Jun Shao

Orcid: 0000-0001-8352-0973

Affiliations:
  • Zhejiang Gongshang University, Hangzhou, China


According to our database1, Jun Shao authored at least 157 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs.
IEEE Trans. Big Data, April, 2024

EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data.
IEEE Trans. Serv. Comput., 2024

Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024

PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024

Anonymous Multi-Hop Payment for Payment Channel Networks.
IEEE Trans. Dependable Secur. Comput., 2024

The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024

$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024

A Worldwide View on the Reachability of Encrypted DNS Services.
Proceedings of the ACM on Web Conference 2024, 2024

Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
A Longitudinal and Comprehensive Measurement of DNS Strict Privacy.
IEEE/ACM Trans. Netw., December, 2023

Public key encryption with public-verifiable decryption delegation and its application.
J. Inf. Secur. Appl., June, 2023

A domain name management system based on account-based consortium blockchain.
Peer Peer Netw. Appl., March, 2023

Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query.
IEEE Trans. Serv. Comput., 2023

SecBerg: Secure and Practical Iceberg Queries in Cloud.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023

PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Cross-Chain Virtual Payment Channels.
IEEE Trans. Inf. Forensics Secur., 2023

PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023

HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud.
IEEE Trans. Serv. Comput., 2022

Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare.
IEEE Trans. Serv. Comput., 2022

Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2022

Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud.
IEEE Trans. Serv. Comput., 2022

Fair Outsourcing Polynomial Computation Based on the Blockchain.
IEEE Trans. Serv. Comput., 2022

Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
IEEE Trans. Inf. Forensics Secur., 2022

Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security.
IEEE Trans. Inf. Forensics Secur., 2022

Forward and Backward Private DSSE for Range Queries.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Cyclic preparation of two-qubit state in two noisy environments.
Quantum Inf. Process., 2022

Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud.
IEEE Internet Things J., 2022

PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare.
IEEE Internet Things J., 2022

PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks.
IEEE Internet Things J., 2022

Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis.
IEEE Internet Things J., 2022

FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022

EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks.
IEEE Internet Things J., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

2021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021

Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era.
IEEE Internet Things J., 2021

Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
IEEE Internet Things J., 2021

Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices.
Future Gener. Comput. Syst., 2021

Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity.
Des. Codes Cryptogr., 2021

Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Comput. Secur., 2021

Achieve space-efficient key management in lightning network.
Comput. Networks, 2021

Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid.
IEEE Syst. J., 2020

Attribute-based encryption with outsourced decryption in blockchain.
Peer-to-Peer Netw. Appl., 2020

Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS.
IEEE Internet Things J., 2020

Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020

Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020

New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol.
IACR Cryptol. ePrint Arch., 2020

A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Cryptographic primitives in blockchains.
J. Netw. Comput. Appl., 2019

Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
J. Medical Syst., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare.
IEEE Internet Things J., 2019

Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy.
IACR Cryptol. ePrint Arch., 2019

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

A New Secure Encryption Scheme Based on Group Factorization Problem.
IEEE Access, 2019

Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
Proceedings of the Network and System Security - 13th International Conference, 2019

Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption.
Proceedings of the Network and System Security - 13th International Conference, 2019

Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Outsourced Computation in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Data Security and Privacy in Fog Computing.
IEEE Netw., 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Gener. Comput. Syst., 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

A New Design of Online/Offline Signatures Based on Lattice.
Proceedings of the Information Security Practice and Experience, 2018

Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018

2017
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET.
IEEE Trans. Veh. Technol., 2017

Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017

A Privacy-Preserving Data-Sharing Framework for Smart Grid.
IEEE Internet Things J., 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

Hidden-Token Searchable Public-Key Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Efficient Certificate-Based Signature and Its Aggregation.
Proceedings of the Information Security Practice and Experience, 2017

2016
A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive Mob. Comput., 2016

Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications.
Mob. Inf. Syst., 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

Efficient multiple sources network coding signature in the standard model.
Concurr. Comput. Pract. Exp., 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Toward efficient and privacy-preserving computing in big data era.
IEEE Netw., 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A framework for privacy-preserving data sharing in the Smart Grid.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

2013
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
IEEE Trans. Inf. Forensics Secur., 2013

Certificate-based proxy decryption systems with revocability in the standard model.
Inf. Sci., 2013

New Efficient Identity-Based Encryption From Factorization.
IACR Cryptol. ePrint Arch., 2013

More Efficient Cryptosystems From k-th Power Residues.
IACR Cryptol. ePrint Arch., 2013

Multiple Sources Network Coding Signature in the Standard Model.
Proceedings of the Internet and Distributed Computing Systems, 2013

2012
Anonymous proxy re-encryption.
Secur. Commun. Networks, 2012

Achieving key privacy without losing CCA security in proxy re-encryption.
J. Syst. Softw., 2012

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol.
KSII Trans. Internet Inf. Syst., 2012

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption.
Inf. Sci., 2012

Anonymous ID-Based Proxy Re-Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011

Unidirectional Identity-Based Proxy Re-Signature.
Proceedings of IEEE International Conference on Communications, 2011

Identity-Based Conditional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Multi-Use Unidirectional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

Novel conic-based group signature scheme with revocation.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Efficient and secure electronic resume using smart cards.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

1-out-of-2 signature.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Signing with multiple ID's and a single key.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

CCA-Secure PRE Scheme without Random Oracles.
IACR Cryptol. ePrint Arch., 2010

New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

How to Construct State Registries-Matching Undeniability with Public Security.
Proceedings of the Intelligent Information and Database Systems, 2010

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
New Cryptosystems From CSP-Based Self-Distributive Systems.
IACR Cryptol. ePrint Arch., 2009

CCA-Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

2007
Improvement of Yang et al.'s threshold proxy signature scheme.
J. Syst. Softw., 2007

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007

Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptol. ePrint Arch., 2007

Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

An Efficient Certified Email Protocol.
Proceedings of the Information Security, 10th International Conference, 2007

A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
Proceedings of the Progress in Cryptology, 2007

2006
An improved deniable authentication protocol.
Networks, 2006

Efficient ID-based Threshold Signature Schemes without Pairings.
IACR Cryptol. ePrint Arch., 2006

A traceable threshold signature scheme with multiple signing policies.
Comput. Secur., 2006

2005
Pairing-Based Two-Party Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2005

A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme.
Appl. Math. Comput., 2005


  Loading...