Jia-xin Pan

From MaRDI portal
(Redirected from Person:407440)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fine-grained non-interactive key-exchange without idealized assumptions
 
2024-12-04Paper
Key exchange with tight (full) forward secrecy via key confirmation
 
2024-11-13Paper
Selective opening security in the quantum random oracle model, revisited
 
2024-11-12Paper
Toothpicks: more efficient fork-free two-round multi-signatures
 
2024-11-12Paper
Tighter security for generic authenticated key exchange in the QROM
 
2024-09-13Paper
A simple and efficient framework of proof systems for NP
 
2024-06-26Paper
A generic construction of tightly secure password-based authenticated key exchange
 
2024-06-26Paper
Lattice-based authenticated key exchange with tight security
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Generic constructions of master-key KDM secure attribute-based encryption
Designs, Codes and Cryptography
2024-01-15Paper
Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption
Lecture Notes in Computer Science
2023-11-16Paper
Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Compact and tightly selective-opening secure public-key encryption schemes
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Fine-grained secure attribute-based encryption
Journal of Cryptology
2023-08-22Paper
Compact structure-preserving signatures with almost tight security
Journal of Cryptology
2023-08-22Paper
Unconditionally secure NIZK in the fine-grained setting
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Lattice-based signatures with tight adaptive corruptions and more
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Unbounded HIBE with tight security
 
2023-03-21Paper
Signatures with Tight Multi-user Security from Search Assumptions
1511.94187
2022-12-22Paper
Hierarchical identity-based encryption with tight multi-challenge security
Lecture Notes in Computer Science
2022-10-13Paper
Signed (group) Diffie-Hellman key exchange with tight security
Journal of Cryptology
2022-10-04Paper
Non-interactive zero-knowledge proofs with fine-grained security
 
2022-08-30Paper
Fine-grained secure attribute-based encryption
 
2022-05-18Paper
Authenticated key exchange and signatures with tight security in the standard model
 
2022-05-18Paper
Short identity-based signatures with tight security from lattices
 
2022-03-22Paper
Signed Diffie-Hellman key exchange with tight security
 
2021-12-20Paper
Tightly secure hierarchical identity-based encryption
Journal of Cryptology
2020-11-06Paper
Shorter QA-NIZK and SPS with tighter security
 
2020-05-11Paper
Tightly secure hierarchical identity-based encryption
Public-Key Cryptography – PKC 2019
2020-01-28Paper
Tightly secure signature schemes from the LWE and subset sum assumptions
Theoretical Computer Science
2019-10-18Paper
Identity-based encryption tightly secure under chosen-ciphertext attacks
 
2019-01-23Paper
Simple and more efficient PRFs with tight security from LWE and matrix-DDH
 
2019-01-23Paper
More efficient (almost) tightly secure structure-preserving signatures
 
2018-07-09Paper
Tightly-secure signatures from five-move identification protocols
 
2018-02-23Paper
Compact structure-preserving signatures with almost tight security
 
2017-11-15Paper
Optimal security proofs for signatures from identification schemes
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Structure-preserving signatures from standard assumptions, revisited
Lecture Notes in Computer Science
2015-12-10Paper
Tightly-Secure Signatures from Chameleon Hash Functions
Lecture Notes in Computer Science
2015-08-27Paper
Simple and efficient password-based authenticated key exchange protocol
Journal of Shanghai Jiaotong University (Science)
2014-09-02Paper
(Hierarchical) identity-based encryption from affine message authentication
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption
Provable Security
2011-09-16Paper
Analysis and improvement of an authenticated key exchange protocol
Information Security Practice and Experience
2011-05-19Paper


Research outcomes over time


This page was built for person: Jia-xin Pan