default search action
Shaoquan Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i19]Somnath Panja, Setareh Sharifian, Shaoquan Jiang, Reihaneh Safavi-Naini:
CCA-Secure Hybrid Encryption in Correlated Randomness Model and KEM Combiners. CoRR abs/2401.00983 (2024) - [i18]Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini:
Robust and Reusable Fuzzy Extractors for Low-entropy Rate Randomness Sources. CoRR abs/2405.04021 (2024) - [i17]Shaoquan Jiang:
Quantum Security of a Compact Multi-Signature. IACR Cryptol. ePrint Arch. 2024: 1344 (2024) - 2023
- [c23]Sabyasachi Dutta, Shaoquan Jiang, Reihaneh Safavi-Naini:
Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing. CANS 2023: 468-493 - [c22]Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini:
A One-way Secret Key Agreement with Security Against Active Adversaries. ISIT 2023: 2314-2319 - [i16]Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures for Blockchain: A Compiler with Realizations. CoRR abs/2301.08668 (2023) - [i15]Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini:
A One-way Secret Key Agreement with Security Against Active Adversaries. CoRR abs/2302.13176 (2023) - [i14]Shaoquan Jiang, Dima Alhadidi, Hamid Fazli Khojir:
Key-and-Signature Compact Multi-Signatures: A Compiler with Realizations. IACR Cryptol. ePrint Arch. 2023: 61 (2023) - [i13]Somnath Panja, Nikita Tripathi, Shaoquan Jiang, Reihaneh Safavi-Naini:
Robust and Reusable Fuzzy Extractors and their Application to Authentication from Iris Data. IACR Cryptol. ePrint Arch. 2023: 284 (2023) - 2022
- [j29]Shaoquan Jiang, Yeow Meng Chee, San Ling, Huaxiong Wang, Chaoping Xing:
A new framework for deniable secure key exchange. Inf. Comput. 285(Part): 104866 (2022) - [j28]Dajiang Chen, Shaoquan Jiang, Ning Zhang, Lei Liu, Kim-Kwang Raymond Choo:
On Message Authentication Channel Capacity Over a Wiretap Channel. IEEE Trans. Inf. Forensics Secur. 17: 3107-3122 (2022) - 2020
- [c21]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. Public Key Cryptography (1) 2020: 396-427 - [i12]Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen, Huaxiong Wang:
PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 140 (2020)
2010 – 2019
- 2018
- [j27]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j26]Shaoquan Jiang, Jue Li, Yongjian Liao:
Efficient approximate message authentication scheme. IET Inf. Secur. 12(1): 100-106 (2018) - [j25]Shaoquan Jiang, Min Li, Zailiang Tang:
A New Scheme for Source-location Privacy in Wireless Sensor Networks. Int. J. Netw. Secur. 20(5): 879-889 (2018) - [j24]Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - 2017
- [j23]Shaoquan Jiang:
Bounds for Message Authentication with Distortion. Comput. J. 60(4): 497-506 (2017) - 2016
- [j22]Shaoquan Jiang, Zailiang Tang, Mingsheng Wang:
On the CLD Attack to a Statistical Model of a Key Stream Generator. Int. J. Netw. Secur. 18(5): 987-992 (2016) - [j21]Shaoquan Jiang:
On message authentication with a correlated setup. Inf. Process. Lett. 116(4): 289-293 (2016) - [j20]Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang:
Special issue on provable security. Secur. Commun. Networks 9(12): 1635-1637 (2016) - [j19]Shaoquan Jiang:
Group Key Agreement with Local Connectivity. IEEE Trans. Dependable Secur. Comput. 13(3): 326-339 (2016) - 2015
- [j18]Shaoquan Jiang:
On τ-time secure key agreement. Sci. China Inf. Sci. 58(1): 1-13 (2015) - [j17]Shaoquan Jiang:
On the Optimality of Keyless Authentication in a Noisy Model. IEEE Trans. Inf. Forensics Secur. 10(6): 1250-1261 (2015) - [j16]Shaoquan Jiang:
On the Size of Source Space in a Secure MAC. IEEE Trans. Inf. Forensics Secur. 10(9): 2007-2015 (2015) - [c20]Dajiang Chen, Shaoquan Jiang, Zhiguang Qin:
Message Authentication Code over a wiretap channel. ISIT 2015: 2301-2305 - 2014
- [j15]Shengke Zeng, Shaoquan Jiang:
A New Framework for Conditionally Anonymous Ring Signature. Comput. J. 57(4): 567-578 (2014) - [j14]Shaoquan Jiang:
On Unconditional ϵ-Security of Private Key Encryption. Comput. J. 57(10): 1570-1579 (2014) - [j13]Shaoquan Jiang:
Persistent asymmetric password-based key exchange. J. Math. Cryptol. 8(1): 31-70 (2014) - [j12]Shaoquan Jiang:
Timed encryption with application to deniable key exchange. Theor. Comput. Sci. 560: 172-189 (2014) - [j11]Shaoquan Jiang:
Keyless Authentication in a Noisy Model. IEEE Trans. Inf. Forensics Secur. 9(6): 1024-1033 (2014) - [j10]Shaoquan Jiang:
(Im)possibility of Deterministic Commitment Over a Discrete Memoryless Channel. IEEE Trans. Inf. Forensics Secur. 9(9): 1406-1415 (2014) - [i11]Shaoquan Jiang:
On the Optimality of Keyless Authentication in a Noisy Model. CoRR abs/1409.1657 (2014) - 2013
- [i10]Dajiang Chen, Shaoquan Jiang, Zhiguang Qin:
Rate Efficient Authentication over a Wiretap Channel. CoRR abs/1310.3902 (2013) - 2012
- [j9]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Attribute-based encryption without key cloning. Int. J. Appl. Cryptogr. 2(3): 250-270 (2012) - [j8]Shengke Zeng, Shaoquan Jiang, Zhiguang Qin:
An efficient conditionally anonymous ring signature in the random oracle model. Theor. Comput. Sci. 461: 106-114 (2012) - [c19]Shaoquan Jiang:
Timed Encryption with Application to Deniable Key Exchange. TAMC 2012: 248-259 - [e1]Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5 [contents] - 2011
- [j7]Reihaneh Safavi-Naini, Shaoquan Jiang:
Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions. Int. J. Found. Comput. Sci. 22(6): 1369-1393 (2011) - [j6]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin:
On Optimal Secure Message Transmission by Public Discussion. IEEE Trans. Inf. Theory 57(1): 572-585 (2011) - [c18]Shengke Zeng, Shaoquan Jiang, Zhiguang Qin:
A New Conditionally Anonymous Ring Signature. COCOON 2011: 479-491 - 2010
- [j5]Hongsong Shi, Shaoquan Jiang, Zhiguang Qin:
More efficient DDH pseudorandom generators. Des. Codes Cryptogr. 55(1): 45-64 (2010) - [c17]Shaoquan Jiang:
Dwork-Naor ZAP and Its Application in Deniable Authentication, Revisited. Inscrypt 2010: 443-454 - [c16]Shaoquan Jiang, Huaxiong Wang:
Plaintext-Awareness of Hybrid Encryption. CT-RSA 2010: 57-72 - [i9]Shaoquan Jiang:
Persistent Asymmetric Password-Based Key Exchange. CoRR abs/1004.3037 (2010) - [i8]Shaoquan Jiang:
Timed Encryption and Its Application. IACR Cryptol. ePrint Arch. 2010: 546 (2010)
2000 – 2009
- 2009
- [c15]Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini:
Corruption-Localizing Hashing. ESORICS 2009: 489-504 - [c14]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin:
Optimal secure message transmission by public discussion. ISIT 2009: 1313-1317 - [i7]Hongsong Shi, Shaoquan Jiang, Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin:
Optimal Secure Message Transmission by Public Discussion. CoRR abs/0901.2192 (2009) - 2008
- [c13]Reihaneh Safavi-Naini, Shaoquan Jiang:
Unconditionally secure conference key distribution: Security definitions and their relations. Allerton 2008: 1215-1220 - [c12]Reihaneh Safavi-Naini, Shaoquan Jiang:
Non-interactive conference key distribution and its applications. AsiaCCS 2008: 271-282 - [c11]Shaoquan Jiang, Reihaneh Safavi-Naini:
An Efficient Deniable Key Exchange Protocol (Extended Abstract). Financial Cryptography 2008: 47-52 - [c10]Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. IIH-MSP 2008: 64-67 - [i6]M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Attribute-Based Encryption with Key Cloning Protection. IACR Cryptol. ePrint Arch. 2008: 478 (2008) - 2007
- [c9]Shaoquan Jiang:
Deniable Authentication on the Internet. Inscrypt 2007: 298-312 - [i5]Shaoquan Jiang:
Deniable Authentication on the Internet. IACR Cryptol. ePrint Arch. 2007: 82 (2007) - 2006
- [c8]Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. ACISP 2006: 259-270 - [c7]Shaoquan Jiang, Guang Gong:
A Round and Communication Efficient Secure Ranking Protocol. CT-RSA 2006: 350-364 - [i4]Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. IACR Cryptol. ePrint Arch. 2006: 46 (2006) - 2005
- [j4]Guang Gong, Shaoquan Jiang:
The editing generator and its cryptanalysis. Int. J. Wirel. Mob. Comput. 1(1): 46-52 (2005) - [c6]Shaoquan Jiang, Guang Gong:
Efficient Authenticators with Application to Key Exchange. ICISC 2005: 81-91 - 2004
- [j3]Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong:
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences. IEEE Trans. Inf. Theory 50(11): 2911-2915 (2004) - [c5]Shaoquan Jiang, Guang Gong:
Multi-service Oriented Broadcast Encryption. ACISP 2004: 1-11 - [c4]Zongduo Dai, Shaoquan Jiang, Kyoki Imamura, Guang Gong:
Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences. ISIT 2004: 123 - [c3]Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. Selected Areas in Cryptography 2004: 267-279 - [i3]Shaoquan Jiang, Guang Gong:
Password Based Key Exchange with Mutual Authentication. IACR Cryptol. ePrint Arch. 2004: 196 (2004) - 2003
- [i2]Shaoquan Jiang, Guang Gong:
Hybrid Broadcast Encryption and Security Analysis. IACR Cryptol. ePrint Arch. 2003: 241 (2003) - 2002
- [j2]Shaoquan Jiang, Zongduo Dai, Guang Gong:
On interleaved sequences over finite fields. Discret. Math. 252(1-3): 161-178 (2002) - [i1]Shaoquan Jiang, Yufeng Zhang:
Partial Key Escrow Monitoring Scheme. IACR Cryptol. ePrint Arch. 2002: 39 (2002) - 2000
- [j1]Shaoquan Jiang, Zongduo Dai, Kyoki Imamura:
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting kappa; symbols within one period. IEEE Trans. Inf. Theory 46(3): 1174-1177 (2000) - [c2]Shaoquan Jiang, Dengguo Feng, Sihan Qing:
Analysis and Design of E-voting Protocol. SEC 2000: 281-290
1990 – 1999
- 1998
- [c1]Shaoquan Jiang, Zongduo Dai, Guang Gong:
Notes on q-ary Interleaved Sequences. SETA 1998: 273-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint