Skip to content Skip to navigation

Faculty

Limin Shen Associate Professor

Academic Area: 
Cryptography And Its Applications
Research Interests: 
  • Public Key Cryptography
  • Internet of Things
  • Information Security
Bio: 

Educational Background:

Ph.D (2015-2018): Computer Systems Organization, Xidian University, Xi'an,China

M.S. (2001-2004): Number Theory and Cryptography, Wuhan University, Wuhan,China

B.S. (1997-2001): Mathematics, Wuhan University, Wuhan, China

 

Research

1. Research Projects

[1] Research on aggregation signature for the internet of things and cloud computing. National Nature Science Foundation of China. 2019.01-2021.12.

[2] Revocable certificateless public key cryptography systems. Natural Science Research of Jiangsu Higher Education Institutions of China. 2013.08-2015.12.

 

2. Principal investigator of the following projects:

[1] Aggregation of homomorphic signature and its applications. National Natural Science Foundation of China. 2017-2020;

[2] Research on Key Technologies of Information Security and Privacy Preservation for Vehicular Ad Hoc Networks and Vehicular Cloud. National Natural Science Foundation of China. 2016-2019;

[3] Certificateless-encryption-based data privacy and access control in cloud storage. National Natural Science Foundation of China.2016-2018.

 

3. Journal Articles

[1] Limin Shen, Jianfeng Ma, Yinbin Miao, Hai Liu, Provably Secure Certificateless Aggregate Signature Scheme with Designated Verifier in An Improved Security Model, IET Information Security, 13(3), pp. 167-173, 2019.

[2] Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei and Meixia Miao, A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks, IEEE Internet of Things Journal, 4(2), pp. 546-554, 2017.

[3] Limin Shen, Futai Zhang, Yinxia Sun and Jianfeng Ma, An Efficient Revocable ID-Based Encryption Scheme in the Standard Model, Int. J. Embedded Systems, 9(2), pp. 168-176, 2017.

[4] Limin Shen, Jianfeng Ma, Ximeng Liu and Meixia Miao, A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks, Journal of Medical Systems, 40(11): 244:1-244:10, 2016.

[5] Limin Shen, Futai Zhang, Yinxia Sun. Efficient Revocable Certificateless Encryption Secure in the Standard Model. The Computer Journal, 57(4), pp. 592-601, 2014.

[6] Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li. Cryptanalysis and improvement on a certificateless encryption scheme in the standard model. Int.J.Information and Computer Security, 6(4), pp. 354-371, 2014.

[7] Limin Shen, Futai Zhang, Yinxia Sun. Security analysis of a certificateless signcryption scheme without bilinear pairing. Journal of Cryptologic Research, 1(2), pp. 146-154, 2014.(In Chinese)

[8] Limin Shen, Yinxia Sun. On the Security of a Certificateless Aggregate Signature Scheme. International Journal of Advancements in Computing Technology, 5(3), pp. 358-367, 2013.

[9] Yinxia Sun, Limin Shen. Pairing-free certificateless signature with revocation. IJCSE 19(1), pp. 46-52, 2019.

[10] Yinxia Sun, Zhuoran Zhang, Limin Shen. A revocable certificateless encryption scheme with high performance. IJHPCN, 11(1), pp. 83-91, 2018.

[11] Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Limin Shen, Fushan Wei. VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner. Peer-to-Peer Networking and Applications, 11(2), pp. 287-297, 2018.

[12] Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu. VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive and Mobile Computing, 40, pp. 205-219, 2017.

[13] Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. An efficient revocable certificateless encryption scheme against decryption key exposure, IET information security, 9(3), pp.158-166, 2015.

[14] Futai Zhang, Limin Shen, Ge Wu. Notes on the security of certificateless aggregate signature schemes. Information Sciences, Vol.287, pp.32-37, 2014.

[15] Yinxia Sun, Futai Zhang, Limin Shen. A Revocable Certificateless Signature Scheme. Journal of Computers, Vol 9, No 8, pp.1843-1850, 2014.

[16] Wenjie Yang, Futai Zhang, Limin Shen. Efficient certificateless encryption withstanding attacks from malicious KGC without using random oracles. Security and Communication Networks, 7(2), pp.445-454, 2014.

[17] Yinxia Sun, Limin Shen. Pairing-Free and Revocable Certificate- less Signature Against Signing Key Exposure. Journal of Emerging Trends in Computing and Information Sciences, 5(11), pp.845-849, 2014.

 

4. Conference Articles

[1] Limin Shen, Futai Zhang, Yinxia Sun, Sujuan Li, Cryptanalysis of a certificateless encryption scheme in the standard model, InCos-2012, pp 329-333, 2012.

[2] Sujuan Li, Futai Zhang, Yinxia Sun, Limin Shen, A new variant of the Cramer-Shoup leakage-resilient public key encryption. InCos-2012, pp 342-346, 2012.

[3] Yinxia Sun, Futai Zhang, Limin Shen, Revocable identity-based signature without pairing, InCoS-2013, pp. 363-365, 2013.

[4] Yinxia Sun,Zhuoran Zhang,Limin Shen. A Revocable Certificateless Signature Scheme Without Pairing. ICCCS(1), pp.355-364, 2016.

 

Contact: shenlimin@njnu.edu.cn