Secure Computing 20(3): 1979-1993 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Towards Efficient and Privacy-Preserving Interval Skyline Queries over Time Series Data
IEEE Transactions on Dependable and Secure Computing 20(2): 1348-1363 (2023)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
Towards Efficient and Privacy-Preserving User-Defined Skyline Query over Single Cloud
IEEE Transactions on Dependable and Secure Computing 20(2): 1319-1334 (2023)
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
Efficient and Privacy-Preserving Aggregated Reverse kNN Query over Crowd-sensed Data
IEEE Transactions on Information Forensics and Security 18: 4285-4299 (2023)
Paper Link
- Xiaofeng Jia, Zhe Yu, Jun Shao*, Rongxing Lu, Guiyi Wei, Zhenguang Liu
Cross-Chain Virtual Payment Channels
IEEE Transactions on Information Forensics and Security 18: 3401-3413 (2023)
Paper Link
- Xin Hou, Xiaofeng Jia*, Jun Shao
Public key encryption with public-verifiable decryption delegation and its application
Journal of Information Security and Applications 75: 103513 (2023)
Paper Link
- Genhua Lu, Xiaofeng Jia, Yi Zhang, Jun Shao*, Guiyi Wei
A domain name management system based on account-based consortium blockchain
Peer-to-Peer Networking and Applications 16: 1211–1226 (2023)
Paper Link
- Yandong Zheng, Hui Zhu, Rongxing Lu, Yunguo Guan, Songnian Zhang, Fengwei Wang, Jun Shao, Hui Li
PGSim: Efficient and Privacy-Preserving Graph Similarity Query over Encrypted Data in Cloud
IEEE Transactions on Information Forensics and Security 18: 2030-2045 (2023)
Paper Link
- Yandong Zheng, Rongxing Lu*, Hui Zhu, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Li
SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
IEEE Transactions on Information Forensics and Security 18: 888-903 (2023)
Paper Link
- Wei Liu, Zhiguo Wan*, Jun Shao, Yong Yu
HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain
IEEE Transactions on Dependable and Secure Computing 20(1): 360-376 (2023)
Paper Link
2022
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
EPGQ: Efficient and Private Feature-based Group Nearest Neighbor Query over Road Networks
IEEE Internet of Things Journal 9(20): 20492-20502 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yandong Zheng, Yunguo Guan, Jun Shao
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks
IEEE Internet of Things Journal 9(20): 20178-20188 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Towards Practical and Privacy-Preserving Multi-dimensional Range Query over Cloud
IEEE Transactions on Dependable and Secure Computing 19(5): 3478-3493 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Efficient Privacy-Preserving Similarity Range Query with Quadsector Tree in eHealthcare.
IEEE Transactions on Services Computing 15(5): 2742-2754 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Achieving Efficient and Privacy-Preserving Set Containment Search over Encrypted Data.
IEEE Transactions on Services Computing 15(5): 2604-2618 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Efficient and Privacy-Preserving Similarity Range Query over Encrypted Time Series Data.
IEEE Transactions on Dependable and Secure Computing 19(4): 2501-2516 (2022)
Paper Link
- Yunguo Guan, Hui Zheng, Jun Shao*, Rongxing Lu, Guiyi Wei
Fair Outsourcing Polynomial Computation Based on the Blockchain.
IEEE Transactions on Services Computing 15(5): 2795-2808 (2022)
Paper Link Demo
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Fengwei Wang, Hui Zhu
PMRQ: Achieving Efficient and Privacy-Preserving Multi-Dimensional Range Query in eHealthcare
IEEE Internet of Things Journal 9(18): 17468-17479 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu, Yunguo Guan, Yandong Zheng, Jun Shao
Toward Privacy-Preserving Aggregate Reverse Skyline Query with Strong Security
IEEE Transactions on Information Forensics and Security 17: 2538-2552 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Jun Shao, Fan Yin, Hui Zhu
Achieving Practical Symmetric Searchable Encryption with Search Pattern Privacy over Cloud
IEEE Transactions on Services Computing 15(3): 1358-1370 (2022)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Yunguo Guan, Jun Shao
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis
IEEE Internet of Things Journal 9(12): 9973-9986 (2022)
Paper Link
- Xichen Zhang, Rongxing Lu*, Jun Shao, Fengwei Wang, Hui Zhu, Ali A. Ghorbani
FedSky: An Efficient and Privacy-preserving Scheme for Federated Mobile Crowdsensing
IEEE Internet of Things Journal 9(7): 5344-5356 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Songnian Zhang, Jun Shao, Hui Zhu
Efficient and Privacy-Preserving Similarity Query with Access Control in eHealthcare
IEEE Transactions on Information Forensics and Security 17(2): 880-893 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Yunguo Guan, Jun Shao, Hui Zhu
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
IEEE Transactions on Dependable and Secure Computing 19(2): 1090-1103 (2022)
Paper Link
- Jun Shao, Rongxing Lu, Yunguo Guan, Guiyi Wei
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud
IEEE Transactions on Services Computing 15(1): 124-137 (2022)
Paper Link Demo
- Xue Yang, Rongxing Lu*, Jun Shao, Xiaohu Tang, Ali Ghorbani
Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud
IEEE Transactions on Dependable and Secure Computing 19(1): 591-606 (2022)
Paper Link
- Cong Zuo, Shifeng Sun*, Joseph K. Liu*, Jun Shao, Josef Pieprzyk, Lei Xu
Forward and Backward Private DSSE for Range Queries
IEEE Transactions on Dependable and Secure Computing 19(1): 328-338 (2022)
Paper Link
- Yandong Zheng, Rongxing Lu*, Songnian Zhang, Yunguo Guan, Jun Shao, Hui Zhu
Toward Privacy-Preserving Healthcare Monitoring based on Time-Series Activities over Cloud.
IEEE Internet of Things Journal 9(2): 1276-1288. (2022)
Paper Link
2021
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Songnian Zhang, Jun Shao, Guiyi Wei
Toward Privacy-Preserving Cybertwin-Based Spatio-Temporal Keyword Query for ITS in 6G Era.
IEEE Internet of Things Journal 8(22): 16243-16255. (2021)
Paper Link
- Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Ali Ghorbani
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud
IEEE Transactions on Services Computing 14(5): 1292-1305. (2021)
Paper Link
- Yunguo Guan, Rongxing Lu*, Yandong Zheng, Jun Shao, Guiyi Wei
Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
IEEE Internet of Things Journal 8(18): 14219-14231 (2021)
Paper Link
- Fan Yin, Rongxing Lu*, Yandong Zheng, Jun Shao, Xue Yang, Xiaohu Tang
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Computers & Security 110, 2021, 102432
Paper Link
- Guiyi Wei, Xiaohang Mao, Rongxing Lu, Jun Shao*, Yunguo Guan, Genhua Lu
Achieve space-efficient key management in lightning network.
Computer Networks 108346 (2021)
Paper Link
- Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
Continuous probabilistic skyline query for secure worker selection in mobile crowdsensing.
IEEE Internet of Things Journal 8(14): 11758-11772 (2021)
Paper Link
- Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning*, Jun Sun, Joseph K. Liu, Yibao Bao
hPRESS: A Hardware-enhanced Proxy Re-encryption Scheme using Secure Enclave
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 40(6): 1144-1157 (2021)
Paper Link
- Songnian Zhang, Suprio Ray, Rongxing Lu*, Yandong Zheng, Jun Shao
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing
IEEE Internet of Things Journal 8(11): 9139-9150 (2021)
Paper Link
- Hassan Mahdikhani, Rongxing Lu*, Jun Shao, Ali Ghorbani
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT
IEEE Internet of Things Journal 8(6): 4762-4774 (2021)
Paper Link
- Xiaopeng Zhao, Zhenfu Cao*, Xiaolei Dong, Jun Shao
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
Designs, Codes and Cryptography 89(2): 241-253 (2021)
Paper Link
2020
- Xichen Zhang, Rongxing Lu*, Jun Shao, Hui Zhu, Ali A. Ghorbani
Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS
IEEE Internet of Things Journal 7(12): 11524-11535 (2020)
Paper Link
- Hui Zheng, Jun Shao*, Guiyi Wei
Attribute-based encryption with outsourced decryption in blockchain
Peer-to-Peer Networking and Applications 13(5): 1643-1655 (2020)
Paper Link
- Hassan Mahdikhani, Rongxing Lu, Yandong Zheng, Jun Shao, Ali Ghorbani
Achieving ${O(\log^3n)}$ Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT
IEEE Internet of Things Journal 7(6): 5220-5232 (2020)
Paper Link
- Jingcheng Song, Yining Liu, Jun Shao, Chunming Tang
A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid
IEEE Systems Journal 14(1): 900-908 (2020)
Paper Link
2019
- Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
The Computer Journal 62(12): 1840-1848 (2019) Paper Link
- Xue Yang, Rongxing Lu, Jun Shao, Xiaohu Tang, Haomiao Yang
An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare
IEEE Internet of Things Journal 6(2): 3284-3297 (2019) Paper Link
- Yandong Zheng, Rongxing Lu, Beibei Li, Jun Shao, Haomiao Yang, Kim-Kwang Raymond Choo
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data
Information Sciences 498: 91-105 (2019) Paper Link
- Yandong Zheng, Rongxing Lu, Jun Shao
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data
Journal of Medical Systems 43(5): 123:1-123:13 (2019) Paper Link
- Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang
Cryptographic primitives in blockchains
Journal of Network and Computer Applications 127: 43-58 (2019) Paper Link
2018
- Wei Guo, Jun Shao, Rongxing Lu, Yining Liu, Ali A. Ghorbani
A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment
IEEE Access 6: 48946-48957 (2018) Paper Link
- Cong Zuo, Jun Shao*, Guiyi Wei, Mande Xie, Min Ji
CCA-secure ABE with outsourced decryption for fog computing
Future Generation Computer Systems 78: 730-738 (2018) Paper Link
- Jun Shao, Guiyi Wei
Secure Outsourced Computation in Connected Vehicular Cloud Computing
IEEE Network 32(3): 36-41 (2018) Paper Link
- Yunguo Guan, Jun Shao, Guiyi Wei*, Mande Xie
Data Security and Privacy in Fog Computing
IEEE Network 32(5): 106-111 (2018)
Paper Link
- Cong Zuo, Jun Shao*, Joseph K. Liu, Guiyi Wei, Yun Ling
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage
IEEE Transactions on Information Forensics and Security 13(1): 186-196 (2018) Paper Link
2017
- Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang
Minimal logarithmic signatures for one type of classical groups
Applicable Algebra in Engineering, Communication and Computing 28(2): 177-192 (2017)
Paper Link
- Khalid Alharbi, Xiaodong Lin, Jun Shao
A Privacy-Preserving Data-Sharing Framework for Smart Grid
IEEE Internet of Things Journal 4(2): 555-562 (2017)
Paper Link
- Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants
Information Sciences 420: 37-48 (2017)
Paper Link
- Cong Zuo, Kaitai Liang, Zoe L. Jiang*, Jun Shao, Jun-bin Fang
Cost-effective privacy-preserving vehicular urban sensing system
Personal and Ubiquitous Computing 21(5): 893-901 (2017)
Paper Link
- Hao Hu, Rongxing Lu, Zonghua Zhang, Jun Shao
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET
IEEE Transactions on Vehicular Technology 66(2): 1786-1797 (2017)
Paper Link
2016
- Yong Deng, Guiyi Wei, Mande Xie, Jun Shao
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications
Mobile Information Systems 2016: 8686945:1-8686945:10 (2016)
Paper Link
- Jun Shao, Rongxing Lu, Xiaodong Lin, Kaitai Liang
Secure bidirectional proxy re-encryption for cryptographic cloud storage
Pervasive and Mobile Computing 28: 113-121 (2016)
Paper Link
- Lichun Li, Rongxing Lu, Kim-Kwang Raymond Choo, Anwitaman Datta, Jun Shao
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
IEEE Transactions on Information Forensics and Security 11(8): 1847-1861 (2016)
Paper Link
- Jun Shao, Xiaodong Lin, Rongxing Lu, Cong Zuo
A Threshold Anonymous Authentication Protocol for VANETs
IEEE Transactions on Vehicular Technology 65(3): 1711-1720 (2016)
Paper Link
2015
- Jinlin Zhang, Jun Shao*, Yun Ling, Min Ji, Guiyi Wei, Bishan Ying
Efficient multiple sources network coding signature in the standard model
Concurrency and Computation: Practice and Experience 27(10): 2616-2636 (2015)
Paper Link
- Guiyi Wei, Jun Shao*, Yang Xiang, Pingping Zhu, Rongxing Lu
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption
Information Sciences 318: 111-122 (2015)
Paper Link
- Kai Chen, Jun Shao
Preface to special issue on miscellaneous emerging security problems
EAI Endorsed Transactions on Security and Safety 2(4): e1 (2015)
Paper Link
2014
- Jun Shao
Efficient verifiable multi-secret sharing scheme based on hash function
Information Sciences 278: 104-109 (2014)
Paper Link
- Guiyi Wei, Rongxing Lu, Jun Shao*
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Journal of Computer and System Sciences 80(8): 1549-1562 (2014)
Paper Link
- Rongxing Lu, Hui Zhu, Ximeng Liu, Joseph K. Liu, Jun Shao
Toward efficient and privacy-preserving computing in big data era
IEEE Network 28(4): 46-50 (2014)
Paper Link
2013
- Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences 247: 188-201 (2013)
Paper Link
- Huang Lin, Jun Shao, Chi Zhang, Yuguang Fang
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
IEEE Transactions on Information Forensics and Security 8(6): 985-997 (2013)
Paper Link
2012
- Jun Shao, Zhenfu Cao
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
Information Sciences 206: 83-95 (2012)
Paper Link
- Guiyi Wei, Xianbo Yang, Jun Shao
Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
KSII Transactions on Internet and Information Systems 6(12): 3352-3365 (2012)
Paper Link
- Jun Shao, Peng Liu, Yuan Zhou
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software 85(3): 655-665 (2012)
Paper Link
- Jun Shao, Peng Liu, Guiyi Wei, Yun Ling
Anonymous proxy re-encryption
Security and Communication Networks 5(5): 439-449 (2012)
Paper Link
2011
- Jun Shao, Zhenfu Cao, Peng Liu
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
Security and Communication Networks 4(2): 122-135 (2011)
Paper Link
2010
- Jun Shao, Zhenfu Cao, Xiaohui Liang, Huang Lin
Proxy re-encryption with keyword search
Information Sciences 180(13): 2576-2587 (2010)
Paper Link
- Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao
Secure threshold multi authority attribute based encryption without a central authority
Information Sciences 180(13): 2618-2632 (2010)
Paper Link
2008
- Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, Xiaohui Liang
New (t, n) threshold directed signature scheme with provable security
Information Sciences 178(3): 756-765 (2008)
Paper Link
2007
- Rongxing Lu, Zhenfu Cao, Jun Shao
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification
International Journal of Network Security 4(3): 248-253 (2007)
Paper Link
- Jun Shao, Zhenfu Cao, Rongxing Lu
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software 80(2): 172-177 (2007)
Paper Link
2006
- Jun Shao, Zhenfu Cao
A traceable threshold signature scheme with multiple signing policies
Computers & Security 25(3): 201-206 (2006)
Paper Link
- Jun Shao, Zhenfu Cao, Rongxing Lu
An improved deniable authentication protocol
Networks 48(4): 179-181 (2006)
Paper Link
2005
- Jun Shao, Zhenfu Cao
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme
Applied Mathematics and Computation 168(1): 135-140 (2005)
Paper Link