Follow
Jiaxin Pan
Jiaxin Pan
Verified email at uni-kassel.de - Homepage
Title
Cited by
Cited by
Year
(Hierarchical) identity-based encryption from affine message authentication
O Blazy, E Kiltz, J Pan
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1042014
Optimal security proofs for signatures from identification schemes
E Kiltz, D Masny, J Pan
Annual International Cryptology Conference, 33-61, 2016
1032016
Structure-preserving signatures from standard assumptions, revisited
E Kiltz, J Pan, H Wee
Annual Cryptology Conference, 275-295, 2015
792015
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
Public-Key Cryptography--PKC 2015: 18th IACR International Conference on …, 2015
682015
More efficient (almost) tightly secure structure-preserving signatures
R Gay, D Hofheinz, L Kohl, J Pan
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
442018
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
422017
Identity-based encryption tightly secure under chosen-ciphertext attacks
D Hofheinz, D Jia, J Pan
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
362018
Tightly secure hierarchical identity-based encryption
R Langrehr, J Pan
Journal of Cryptology 33 (4), 1787-1821, 2020
302020
Authenticated key exchange and signatures with tight security in the standard model
S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge
Annual International Cryptology Conference, 670-700, 2021
252021
Hierarchical identity-based encryption with tight multi-challenge security
R Langrehr, J Pan
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
252020
Shorter QA-NIZK and SPS with tighter security
M Abe, CS Jutla, M Ohkubo, J Pan, A Roy, Y Wang
International Conference on the Theory and Application of Cryptology and …, 2019
252019
Signed (group) diffie–hellman key exchange with tight security
J Pan, C Qian, M Ringerud
Journal of Cryptology 35 (4), 26, 2022
162022
Lattice-based signatures with tight adaptive corruptions and more
J Pan, B Wagner
IACR International Conference on Public-Key Cryptography, 347-378, 2022
132022
Simple and more efficient PRFs with tight security from LWE and matrix-DDH
T Jager, R Kurek, J Pan
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
112018
Chopsticks: Fork-free two-round multi-signatures from non-interactive assumptions
J Pan, B Wagner
Annual International Conference on the Theory and Applications of …, 2023
102023
Unbounded HIBE with tight security
R Langrehr, J Pan
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
102020
Tightly-secure signatures from five-move identification protocols
E Kiltz, J Loss, J Pan
International Conference on the Theory and Application of Cryptology and …, 2017
102017
Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption
Y Jiang Galteland, J Pan
IACR International Conference on Public-Key Cryptography, 399-428, 2023
92023
Exact smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, 2013
92013
TMQV: a strongly eCK-secure Diffie-Hellman protocol without gap assumption
J Pan, L Wang
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20