Jiaxin Pan
TitleCited byYear
Structure-preserving signatures from standard assumptions, revisited
E Kiltz, J Pan, H Wee
Annual Cryptology Conference, 275-295, 2015
442015
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
IACR International Workshop on Public Key Cryptography, 256-279, 2015
362015
(Hierarchical) Identity-Based Encryption from Affine Message Authentication
O Blazy, E Kiltz, J Pan
Annual Cryptology Conference, 408-425, 2014
362014
Optimal security proofs for signatures from identification schemes
E Kiltz, D Masny, J Pan
Annual International Cryptology Conference, 33-61, 2016
342016
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Annual International Cryptology Conference, 548-580, 2017
212017
More efficient (almost) tightly secure structure-preserving signatures
R Gay, D Hofheinz, L Kohl, J Pan
Annual International Conference on the Theory and Applications of …, 2018
112018
Tmqv: a strongly eck-secure diffie-hellman protocol without gap assumption
J Pan, L Wang
International Conference on Provable Security, 380-388, 2011
62011
Analysis and improvement of an authenticated key exchange protocol
J Pan, L Wang, C Ma
International Conference on Information Security Practice and Experience …, 2011
52011
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
32016
Exact smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013
32013
Schnorr signatures in the multi-user setting
E Kiltz, D Masny, J Pan
Cryptology ePrint Archive Report 2015/1122, 2015
22015
Errorless smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013. http://eprint. iacr. org …, 0
2
Identity-based encryption tightly secure under chosen-ciphertext attacks
D Hofheinz, D Jia, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
12018
Simple and more efficient PRFs with tight security from LWE and matrix-DDH
T Jager, R Kurek, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
12018
Tightly-secure signatures from five-move identification protocols
E Kiltz, J Loss, J Pan
International Conference on the Theory and Application of Cryptology and …, 2017
12017
Efficient and semantically secure password-based group key exchange protocol
JX PAN, CS MA, LB WANG
Journal of the Graduate School of the Chinese Academy of Sciences 4, 2010
12010
Tightly secure signature schemes from the LWE and subset sum assumptions
X Zhang, S Liu, J Pan, D Gu
Theoretical Computer Science, 2019
2019
Tightly secure hierarchical identity-based encryption
R Langrehr, J Pan
IACR International Workshop on Public Key Cryptography, 436-465, 2019
2019
Improved security proofs and constructions for public-key cryptography.
J Pan
Ruhr University Bochum, Germany, 2016
2016
Simple and efficient password-based authenticated key exchange protocol
L Wang, J Pan, C Ma
Journal of Shanghai Jiaotong University (Science) 16 (4), 459-465, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–20