Jun Shao
#183,369
Most Influential Person Now
Jun Shao's AcademicInfluence.com Rankings
Jun Shaocomputer-science Degrees
Computer Science
#11707
World Rank
#12437
Historical Rank
Big Data
#31
World Rank
#31
Historical Rank
Database
#8786
World Rank
#9224
Historical Rank

Download Badge
Computer Science
Jun Shao's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Tsinghua University
Similar Degrees You Can Earn
Why Is Jun Shao Influential?
(Suggest an Edit or Addition)Jun Shao's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Toward efficient and privacy-preserving computing in big data era (2014) (312)
- Attribute based proxy re-encryption with delegating capabilities (2009) (253)
- CCA-Secure Proxy Re-Encryption without Pairings (2009) (229)
- A Threshold Anonymous Authentication Protocol for VANETs (2016) (211)
- Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases (2016) (176)
- Proxy re-encryption with keyword search (2010) (156)
- CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring (2013) (137)
- REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET (2017) (131)
- CCA-secure ABE with outsourced decryption for fog computing (2018) (129)
- Cryptographic primitives in blockchains (2019) (123)
- FINE: A fine-grained privacy-preserving location-based service framework for mobile devices (2014) (122)
- A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme (2005) (93)
- Secure threshold multi authority attribute based encryption without a central authority (2008) (86)
- A Dynamic Membership Data Aggregation (DMDA) Protocol for Smart Grid (2020) (71)
- Data Security and Privacy in Fog Computing (2018) (70)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (2012) (67)
- Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption (2015) (56)
- Proxy Re-signature Schemes Without Random Oracles (2007) (54)
- PLAM: A privacy-preserving framework for local-area mobile social networks (2014) (52)
- Identity-Based Conditional Proxy Re-Encryption (2011) (50)
- Fine-grained data sharing in cloud computing for mobile devices (2015) (48)
- Short Group Signature Without Random Oracles (2007) (48)
- Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage (2018) (48)
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security (2018) (45)
- Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy (2019) (38)
- Anonymous proxy re-encryption (2012) (35)
- Efficient verifiable multi-secret sharing scheme based on hash function (2014) (34)
- Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT (2020) (29)
- Anonymous ID-Based Proxy Re-Encryption (2012) (29)
- Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol (2012) (28)
- New (t, n) threshold directed signature scheme with provable security (2008) (28)
- An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare (2019) (25)
- Secure bidirectional proxy re-encryption for cryptographic cloud storage (2016) (24)
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power (2007) (23)
- SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption (2011) (23)
- EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (2014) (22)
- FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System (2016) (22)
- EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques (2016) (22)
- Achieving key privacy without losing CCA security in proxy re-encryption (2012) (22)
- A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment (2018) (22)
- Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security (2008) (21)
- Multi-Use Unidirectional Proxy Re-Encryption (2011) (21)
- Attribute-based encryption with outsourced decryption in blockchain (2020) (20)
- Improvement of Yang et al.'s threshold proxy signature scheme (2007) (19)
- CCA-Secure PRE Scheme without Random Oracles (2010) (19)
- Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud (2018) (19)
- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key (2010) (18)
- New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems (2010) (18)
- Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data (2019) (18)
- A Privacy-Preserving Data-Sharing Framework for Smart Grid (2017) (17)
- CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy (2010) (17)
- Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data (2019) (16)
- Unidirectional Identity-Based Proxy Re-Signature (2011) (16)
- An improved deniable authentication protocol (2006) (16)
- Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data (2021) (16)
- A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices (2021) (16)
- Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era (2021) (14)
- Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud (2020) (13)
- Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data (2022) (13)
- RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security (2014) (13)
- New threshold anonymous authentication for VANETs (2015) (12)
- Forward and Backward Private DSSE for Range Queries (2022) (11)
- Efficient ID-based Threshold Signature Schemes without Pairings (2006) (11)
- Secure Outsourced Computation in Connected Vehicular Cloud Computing (2018) (11)
- Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS (2020) (10)
- Signing with multiple ID's and a single key (2011) (10)
- Efficient multiple sources network coding signature in the standard model (2013) (9)
- LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants (2017) (9)
- Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud (2022) (9)
- A traceable threshold signature scheme with multiple signing policies (2006) (8)
- Efficient Certificate-Based Signature and Its Aggregation (2017) (8)
- Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud (2022) (8)
- Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities (2021) (7)
- Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing (2021) (7)
- Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries (2020) (7)
- More Efficient Cryptosystems From k-th Power Residues (2013) (7)
- Cost-effective privacy-preserving vehicular urban sensing system (2017) (6)
- Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform (2021) (6)
- Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud (2022) (6)
- Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy (2019) (6)
- Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources (2019) (6)
- Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing (2021) (5)
- Pairing-Based Two-Party Authenticated Key Agreement Protocol (2005) (5)
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption (2016) (5)
- Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare (2022) (5)
- An Efficient Certified Email Protocol (2007) (5)
- On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification (2007) (5)
- Certificate-based proxy decryption systems with revocability in the standard model (2013) (4)
- A New Design of Online/Offline Signatures Based on Lattice (2018) (4)
- Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT (2021) (4)
- Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data (2022) (4)
- Fair Outsourcing Polynomial Computation Based on the Blockchain (2021) (4)
- CCA-Secure PRE Scheme without Public Verifiability (2010) (4)
- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost (2019) (3)
- Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data (2020) (3)
- Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption (2019) (3)
- Efficient signature-encryption scheme for mobile computation (2011) (3)
- A New Secure Encryption Scheme Based on Group Factorization Problem (2019) (3)
- Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing (2019) (3)
- New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol (2020) (3)
- hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave (2020) (3)
- A framework for privacy-preserving data sharing in the Smart Grid (2014) (3)
- Hidden-Token Searchable Public-Key Encryption (2017) (3)
- New Cryptosystems From CSP-Based Self-Distributive Systems (2009) (2)
- Achieve space-efficient key management in lightning network (2021) (2)
- Efficient Password-Based Authenticated Key Exchange Without Public Information (2007) (1)
- Minimal logarithmic signatures for one type of classical groups (2015) (1)
- Fully Secure Proxy Re-Encryption without Random Oracles (2007) (1)
- Blockchain-Based Sealed-Bid Domain Name Auction Protocol (2021) (1)
- Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity (2020) (1)
- A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type (2019) (1)
- Attribute-based encryption with outsourced decryption in blockchain (2020) (0)
- A Miniature CCA2 Public key Encryption scheme based on non-Abelian factorization problems in Lie Groups (2016) (0)
- A domain name management system based on account-based consortium blockchain (2023) (0)
- A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment (2020) (0)
- New Assumptions and Efficient Cryptosystems from Power Residue Symbols (2020) (0)
- Efficient and secure electronic resume using smart cards (2011) (0)
- 1-out-of-2 signature (2011) (0)
- Public Key Encryption in Non-Abelian Groups (2016) (0)
- A CCA secure public key encryption scheme based on finite groups of Lie type (2021) (0)
- A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms (2020) (0)
- Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications (2016) (0)
- Achieve Efficient Position-Heap-based Privacy-Preserving Substring-of-Keyword Query over Cloud (2021) (0)
- Novel conic-based group signature scheme with revocation (2011) (0)
- New Efficient Identity-Based Encryption From Factorization (2013) (0)
- Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data (2019) (0)
- Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities (2020) (0)
This paper list is powered by the following services: