Jiaxin Pan
Jiaxin Pan
NTNU – Norwegian University of Science and Technology
Verified email at ntnu.no - Homepage
Title
Cited by
Cited by
Year
Structure-preserving signatures from standard assumptions, revisited
E Kiltz, J Pan, H Wee
Annual Cryptology Conference, 275-295, 2015
552015
Optimal security proofs for signatures from identification schemes
E Kiltz, D Masny, J Pan
Annual International Cryptology Conference, 33-61, 2016
492016
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
IACR International Workshop on Public Key Cryptography, 256-279, 2015
472015
(Hierarchical) identity-based encryption from affine message authentication
O Blazy, E Kiltz, J Pan
Annual Cryptology Conference, 408-425, 2014
402014
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Annual International Cryptology Conference, 548-580, 2017
312017
More efficient (almost) tightly secure structure-preserving signatures
R Gay, D Hofheinz, L Kohl, J Pan
Annual International Conference on the Theory and Applications of …, 2018
232018
Identity-based encryption tightly secure under chosen-ciphertext attacks
D Hofheinz, D Jia, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
162018
Shorter QA-NIZK and SPS with tighter security
M Abe, CS Jutla, M Ohkubo, J Pan, A Roy, Y Wang
International Conference on the Theory and Application of Cryptology and …, 2019
112019
TMQV: a strongly eCK-secure Diffie-Hellman protocol without gap assumption
J Pan, L Wang
International Conference on Provable Security, 380-388, 2011
82011
Tightly secure hierarchical identity-based encryption
R Langrehr, J Pan
Journal of Cryptology 33 (4), 1787-1821, 2020
72020
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
52016
Analysis and improvement of an authenticated key exchange protocol
J Pan, L Wang, C Ma
International Conference on Information Security Practice and Experience …, 2011
52011
Simple and more efficient PRFs with tight security from LWE and matrix-DDH
T Jager, R Kurek, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
42018
Exact smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013
42013
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security
R Langrehr, J Pan
IACR International Conference on Public-Key Cryptography, 153-183, 2020
32020
Tightly-secure signatures from five-move identification protocols
E Kiltz, J Loss, J Pan
International Conference on the Theory and Application of Cryptology and …, 2017
32017
Schnorr signatures in the multi-user setting
E Kiltz, D Masny, J Pan
Cryptology ePrint Archive Report 2015/1122, 2015
32015
Tightly secure signature schemes from the LWE and subset sum assumptions
X Zhang, S Liu, J Pan, D Gu
Theoretical Computer Science 795, 326-344, 2019
22019
Towards Instantiating the Algebraic Group Model.
J Kastner, J Pan
IACR Cryptol. ePrint Arch. 2019, 1018, 2019
22019
Errorless smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013. http://eprint. iacr. org …, 0
2
The system can't perform the operation now. Try again later.
Articles 1–20