Structure-preserving signatures from standard assumptions, revisited E Kiltz, J Pan, H Wee Annual Cryptology Conference, 275-295, 2015 | 57 | 2015 |
Optimal security proofs for signatures from identification schemes E Kiltz, D Masny, J Pan Annual International Cryptology Conference, 33-61, 2016 | 53 | 2016 |
Tightly-secure signatures from chameleon hash functions O Blazy, SA Kakvi, E Kiltz, J Pan IACR International Workshop on Public Key Cryptography, 256-279, 2015 | 51 | 2015 |
(Hierarchical) identity-based encryption from affine message authentication O Blazy, E Kiltz, J Pan Annual Cryptology Conference, 408-425, 2014 | 44 | 2014 |
Compact structure-preserving signatures with almost tight security M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan Annual International Cryptology Conference, 548-580, 2017 | 34 | 2017 |
More efficient (almost) tightly secure structure-preserving signatures R Gay, D Hofheinz, L Kohl, J Pan Annual International Conference on the Theory and Applications of …, 2018 | 24 | 2018 |
Identity-based encryption tightly secure under chosen-ciphertext attacks D Hofheinz, D Jia, J Pan International Conference on the Theory and Application of Cryptology and …, 2018 | 17 | 2018 |
Shorter QA-NIZK and SPS with tighter security M Abe, CS Jutla, M Ohkubo, J Pan, A Roy, Y Wang International Conference on the Theory and Application of Cryptology and …, 2019 | 11 | 2019 |
Tightly secure hierarchical identity-based encryption R Langrehr, J Pan Journal of Cryptology 33 (4), 1787-1821, 2020 | 7 | 2020 |
Tmqv: a strongly eck-secure diffie-hellman protocol without gap assumption J Pan, L Wang International Conference on Provable Security, 380-388, 2011 | 7 | 2011 |
Hierarchical identity-based encryption with tight multi-challenge security R Langrehr, J Pan IACR International Conference on Public-Key Cryptography, 153-183, 2020 | 6 | 2020 |
Simple and more efficient PRFs with tight security from LWE and matrix-DDH T Jager, R Kurek, J Pan International Conference on the Theory and Application of Cryptology and …, 2018 | 5 | 2018 |
Unified security model of authenticated key exchange with specific adversarial capabilities W Wen, L Wang, J Pan IET Information Security 10 (1), 8-17, 2016 | 5 | 2016 |
Exact smooth projective hash function based on LWE O Blazy, C Chevalier, L Ducas, J Pan Cryptology ePrint Archive, Report 2013/821, 2013 | 5 | 2013 |
Analysis and improvement of an authenticated key exchange protocol J Pan, L Wang, C Ma International Conference on Information Security Practice and Experience …, 2011 | 5 | 2011 |
Tightly-secure signatures from five-move identification protocols E Kiltz, J Loss, J Pan International Conference on the Theory and Application of Cryptology and …, 2017 | 4 | 2017 |
Schnorr signatures in the multi-user setting E Kiltz, D Masny, J Pan Cryptology ePrint Archive Report 2015/1122, 2015 | 3 | 2015 |
Tightly secure signature schemes from the LWE and subset sum assumptions X Zhang, S Liu, J Pan, D Gu Theoretical Computer Science 795, 326-344, 2019 | 2 | 2019 |
Towards Instantiating the Algebraic Group Model. J Kastner, J Pan IACR Cryptol. ePrint Arch. 2019, 1018, 2019 | 2 | 2019 |
Errorless smooth projective hash function based on LWE O Blazy, C Chevalier, L Ducas, J Pan Cryptology ePrint Archive, Report 2013/821, 2013. http://eprint. iacr. org …, 0 | 2 | |