Publications

SELECTED JOURNALS

Chuan Zhao, Jun Xu. “Secure Multi-Party Computation Based on Cut-and-Choose”. Published in Journal of Computer Research and Development. 2021. (CCF-A)

• Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen. “PrivateDL: Privacy‐preserving collaborative deep learning against leakage from gradient sharing”. Published in International Journal of Intelligent Systems. 2020. (CCF-C, IF 10.312)

Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao. “Oblivious DFA Evaluation on Joint Input and Its Applications”. Published in Information Sciences. 2020. (CCF-B, IF 5.910)

• Jian Qiu, Hengjian Li, Chuan Zhao. “Cancelable Palmprint Templates Based on Random Measurement and Noise Data for Security and Privacy-Preserving Authentication”. Published in Computers & Security. 2019. (CCF-B, IF 3.579)

• Minghao Zhao, Chengyu Hu, Xiangfu Song, Chuan Zhao. “Towards Dependable and Trustworthy Outsourced Computing: A Comprehensive Survey and Tutorial”. Published in Journal of Network and Computer Applications. 2019. (CCF-C, IF 5.570)

Chuan Zhao, Shengnan Zhao, Minghao Zhao, Chong-Zhi Gao, Hongwei Li, Yu-an Tan. “Secure Multi-Party Computation: Theory, Practice and Applications”. Published in Information Sciences. 2019. (CCF-B, IF 5.910)

Chuan Zhao, Shengnan Zhao, Zhongtian Jia, Bo Zhang, Bin Zhang. “Advances in Practical Secure Two-party Computation and Its Application in Genomic Sequence Comparison (in Chinese)”. Published in Journal of Cryptologic Research (密码学报). 2018.

Chuan Zhao, Shengnan Zhao, Zhenxiang Chen, Bo Zhang, Mauro Conti. “Secure Comparison under Ideal/Real Simulation Paradigm”. Published in IEEE Access. 2018. (IF 3.745)

• Bo Zhang, Tianqing Zhu, Chengyu Hu, Chuan Zhao. “Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments”. Published in IEEE Access. 2018. (IF 3.745)

• Bo Zhang, Zhongtian Jia, Chuan Zhao. “An Efficient Certificateless Generalized Signcryption Scheme”. Published in Security and Communication Networks. 2018. (CCF-C, IF 1.288)

• Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti. “Detecting Android Malware Leveraging Text Semantics of Network Flows”. Published in IEEE Transactions on Information Forensics and Security. 2017. (CCF-A, IF 6.211)

Chuan Zhao, Han Jiang, Qiuliang Xu, Yilei Wang, Xiaochao Wei, Shujie Cui. “Fast Two-Output Secure Computation with Optimal Error Probability”. Published in Chinese Journal of Electronics (电子学报英文版). 2017.

• Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao. “Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption in Cloud Computing”. Published in Soft Computing. 2017. (CCF-C, IF 3.050)

Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu. “Cut-and-Choose Bilateral Oblivious Transfer (in Chinese)”. Published in Journal of Software (软件学报). 2017.

Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang. “Several Oblivious Transfer Variants in Cut-and-Choose Scenario”. Published in International Journal of Information Security and Privacy. 2016. (CCF-C)

• Xiaochao Wei, Han Jiang, Chuan Zhao. “An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation (in Chinese)”. Published in Journal of Computer Research and Development (计算机研究与发展). 2016.

• Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu. “Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks”. Published in Mobile Information Systems. 2015. (IF 1.508)

• Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu. “Fair Two-Party Computation with Rational Parties Holding Private Types”. Published in Security and Communication Networks. 2015. (CCF-C, IF 1.288)


SELECTED CONFERENCES

• Mohammed Shujaa Aldeen, Chuan Zhao. “Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System”, Published in 23rd International Conference on Information and Communications Security. 2021. (CCF-C)

• Sheraz Ali, Muhammad Maaz Irfan, Abubakar Bomai, Chuan Zhao. “Towards Privacy-Preserving Deep Learning: Opportunities and Challenges”, Published in IEEE International Conference on Data Science and Advanced Analytics. 2020. (CCF-C)

• Abubakar Bomai, Mohammed Shujaa Aldeen, Chuan Zhao. “Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System”, Published in IEEE International Conference on Data Science and Advanced Analytics. 2020. (CCF-C)

• Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu. “Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries”. Published in The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2016. (CCF-C)

Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao. “Cut-and-Choose Bilateral Oblivious Transfer and Its Application”. Published in The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2015. (CCF-C)

Grants

AS PRINCIPAL INVESTIGATOR

Jan. 1, 2018 –Dec. 31, 2020

National Natural Science Foundation of China, “Research on Efficient Secure Two-Party Computation for Privacy-Preserving Genomic Sequence Comparison” (No. 61702218)

Jan. 1, 2022 –Dec. 31, 2024

Shandong Provincial Natural Science Foundation, “Research on Information Security Technology Based on Domestic Heterogeneous Computing Platform” (No. ZR2021LZH007)

Jan. 1, 2019 –Dec. 31, 2021

Shandong Provincial Key Research and Development Project, “Research and Development of Privacy-Preserving Cloud Computing Platform for Precision Medicine” (No. 2019GGX101028)

Jan. 1, 2018 –Dec. 31, 2020

Shandong Province Higher Educational Science and Technology Program, “Research on Efficient and Secure Genomic Sequence Alignment in Cloud Environment” (No. J18KA349)


AS PROJECT MEMBER

Jan. 1, 2019 –Dec. 31, 2021

Project of Independent Cultivated Innovation Team of Jinan City, “Research on Intelligent Mobile Malicious Application Behavior Detection” (No. 2018GXRC002)

Jan. 1, 2016 –Dec. 31, 2019

National Natural Science Foundation of China, “Research on Theory of Secure Multi-Party Computation” (No. 61572294)

Jan. 1, 2012 –Dec. 31, 2015

National Natural Science Foundation of China, “Research on Fundamental Theory of Secure Multi-Party Computation” (No. 61173139)

Jan. 1, 2012 –Dec. 31, 2014

Doctoral Fund of Ministry of Education of China, “Research on Basic Operations of Secure Multi-Party Computation and Universally Composable Security” (No. 20110131110027)

Teaching

Network Security and Privacy Protection

Graduate course, School of Information Science and Engineering, University of Jinan

Advanced Computer Network

Graduate course, School of Information Science and Engineering, University of Jinan

Network Information Countermeasure

Undergraduate course, School of Information Science and Engineering, University of Jinan

Network Security Protocols

Undergraduate course, School of Information Science and Engineering, University of Jinan

Applied Cryptography

Undergraduate course, School of Information Science and Engineering, University of Jinan

Copyright © 2021 Chuan Zhao · Powered by Hugo