Jiaxin Pan
Jiaxin Pan
NTNU – Norwegian University of Science and Technology
Verified email at ntnu.no - Homepage
Title
Cited by
Cited by
Year
Structure-preserving signatures from standard assumptions, revisited
E Kiltz, J Pan, H Wee
Annual Cryptology Conference, 275-295, 2015
532015
Optimal security proofs for signatures from identification schemes
E Kiltz, D Masny, J Pan
Annual International Cryptology Conference, 33-61, 2016
452016
Tightly-secure signatures from chameleon hash functions
O Blazy, SA Kakvi, E Kiltz, J Pan
IACR International Workshop on Public Key Cryptography, 256-279, 2015
422015
(Hierarchical) identity-based encryption from affine message authentication
O Blazy, E Kiltz, J Pan
Annual Cryptology Conference, 408-425, 2014
382014
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Annual International Cryptology Conference, 548-580, 2017
282017
More efficient (almost) tightly secure structure-preserving signatures
R Gay, D Hofheinz, L Kohl, J Pan
Annual International Conference on the Theory and Applications of …, 2018
182018
Identity-based encryption tightly secure under chosen-ciphertext attacks
D Hofheinz, D Jia, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
112018
TMQV: a strongly eCK-secure Diffie-Hellman protocol without gap assumption
J Pan, L Wang
International Conference on Provable Security, 380-388, 2011
72011
Shorter QA-NIZK and SPS with tighter security
M Abe, CS Jutla, M Ohkubo, J Pan, A Roy, Y Wang
International Conference on the Theory and Application of Cryptology and …, 2019
52019
Analysis and improvement of an authenticated key exchange protocol
J Pan, L Wang, C Ma
International Conference on Information Security Practice and Experience …, 2011
52011
Simple and more efficient PRFs with tight security from LWE and matrix-DDH
T Jager, R Kurek, J Pan
International Conference on the Theory and Application of Cryptology and …, 2018
42018
Unified security model of authenticated key exchange with specific adversarial capabilities
W Wen, L Wang, J Pan
IET Information Security 10 (1), 8-17, 2016
42016
Exact smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013
42013
Schnorr signatures in the multi-user setting
E Kiltz, D Masny, J Pan
Cryptology ePrint Archive Report 2015/1122, 2015
32015
Towards Instantiating the Algebraic Group Model.
J Kastner, J Pan
IACR Cryptol. ePrint Arch. 2019, 1018, 2019
22019
Tightly secure hierarchical identity-based encryption
R Langrehr, J Pan
IACR International Workshop on Public Key Cryptography, 436-465, 2019
22019
Tightly-secure signatures from five-move identification protocols
E Kiltz, J Loss, J Pan
International Conference on the Theory and Application of Cryptology and …, 2017
22017
Errorless smooth projective hash function based on LWE
O Blazy, C Chevalier, L Ducas, J Pan
Cryptology ePrint Archive, Report 2013/821, 2013. http://eprint. iacr. org …, 0
2
Tightly secure signature schemes from the LWE and subset sum assumptions
X Zhang, S Liu, J Pan, D Gu
Theoretical Computer Science 795, 326-344, 2019
12019
Efficient and semantically secure password-based group key exchange protocol
JX PAN, CS MA, LB WANG
Journal of the Graduate School of the Chinese Academy of Sciences 4, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20