TANG Shaohua
 
time: 2017-06-21

Name: Shaohua Tang

Introduction:

Distinguished Chair Professor

Room B3-512

School of Computer Science & Engineering

South China University of Technology

Guangzhou Higher Education Mega Centre

510006, Guangzhou

P. R. China

Tel: 020-39380286-3512

E-mail: csshtang@scut.edu.cn; shtang@ieee.org

Academic Qualifications

2015.09 – now,  Head, “Information Security Technology” Engineering Research Center of Guangdong Province

2009.08- now    Deputy Head   “Short Distance Wireless Communications and Networking” The Ministry of Education Engineering Research Center    SCUT

2008.12- now     Deputy Head   “Wireless Communication Network and Terminal” Key Laboratory of Guangdong Higher Education Institutes    SCUT

2007.07- 2011.09      Dean   Department of Information Security Engineering    SCUT

2004.05- now             Professor    School of Computer Science & Engineering    SCUT

1998.04- 2002.03      Lecturer, Associate Professor   School of Information and Electronics, School of Computer Science & Engineering    SCUT

2009.12- 2010.07      Visiting Professor/Senior Research Fellow   University of Cincinnati, USA

2001.08-2002.02       Visiting Scholar   North Carolina State University, USA

1994.091998.03     Ph.D.      Communication and Information System   SCUT

1991.091994.07      M.S.      Applied Mathematics   South China University of Technology 1987.091991.07  

                                    B.S.      Applied Mathematics   South China University of Technology

Areas of Professional Interest

Information security; Public key cryptography; Post quantum cryptography; Privacy protection

Scientific Honors and Professional Services

Science and Technology innovation leading talent of Guangdong special support program

The pearl river scholars distinguished professor

Thousand-Hundred-Ten Project Provincial talent

the New Century Excellent Researcher Award Program from Ministry of Education

Member, IEEE

Publications

Selected Journal Papers

1)Xiaoyu Li, Shaohua Tang*, Lingling Xu, Huaqun Wang, Jie Chen:“Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems”, IEEE Access, Vol. 5, pp. 393-405, 2017; 

2) Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu: “Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing”, IEEE Transactions on Computers, Vol. 65, Issue 7, pp. 2325-2331, 2016;  

3)Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen: Efficient Hardware Implementation of PMI+ for Low-Resource Devices in Mobile Cloud Computing, Future Generation Computer Systems, Vol. 52, pp. 116-124, November 2015;

4)  Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang: Provably Secure Group Key Management Approach Based upon Hyper-Sphere, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 12, pp.3253-3263, 2014; 

5)Shaohua Tang, Lingling Xu: “Towards Provably Secure Proxy Signature Scheme Based on Isomorphisms of Polynomials”, Future Generation Computer Systems, Vol. 30, pp. 91-97, January 2014; 

6)Lingling Xu, Shaohua Tang*: Verifiable Computation with Access Control in Cloud Computing, Journal of Supercomputing; Vol. 69, No. 2; pp.  528-546; 2014;   

7)Daojing He, Sammy Chan, Shaohua Tang*: A Novel and Lightweight System to Secure Wireless Medical Sensor Networks, IEEE Journal of Biomedical and Health Informatics, Vol. 18, Issue 1, pp. 316 - 326, 2014; 

8)Daojing He, Sammy Chan, Shaohua Tang*, Mohsen Guizani: Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks, IEEE Trans Wireless Communication, Vol. 12, Issue 9, pp. 4638 - 4646; 2013;  

9) Xinglin Zhang, Zheng Yang, Yuejiao Gong, Yunhao Liu, Shaohua Tang: “SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing”, IEEE Transactions on Vehicular Technology, Vol. -, Issue -, pp. 1-1, 2017; [DOI:  10.1109/TVT.2016.2614312]

10) Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo: “Online/Offline Provable Data Possession”, IEEE Transactions on Information Forensics and Security, Vol. 12, Issue 5, pp. 1182-1194, 2017; 

11)Xinglin Zhang, Zheng Yang, Yunhao Liu, Shaohua Tang: “On Reliable Task Assignment for Spatial Crowdsourcing”, IEEE Transactions on Emerging Topics in Computing, Vol. -, Issue -, pp. 1-1, 2017; [DOI: 10.1109/TETC.2016.2614383]

12) Xinglin Zhang, Zheng Yang, Wei Sun, Yunhao Liu, Shaohua Tang, Kai Xing, XuFei Mao: Incentives for Mobile Crowd Sensing: A Survey, IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp. 54-67, 2016;

13) Huaqun Wang, Debiao He, Shaohua Tang: Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud, IEEE Transactions on Information Forensics and Security, Vol. 11, Issue 6, pp. 1165-1176, 2016;

14) Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou: Cost-Effective Authentic and Anonymous Data Sharing with Forward Security, IEEE Transactions on Computers , Vol. 64, No. 4, pp. 971 - 983, April 2015;

15) Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi: Secure Distributed Deduplication Systems with Improved Reliability, IEEE Transactions on Computers; Vol. 64, Issue 12, pp. 3569-3579, 2015;    


Selected Conference Papers

1)Shaohua Tang, Bo Lv, Wuqiang Shen: Hybrid MQ Signature for Embedded Device, 21st Australasian Conference on Information Security and Privacy (ACISP2016), pp.281-290, JUL. 4-6, 2016; Melbourne, Australia;

2)Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng: Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs",10th Information Security Practice and Experience (ISPEC2014) pp.187-201; May 5-8, 2014; 3)Shaohua Tang, Lingling Xu: Authentication and Key Agreement based on Hyper-Sphere using Smart Cards, Springer-Verlag, LNCS, 2013, Vol 7873, pp. 549-562, Network and System Security (NSS) '2013; Madrid, Spain;

4)Wuqiang Shen, Shaohua Tang, Lingling Xu: IBUOV, a Provably Secure Identity-based UOV Signature Scheme, 13th IEEE International Conference on Computer and Information Technology (CIT2013), pp. 388-395, Dec. 3-5, 2013; Sydney, Australia;  

5)Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen: “High-speed Hardware Implementation of Rainbow Signatures on FPGAs”, Springer-Verlag, LNCS, 2011, Vol 7071, pp.228-243; PQCrypto 2011 (Workshop on Post-Quantum Cryptography), Nov 30 - Dec 2, 2011;

6Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao: Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation, 11th ACM Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp.269-279, MAY 30-JUN 3, 2016; Xidian Univ, China;

7Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang: Extended Nested Dual System Groups, Revisited,  19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), pp.388-395, March. 6-9, 2016; Taipei, Taiwan;  


Patent (Selected Authorized Patent)

1Shaohua Tang, Haibo Yi;  “Finite Field Inverter”, US 9,389,835 B2, United States, 2016.07.12

2Shaohua Tang, Haibo Yi;  “Parallel Device For Solving Linear Equation Set In Finite Field”, US 9,229,682 B2, United States, 2016.01.05   

3Shaohua Tang, Haibo Yi;  “Composite Finite Field Multiplier”, US 9,201,847 B2, United States, 2015.12.01   

4Shaohua Tang, Jintai Ding, Guangdong Yang, Yujun Liang; “Group Key Management Approach Based On Linear Geometry”, US 8,848,921 B2, United States, 2014.09.30

5Shaohua Tang, Yujun Liang, Jintai Ding; “Hierarchical Group Key Management Approach Based Upon Linear Geometry”, US 8,744,085 B2, United States, 2014.06.03

6Shaohua Tang, Zhimin Yang, Borong Lu; “A Group Key Management Approach Based upon N-dimensional Hypersphere, GB2479957, UK, 2014.09.03

7Shaohua Tang, Yujun Liang, Jintai Ding; “Ansatz zur hierarchischen Gruppenschlüsselverwaltung auf Basis linearer Geometrie”, DE112010005596.3, German, 2014.12.31

8Shaohua Tang, Zhimin Yang, Borong Lu; “Gruppenschlüssel-Managementverfahren auf Grundlage einer N-dimensionalen Hypersphäre”, DE112009004334.8, German, 2013.09.26


Projects

(1)Research on Scientific Problems of New Information Devices and Intelligent Information Processing, 973 Program, PI / Project Coordinator, 2014.10 - 2016.12  

(2)Privacy Protection Method for Crowd Sensing, NSFC Key Program, PI, 2017.01 - 2021.12

(3)Theory and Key Technologies of Highly Efficient Public Key Crypto Chips for Limited Mobile Terminal, NSFC-Guangdong Joint Key Program, PI, 2012.01 - 2015.12

(4)Research on the Quantum-immuned Public Key Cryptography Based on Multivariate Polynomials, NSFC, PI, 2012.01-2015.12

(5)Research on Security Architecture of Grid Service, NSFC, PI, 2006.01-2008.12

(6)Research on Architecture and Key Issues of New Web Services Based on XML, NSFC, PI, 2003.01 - 2005.12

(7)The Fifth Northeast Asia International Conference and the Second Asia International Conference on E-Commerce, NSFC International Cooperation Project, PI, 2002.08

(8) Research on the Key Issues of Internet E-Commerce Security Mechanism, NSFC, PI, 1999.06 - 2001.06

(9)Research on Key Technology of Cross-Domain Information Security of Grid, “863” Project, PI, 2007.08 - 2009.12

(10)Research on the Key Issues of E-Commerce Security Mechanism, “863” Project, PI, 1999.06 - 2001.06


Scientific Awards

(1)The 2nd Prize of Progress in Scientific Technology of National Ministry of Education, 2008

(2)Science and Technology Progress Award of Guangdong Province