A. Editted Books
Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang and Yong Yu (Editors), Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings, Lecture Notes in Computer Science, Vol. 7496, Springer 2012.
Shaoquan Jiang, Tsuyoshi Takagi and GuilinWang (Guest Editors), Special Issue on Provable Security, Security and Communication Networks, Vol 9, Issue 12, August 2016.
B. Articles
Shaoquan Jiang, Quantum Authentication: Security against Authentication and Verification Queries, 2025 [eprint].
Somnath Panja, Setareh Sharifian, Shaoquan Jiang and Reihaneh Safavi-Naini, Hybrid Encryption in Correlated Randomness Model and KEM Combiners, Theoretical Computer Science, vol 1054, article 115518, 2025.
Somnath Panja, Shaoquan Jiang and Reihaneh Safavi-Naini, Information-Theoretically Secure, Robust, and Reusable Fuzzy Extractors for Structured Sources, ACM CCS Workshop on Quantum-Resistant Cryptography and Security (ACM QRSec 2025).
Shaoquan Jiang, Dima Alhadidi and Hamid Fazli Khojir, key-and-signature compact multi-signature for blockchain: a compiler with realizations, IEEE Transactions on Dependable and Secure Computing, Vol 22, No 1, pp. 579-596, Jan-Feb, 2025.
Shaoquan Jiang, Quantum Security of a Compact Multi-Signature, Cryptography, 8(4), 50, 2024. [eprint].
Sabyasachi Dutta, Shaoquan Jiang and Reihaneh Safavi-Naini, A New Lower Bound on the Share Size of Leakage Resilient Secret Sharing Schemes, New Advances in Designs, Codes and Cryptography, Charles J. Colbourn and Jeffrey H. Dinitz (Eds), Fields Institute Communications, vol 86., Springer, pp. 125-139, 2024.
/* This is the proceedings for the conference on June 13-17, 2022 in Toronto, celebrating the 66th Birthday of the well-known Canadian cryptographer Prof. Douglas R. Stinson of U of Waterloo computer science.*/
Somnath Panja, Shaoquan Jiang, Reihaneh Safavi-Naini, A One-way Secret Key Agreement with Security Against Active Adversaries, IEEE Symposium on Information Theory 2023, Taipei, Taiwan, June 25-30, 2023.
Sabyasachi Dutta, Shaoquan Jiang and Reihaneh Safavi-Naini, Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing, the 22nd International Conference on Cryptology and Network Security (CANS'23), Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann (Eds.), LNCS 14342, pp. 468-493, Geogia, USA, Oct 31-Nov 2, 2023.
Dajiang Chen, Shaoquan Jiang, Ning Zhang, Lei Liu and Kim-Kwang Raymond Choo, On Message Authentication Channel Capacity Over a Wiretap Channel, IEEE Transactions on Information Forensics and Security, vol 17, pages 3107-3122, 2022.
Shaoquan Jiang, Yeow Meng Chee, San Ling, Huaxiong Wang and Chaoping Xing, A New Framework for Deniable Secure Key Exchange, Information and Computation, vol. 285, part B, 104866, May 2022.
Shaoquan Jiang, Guang Gong, Jingnan He, Khoa Nguyen and Huaxiong Wang, PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model, The International Conference on Practice and Theory in Public-Key Cryptography (PKC'20), A. Kiayias, M. Kohlweiss, P. Wallden, V. Zikas (Eds.), LNCS 12110, IACR, pp. 396-427, 2020. acceptance rate=44/180=22.2%
Min Li, Shaoquan Jiang and Yongjian Liao, Physical-Layer Authentication via a Dynamic Scaling, Chinese Journal of Electronics, 29(4), pp 651-659, 2020.
Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou and Ramadan Mohammed, Insecurity of A Key-policy Attribute Based Encryption Scheme with Equality Test, IEEE Access, vol 6, issue 1, pages 10189-10196, Dec 2018.
Shaoquan Jiang, Jue Li and Yongjian Liao, Efficient Approximate Message Authentication Scheme, IET Information Security, vol 12, Issue 1, pp. 100-106, January 2018.
Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang and Shijie Zhou, Analysis of an ABE Scheme with Verifiable Outsourced Decryption, Sensors, vol 18, issue 1, pp. 176-189, 2018.
Shaoquan Jiang, Min Li and Zailiang Tang, A New Scheme for Source-location Privacy in Wireless Sensor Networks, International Journal of Network Security, vol 20, no 5, pp. 879-889, 2018.
Charles C.Y. Lam, Shaoquan Jiang and Khoongming Khoo, Cryptography, Handbook of Discrete and Combinatorial Mathematics, the second edition, Chapter 15, Ken Rosen, Douglas Shier and Wayne Goddard (Eds.), Chapman and Hall/CRC Press, 2017.
Shaoquan Jiang, On Group Authentication without Personal Public-Keys, Journal of Cyber Security, vol 3, no 2, pp. 48-60, July 2017. (in Chinese)
Shaoquan Jiang, Bounds for Message Authentication with Distortion, the Computer Journal, vol 60, no 4, pages 497-506, Oxford University Press, 2017.
Shaoquan Jiang, Zailiang Tang and Mingsheng Wang, On the CLD Attack to a Statistical Model of a Key Stream Generator, International Journal of Network Security, vol. 18, no. 5, pp. 987-992, sept 2016.
Shaoquan Jiang, On Message Authentication with a Correlated Setup, Information Processing Letters, vol. 116, no. 4, pages 289-293, 2016.
Shaoquan Jiang, Group Key Agreement with Local Connectivity, IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 3, pp. 326-339, 2016.
Shaoquan Jiang, On the Size of Source Space in a Secure MAC, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 9, pages 2007-2015, 2015.
Dajiang Chen, Shaoquan Jiang, Zhiguang Qin, Message Authentication Code over a Wiretap Channel, IEEE Symposium on Information Theory 2015, Hong Kong, June 14-19, 2015.
Shaoquan Jiang, On the Optimality of Keyless Authentication in a Noisy Model, IEEE Transactions on Information Forensics and Security, Vol. 10, No. 6, pp. 1250-1261, June 2015.
Shaoquan Jiang, On τ -time Key Agreement, Science China Information Sciences (Science in China Series F), 58(1): 012110(13), 2015.
Shaoquan Jiang, On Unconditional ϵ-Security of Symmetric Encryption, the Computer Journal, Vol. 57, No. 10, pp. 1570-1579, 2014.
Shaoquan Jiang, (Im)possibility of Deterministic Commitment over a Discrete Memoryless Channel, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 9, pp. 1406-415, 2014.
Shaoquan Jiang, Keyless Authentication in a Noisy Model, IEEE Transactions on Information Forensics and Security, Vol. 9, No. 6, pp. 1024-1033, 2014.
Shengke Zeng and Shaoquan Jiang, A New Framework for Conditionally Anonymous Ring Signature, the Computer Journal, Vol. 57, Issue 4, pp. 567-578, 2014.
Shaoquan Jiang, Persistent Asymmetric Password-Based Key Exchange, Journal of Mathematical Cryptology, Volume 8, Issue 1, pages 31-70, Feb 2014.
Zufeng Wu, Pengfei Wang, Zhiguang Qin, Shaoquan Jiang, Improved algorithm of Louvain communities dipartition, Journal of University of Electronic Science and Technology of China, Vol 42, No. 1, 2013.
Shaoquan Jiang, Timed Encryption with Application to Deniable Key Exchange, the 9th annual conference on Theory and Applications of Models of Computation (TAMC'12), M. Agrawal, S. B. Cooper, and A. Li (Eds. ), LNCS 7287, Beijing, May 16-21, China, 2012.
Full paper: Shaoquan Jiang, Timed Encryption with Application to Deniable Key Exchange, Theoretical Computer Science, Vol. 560, part 2, pp. 172-189, 2014.
Jason M. Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini and Siamak F. Shahandashti, Attribute-based Encryption without Key Cloning, International Journal of Applied Cryptology, Vol. 2, No. 3, pp. 250–270, 2012.
Rei Safavi-Naini and Shaoquan Jiang, Unconditionally Secure Conference Key Distribution: Security Notions, Bounds and Constructions, International Journal of Foundations of Computer Science, Vol. 22, No. 6 (2011), pp. 1369-1393, World Scientific Publisher.
Shengke Zeng and Shaoquan Jiang, A New Conditionally Anonymous Ring Signature, 17th Annual International Computing and Combinatorics Conference (COCOON 2011), Ding-zhu Du and Bin Fu (Eds.), LNCS 6842, pages 479-491, Dallas, Texas, USA, Aug 14-16, 2011.
Full paper: Shengke Zeng, Shaoquan Jiang and Zhiguang Qin, An Efficient Conditionally Anonymous Ring Signature in the Random Oracle Model, Theoretical Computer Science, Elsevier, Vol. 461, November 2012, Pages 106–114.
Hongsong Shi, Shaoquan Jiang, Rei Safavi-Naini and Mohammed Ashraful Tuhin, On Optimal Secure Message Transmission by Public Discussion, IEEE Transactions on Information Theory, Vol. 57, No. 1, pages 572-585, Jan 2011.
Shaoquan Jiang, Dwork-Naor ZAP and Its Application in Deniable Authentication, revisted, the 6th China International Conference on Information Security and Cryptology (INSCRYPT'10), X. Lai and M. Yung (Eds.), LNCS, Shanghai, Oct 20-23, 2010. Acceptance Rate=35/125=28% (regular)
Shaoquan Jiang and Huaxiong Wang, Plaintex-Awareness of Hybrid Encryption, Topic in Cryptography-CT-RSA 2010., J. Peiprzyk(Ed.), LNCS 5985, pages 57-72, 2010. Acceptance Rate=25/94=26.6%
Hongsong Shi, Shaoquan Jiang and Zhiguang Qin, More Efficient DDH Pseudorandom Generators, Design, Codes and Cryptography, (2010) 55, pages 45–64.
Giovanni Di Crescenzo, Shaoquan Jiang and Rei Safavi-Naini, Corruption-Localizing Hashing, The European Symposium on Research in Computer Security (ESORICS'09), M. Backes and P. Ning (Eds.), LNCS 5789, Springer-Verlag, Saint-Malo, France, Sept 21-23, 2009. AR=42/220=19.1%.
Hongsong Shi, Shaoquan Jiang, Rei Safavi-Naini and Mohammed Ashraful Tuhin, Optimal Secure Message Transmission by Public Discussion, IEEE Symposium on Information Theory 2009, Soul, Korean, Jun 28-July 2, 2009.
Shaoquan Jiang and Rei Safavi-Naini, An Efficient Fully Deniable Key Exchange Protocol, Financial Cryptography and Data Security, 12th International Conference, FC’08, Gene Tsudik (Ed.), LNCS 5143, Springer-Verlag, Cozumel, Mexico, Jan 28-31, 2008. Acceptance Rate=26/87=29.8%.
Lan Luo, Zhiguang Qin and Shaoquan Jiang, The intelligent secure structure based on active block ciphers for application layer of Internet, 1st International Congress on Image and Signal Processing, Sanya, China, 2008.5.2 7-2008.5.30.
Reihaneh Safavi-Naini and Shaoquan Jiang, Unconditionally secure conference key distribution: security definitions and their relations, 46th Annual Allerton Conference on Communication, Control and Computing, Urbana-Champaign, pp. 1215-1220, Sept. 23-26, IEEE, 2008.
Rei Safavi-Naini and Shaoquan Jiang, Non-interactive Conference Key Distribution and Its Applications, the 2008 ACM Symposium on Information, Computer and Communication Security, AsiaCCS’08, M. Abe and V. Gligor (Eds.), Tokyo, 18-20 March 2008, 16 pages. AR(Regular)=32/182=17.6%.
Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang and Juan Wang, A middleware design for block cipher seamless connected into stream cipher mode, 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, 2008.8.15-2008.8.17
Lan Luo, Zhiguang Qin, Shaoquan Jiang and Jian Wang, A key delay design operation model of block cipher algorithm in network , 2007 International Conference on Intelligent Systems and Knowledge Engineering, Chengdu, China, 2007.10.15-007.10.16.
Shaoquan Jiang, Deniable Authentication on the Internet, the 3rd SKLOIS Conference on Information Security and Cryptology, INSCRYPT’07, D. Pei and M. Yung (Eds.), LNCS 4990, Springer-Verlag, Xining, China, Aug 31-Sept 2, pages 298-312, 2007. AR (Regular)=33/176=18.8%.
Shaoquan Jiang, Efficient Primitives from Exponentiation in Zp, Information Security and Privacy: 11th Australasian Conference, ACISP'06, L. Batten and R. Safavi-Naini (Eds.), LNCS 4058, Springer-Verlag, Melbourne, Australia, July 3-5, pp. 259-270, 2006. AR=31/133=23.3%.
Shaoquan Jiang and Guang Gong, A Round and Communication Efficient Secure Ranking Protocol, Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, David Pointcheval (Ed.), LNCS 3860,Springer-Verlag, Feb 13-17, San Jose, CA, USA, pp. 350-364, 2006. AR=22/72=30.5%.
Shaoquan Jiang and Guang Gong, Efficient Authenticators with Application to Key Exchange, the 8th Annual International Conference on Information Security and Cryptology (ICISC'05), D. Won and S. Kim (Eds.), LNCS 3935, Springer-Verlag, pp. 81-91, December 1-2, Seoul, Korea, 2005. AR=32/192=16.6%.
Guang Gong and Shaoquan Jiang, "Editing Generator and its Cryptanalysis", Int. J. Wireless and Mobile Computing, Vol. 1, Issue 1, pp. 46-52, Inderscience Publishers, 2005.
Shaoquan Jiang and Guang Gong, Password Based Key Exchange with Mutual Authentication, Selected Area in Cryptography 2004, H. Handschuh and A. Hasan (Eds.), LNCS 3357, Springer-Verlag, pp. 271-283, August, Waterloo, Canada, 2005. AR=25/117=21.3%.
Shaoquan Jiang and Guang Gong, Multi-service Oriented Broadcast Encryption, Information Security and Privacy: 9th Australasian Conference, ACISP'04, H. Wang et al. (Eds.), LNCS 3108, Springer-Verlag, pp. 1-12, July Sydney, Australia, 2004. AR=41/195=21.0%.
ZongDuo Dai, Shaoquan Jiang, Kyoki Imamura and Guang Gong, "Asymptotic Behaviour of Normalized Linear Complexity of Ultimately Non-periodic sequences", IEEE Transaction on Information Theory, November, 2004. One page abstract appeared at ISIT'04, Chicago, June 2004.
Shaoquan Jiang and Guang Gong, On Edit Distance Attack to Alternating Step Generator, Mathematical Properties of Sequences and Other Combinatorial Structures, J. -S. No, H. - Y. Song, T. Helleseth, and V. Kumar (Ed), Kluwer Academic Publisher, New York, 2003, pp. 85-92.
Shaoquan Jiang, Zongduo Dai and Guang Gong, On Interleaved Sequences over Finite Fields, Discrete Mathematics, 252(1-3), pp. 161-178, June, 2002.
Shaoquan Jiang, Zongduo Dai and K.Immamura, " Linear Compexity of a sequence obtained from another sequence by either m-symbol deleting,or m-symbol substituting, or m-symbol inserting", IEEE trans. Inform.Theory, May 2000.
Shaoquan Jiang, Dengguo Fengand Sihan Qing, Analysis and Design of E-Voting Protocol, IFIP TC11 Sixteenth Annual Working Conference on Information Security (SEC2000), vol. 47, Springer, August 2000, pp. 281-290. Acceptance Rate: 50/180=27.5%
Shaoquan Jiang, Dengguo Feng and Sihan Qing, Remarks On a Minimal Leak Proof Protocol, Journal of software, October 2000.
Shaoquan Jiang, Yufeng Zhang, Partial Key Escrow Monitoring Scheme, The International Workshop on Cryptographic Technique and E-commerce (CrypTEC'99), Manuel Blum and C. H. Lee (Eds) , HongKong, July 9-11, 1999.
Shaoquan Jiang and Qibin Zhai, Notes on RSA-based Undeniable Signatures, Journal of Communication Privacy, Vol. 79, No. 3, pages 55-57, 1999.
Shaoquan Jiang, Zongduo Dai ang Guang Gong, Notes on Q-ary Interleaved Sequences, International Conference on Sequences and Their Applications '98, Singapore, December, 1998