
Name: Shaohua Tang
Introduction:
Distinguished Chair Professor
Room B3-512
School of Computer Science & Engineering
South China University of Technology
Guangzhou Higher Education Mega Centre
510006, Guangzhou
P. R. China
Tel: 020-39380286-3512
E-mail: csshtang@scut.edu.cn; shtang@ieee.org
Academic Qualifications
2015.09 – now, Head, “Information Security Technology” Engineering Research Center of Guangdong Province
2009.08- now Deputy Head “Short Distance Wireless Communications and Networking” The Ministry of Education Engineering Research Center SCUT
2008.12- now Deputy Head “Wireless Communication Network and Terminal” Key Laboratory of Guangdong Higher Education Institutes SCUT
2007.07- 2011.09 Dean Department of Information Security Engineering SCUT
2004.05- now Professor School of Computer Science & Engineering SCUT
1998.04- 2002.03 Lecturer, Associate Professor School of Information and Electronics, School of Computer Science & Engineering SCUT
2009.12- 2010.07 Visiting Professor/Senior Research Fellow University of Cincinnati, USA
2001.08-2002.02 Visiting Scholar North Carolina State University, USA
1994.09-1998.03 Ph.D. Communication and Information System SCUT
1991.09-1994.07 M.S. Applied Mathematics South China University of Technology 1987.09-1991.07
B.S. Applied Mathematics South China University of Technology
Areas of Professional Interest
Information security; Public key cryptography; Post quantum cryptography; Privacy protection
Scientific Honors and Professional Services
Science and Technology innovation leading talent of Guangdong special support program
The pearl river scholars distinguished professor
Thousand-Hundred-Ten Project Provincial talent
the New Century Excellent Researcher Award Program from Ministry of Education
Member, IEEE
Publications
Selected Journal Papers
1)Xiaoyu Li, Shaohua Tang*, Lingling Xu, Huaqun Wang, Jie Chen:“Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems”, IEEE Access, Vol. 5, pp. 393-405, 2017;
2) Shaohua Tang, Xiaoyu Li, Xinyi Huang, Yang Xiang, Lingling Xu: “Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing”, IEEE Transactions on Computers, Vol. 65, Issue 7, pp. 2325-2331, 2016;
3)Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng, Adama Diene, Xiaofeng Chen: Efficient Hardware Implementation of PMI+ for Low-Resource Devices in Mobile Cloud Computing, Future Generation Computer Systems, Vol. 52, pp. 116-124, November 2015;
4) Shaohua Tang, Lingling Xu, Niu Liu, Xinyi Huang, Jintai Ding, Zhiming Yang: Provably Secure Group Key Management Approach Based upon Hyper-Sphere, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, Issue 12, pp.3253-3263, 2014;
5)Shaohua Tang, Lingling Xu: “Towards Provably Secure Proxy Signature Scheme Based on Isomorphisms of Polynomials”, Future Generation Computer Systems, Vol. 30, pp. 91-97, January 2014;
6)Lingling Xu, Shaohua Tang*: Verifiable Computation with Access Control in Cloud Computing, Journal of Supercomputing; Vol. 69, No. 2; pp. 528-546; 2014;
7)Daojing He, Sammy Chan, Shaohua Tang*: A Novel and Lightweight System to Secure Wireless Medical Sensor Networks, IEEE Journal of Biomedical and Health Informatics, Vol. 18, Issue 1, pp. 316 - 326, 2014;
8)Daojing He, Sammy Chan, Shaohua Tang*, Mohsen Guizani: Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks, IEEE Trans Wireless Communication, Vol. 12, Issue 9, pp. 4638 - 4646; 2013;
9) Xinglin Zhang, Zheng Yang, Yuejiao Gong, Yunhao Liu, Shaohua Tang: “SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing”, IEEE Transactions on Vehicular Technology, Vol. -, Issue -, pp. 1-1, 2017; [DOI: 10.1109/TVT.2016.2614312]
10) Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo: “Online/Offline Provable Data Possession”, IEEE Transactions on Information Forensics and Security, Vol. 12, Issue 5, pp. 1182-1194, 2017;
11)Xinglin Zhang, Zheng Yang, Yunhao Liu, Shaohua Tang: “On Reliable Task Assignment for Spatial Crowdsourcing”, IEEE Transactions on Emerging Topics in Computing, Vol. -, Issue -, pp. 1-1, 2017; [DOI: 10.1109/TETC.2016.2614383]
12) Xinglin Zhang, Zheng Yang, Wei Sun, Yunhao Liu, Shaohua Tang, Kai Xing, XuFei Mao: Incentives for Mobile Crowd Sensing: A Survey, IEEE Communications Surveys & Tutorials, Vol. 18, Issue 1, pp. 54-67, 2016;
13) Huaqun Wang, Debiao He, Shaohua Tang: Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud, IEEE Transactions on Information Forensics and Security, Vol. 11, Issue 6, pp. 1165-1176, 2016;
14) Xinyi Huang, Joseph K. Liu, Shaohua Tang, Yang Xiang, Kaitai Liang, Li Xu, Jianying Zhou: Cost-Effective Authentic and Anonymous Data Sharing with Forward Security, IEEE Transactions on Computers , Vol. 64, No. 4, pp. 971 - 983, April 2015;
15) Jin Li, Xiaofeng Chen, Xinyi Huang, Shaohua Tang, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi: Secure Distributed Deduplication Systems with Improved Reliability, IEEE Transactions on Computers; Vol. 64, Issue 12, pp. 3569-3579, 2015;
Selected Conference Papers
1)Shaohua Tang, Bo Lv, Wuqiang Shen: Hybrid MQ Signature for Embedded Device, 21st Australasian Conference on Information Security and Privacy (ACISP2016), pp.281-290, JUL. 4-6, 2016; Melbourne, Australia;
2)Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng: Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs",10th Information Security Practice and Experience (ISPEC2014) ;pp.187-201; May 5-8, 2014; 3)Shaohua Tang, Lingling Xu: Authentication and Key Agreement based on Hyper-Sphere using Smart Cards, Springer-Verlag, LNCS, 2013, Vol 7873, pp. 549-562, Network and System Security (NSS) '2013; Madrid, Spain;
4)Wuqiang Shen, Shaohua Tang, Lingling Xu: IBUOV, a Provably Secure Identity-based UOV Signature Scheme, 13th IEEE International Conference on Computer and Information Technology (CIT2013), pp. 388-395, Dec. 3-5, 2013; Sydney, Australia;
5)Shaohua Tang, Haibo Yi, Jintai Ding, Huan Chen, Guomin Chen: “High-speed Hardware Implementation of Rainbow Signatures on FPGAs”, Springer-Verlag, LNCS, 2011, Vol 7071, pp.228-243; PQCrypto 2011 (Workshop on Post-Quantum Cryptography), Nov 30 - Dec 2, 2011;
6)Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao: Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation, 11th ACM Asia Conference on Computer and Communications Security (ASIA CCS 2016), pp.269-279, MAY 30-JUN 3, 2016; Xidian Univ, China;
7)Junqing Gong, Jie Chen, Xiaolei Dong, Zhenfu Cao, Shaohua Tang: Extended Nested Dual System Groups, Revisited, 19th IACR International Conference on Practice and Theory in Public-Key Cryptography (PKC 2016), pp.388-395, March. 6-9, 2016; Taipei, Taiwan;
Patent (Selected Authorized Patent)
1)Shaohua Tang, Haibo Yi; “Finite Field Inverter”, US 9,389,835 B2, United States, 2016.07.12
2)Shaohua Tang, Haibo Yi; “Parallel Device For Solving Linear Equation Set In Finite Field”, US 9,229,682 B2, United States, 2016.01.05
3)Shaohua Tang, Haibo Yi; “Composite Finite Field Multiplier”, US 9,201,847 B2, United States, 2015.12.01
4)Shaohua Tang, Jintai Ding, Guangdong Yang, Yujun Liang; “Group Key Management Approach Based On Linear Geometry”, US 8,848,921 B2, United States, 2014.09.30
5)Shaohua Tang, Yujun Liang, Jintai Ding; “Hierarchical Group Key Management Approach Based Upon Linear Geometry”, US 8,744,085 B2, United States, 2014.06.03
6)Shaohua Tang, Zhimin Yang, Borong Lu; “A Group Key Management Approach Based upon N-dimensional Hypersphere, GB2479957, UK, 2014.09.03
7)Shaohua Tang, Yujun Liang, Jintai Ding; “Ansatz zur hierarchischen Gruppenschlüsselverwaltung auf Basis linearer Geometrie”, DE112010005596.3, German, 2014.12.31
8)Shaohua Tang, Zhimin Yang, Borong Lu; “Gruppenschlüssel-Managementverfahren auf Grundlage einer N-dimensionalen Hypersphäre”, DE112009004334.8, German, 2013.09.26
Projects
(1)Research on Scientific Problems of New Information Devices and Intelligent Information Processing, 973 Program, PI / Project Coordinator, 2014.10 - 2016.12
(2)Privacy Protection Method for Crowd Sensing, NSFC Key Program, PI, 2017.01 - 2021.12
(3)Theory and Key Technologies of Highly Efficient Public Key Crypto Chips for Limited Mobile Terminal, NSFC-Guangdong Joint Key Program, PI, 2012.01 - 2015.12
(4)Research on the Quantum-immuned Public Key Cryptography Based on Multivariate Polynomials, NSFC, PI, 2012.01-2015.12
(5)Research on Security Architecture of Grid Service, NSFC, PI, 2006.01-2008.12
(6)Research on Architecture and Key Issues of New Web Services Based on XML, NSFC, PI, 2003.01 - 2005.12
(7)The Fifth Northeast Asia International Conference and the Second Asia International Conference on E-Commerce, NSFC International Cooperation Project, PI, 2002.08
(8) Research on the Key Issues of Internet E-Commerce Security Mechanism, NSFC, PI, 1999.06 - 2001.06
(9)Research on Key Technology of Cross-Domain Information Security of Grid, “863” Project, PI, 2007.08 - 2009.12
(10)Research on the Key Issues of E-Commerce Security Mechanism, “863” Project, PI, 1999.06 - 2001.06
Scientific Awards
(1)The 2nd Prize of Progress in Scientific Technology of National Ministry of Education, 2008
(2)Science and Technology Progress Award of Guangdong Province