Jia-xin Pan

From MaRDI portal
Person:407440

Available identifiers

zbMath Open pan.jiaxinMaRDI QIDQ407440

List of research outcomes





PublicationDate of PublicationType
Fine-grained non-interactive key-exchange without idealized assumptions2024-12-04Paper
Key exchange with tight (full) forward secrecy via key confirmation2024-11-13Paper
Selective opening security in the quantum random oracle model, revisited2024-11-12Paper
Toothpicks: more efficient fork-free two-round multi-signatures2024-11-12Paper
Tighter security for generic authenticated key exchange in the QROM2024-09-13Paper
A simple and efficient framework of proof systems for NP2024-06-26Paper
A generic construction of tightly secure password-based authenticated key exchange2024-06-26Paper
Lattice-based authenticated key exchange with tight security2024-02-06Paper
Generic constructions of master-key KDM secure attribute-based encryption2024-01-15Paper
Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions2023-12-08Paper
Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption2023-11-16Paper
Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)2023-10-04Paper
Compact and tightly selective-opening secure public-key encryption schemes2023-08-25Paper
Fine-grained secure attribute-based encryption2023-08-22Paper
Compact structure-preserving signatures with almost tight security2023-08-22Paper
Unconditionally secure NIZK in the fine-grained setting2023-08-16Paper
Lattice-based signatures with tight adaptive corruptions and more2023-08-10Paper
Unbounded HIBE with tight security2023-03-21Paper
Signatures with Tight Multi-user Security from Search Assumptions2022-12-22Paper
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security2022-10-13Paper
Signed (group) Diffie-Hellman key exchange with tight security2022-10-04Paper
Non-interactive zero-knowledge proofs with fine-grained security2022-08-30Paper
Fine-grained secure attribute-based encryption2022-05-18Paper
Authenticated key exchange and signatures with tight security in the standard model2022-05-18Paper
Short identity-based signatures with tight security from lattices2022-03-22Paper
Signed Diffie-Hellman key exchange with tight security2021-12-20Paper
Tightly secure hierarchical identity-based encryption2020-11-06Paper
Shorter QA-NIZK and SPS with tighter security2020-05-11Paper
Tightly secure hierarchical identity-based encryption2020-01-28Paper
Tightly secure signature schemes from the LWE and subset sum assumptions2019-10-18Paper
Identity-based encryption tightly secure under chosen-ciphertext attacks2019-01-23Paper
Simple and more efficient PRFs with tight security from LWE and matrix-DDH2019-01-23Paper
More efficient (almost) tightly secure structure-preserving signatures2018-07-09Paper
Tightly-secure signatures from five-move identification protocols2018-02-23Paper
Compact structure-preserving signatures with almost tight security2017-11-15Paper
Optimal Security Proofs for Signatures from Identification Schemes2016-10-27Paper
Structure-Preserving Signatures from Standard Assumptions, Revisited2015-12-10Paper
Tightly-Secure Signatures from Chameleon Hash Functions2015-08-27Paper
Simple and efficient password-based authenticated key exchange protocol2014-09-02Paper
(Hierarchical) Identity-Based Encryption from Affine Message Authentication2014-08-07Paper
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption2011-09-16Paper
Analysis and Improvement of an Authenticated Key Exchange Protocol2011-05-19Paper

Research outcomes over time

This page was built for person: Jia-xin Pan