default search action
Jiaxin Pan 0001
Person information
- affiliation: University of Kassel, Germany
- affiliation (former): NTNU - Norwegian University of Science and Technology, Trondheim, Norway
- affiliation (former): Karlsruhe Institute of Technology, ITI, Karlsruhe, Germany
- affiliation (PhD 2016): Ruhr University of Bochum, Horst Görtz Institute for IT Security, Germany
Other persons with the same name
- Jiaxin Pan 0002 — Wuhan University, School of Computer Science, China
- Jiaxin Pan 0003 — University of Stuttgart, Germany
- Jiaxin Pan 0004 — Southeast University, School of Computer Science and Engineering, Nanjing, China
- Jiaxin Pan 0005 — Technical University of Munich, Computer Vision Group, Garching, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jiaxin Pan, Chen Qian, Benedikt Wagner:
Generic constructions of master-key KDM secure attribute-based encryption. Des. Codes Cryptogr. 92(1): 51-92 (2024) - [c36]Yuyu Wang, Chuanjie Su, Jiaxin Pan:
Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions. CRYPTO (2) 2024: 251-285 - [c35]Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. EUROCRYPT (6) 2024: 59-89 - [c34]Jiaxin Pan, Benedikt Wagner:
Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures. EUROCRYPT (1) 2024: 460-489 - [c33]Jiaxin Pan, Runzhi Zeng:
Selective Opening Security in the Quantum Random Oracle Model, Revisited. Public Key Cryptography (3) 2024: 92-122 - [i35]Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. IACR Cryptol. ePrint Arch. 2024: 361 (2024) - [i34]Yuyu Wang, Chuanjie Su, Jiaxin Pan:
Fine-Grained Non-Interactive Key-Exchange without Idealized Assumptions. IACR Cryptol. ePrint Arch. 2024: 1784 (2024) - 2023
- [j7]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. J. Cryptol. 36(4): 33 (2023) - [j6]Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-Preserving Signatures with Almost Tight Security. J. Cryptol. 36(4): 37 (2023) - [c32]Jiaxin Pan, Runzhi Zeng:
A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange. ASIACRYPT (8) 2023: 143-175 - [c31]Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. ASIACRYPT (2) 2023: 174-207 - [c30]Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Tighter Security for Generic Authenticated Key Exchange in the QROM. ASIACRYPT (4) 2023: 401-433 - [c29]Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Lattice-Based Authenticated Key Exchange with Tight Security. CRYPTO (5) 2023: 616-647 - [c28]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. CT-RSA 2023: 645-671 - [c27]Jiaxin Pan, Benedikt Wagner:
Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions. EUROCRYPT (5) 2023: 597-627 - [c26]Yao Jiang Galteland, Jiaxin Pan:
Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption. Public Key Cryptography (2) 2023: 399-428 - [i33]Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. IACR Cryptol. ePrint Arch. 2023: 15 (2023) - [i32]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. IACR Cryptol. ePrint Arch. 2023: 115 (2023) - [i31]Jiaxin Pan, Benedikt Wagner:
Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions. IACR Cryptol. ePrint Arch. 2023: 198 (2023) - [i30]Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Lattice-based Authenticated Key Exchange with Tight Security. IACR Cryptol. ePrint Arch. 2023: 823 (2023) - [i29]Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes. IACR Cryptol. ePrint Arch. 2023: 1321 (2023) - [i28]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2023: 1327 (2023) - [i27]Jiaxin Pan, Runzhi Zeng:
A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2023: 1334 (2023) - [i26]Jiaxin Pan, Benedikt Wagner, Runzhi Zeng:
Tighter Security for Generic Authenticated Key Exchange in the QROM. IACR Cryptol. ePrint Arch. 2023: 1380 (2023) - [i25]Jiaxin Pan, Benedikt Wagner:
Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures. IACR Cryptol. ePrint Arch. 2023: 1613 (2023) - [i24]Jiaxin Pan, Runzhi Zeng:
Selective Opening Security in the Quantum Random Oracle Model, Revisited. IACR Cryptol. ePrint Arch. 2023: 1682 (2023) - [i23]Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. IACR Cryptol. ePrint Arch. 2023: 1857 (2023) - 2022
- [j5]Jiaxin Pan, Chen Qian, Magnus Ringerud:
Signed (Group) Diffie-Hellman Key Exchange with Tight Security. J. Cryptol. 35(4): 26 (2022) - [c25]Jiaxin Pan, Runzhi Zeng:
Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes. ASIACRYPT (3) 2022: 363-393 - [c24]Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. ASIACRYPT (2) 2022: 437-465 - [c23]Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. EUROCRYPT (2) 2022: 305-335 - [c22]Jiaxin Pan, Benedikt Wagner:
Lattice-Based Signatures with Tight Adaptive Corruptions and More. Public Key Cryptography (2) 2022: 347-378 - [i22]Jiaxin Pan, Benedikt Wagner:
Lattice-based Signatures with Tight Adaptive Corruptions and More. IACR Cryptol. ePrint Arch. 2022: 15 (2022) - [i21]Yao Jiang Galteland, Jiaxin Pan:
Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption. IACR Cryptol. ePrint Arch. 2022: 324 (2022) - [i20]Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. IACR Cryptol. ePrint Arch. 2022: 548 (2022) - 2021
- [c21]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. CRYPTO (4) 2021: 179-207 - [c20]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. CRYPTO (4) 2021: 670-700 - [c19]Jiaxin Pan, Chen Qian, Magnus Ringerud:
Signed Diffie-Hellman Key Exchange with Tight Security. CT-RSA 2021: 201-226 - [c18]Jiaxin Pan, Benedikt Wagner:
Short Identity-Based Signatures with Tight Security from Lattices. PQCrypto 2021: 360-379 - [i19]Jiaxin Pan, Magnus Ringerud:
Signatures with Tight Multi-User Security from Search Assumptions. IACR Cryptol. ePrint Arch. 2021: 382 (2021) - [i18]Jiaxin Pan, Chen Qian, Magnus Ringerud:
Signed Diffie-Hellman Key Exchange with Tight Security. IACR Cryptol. ePrint Arch. 2021: 607 (2021) - [i17]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. IACR Cryptol. ePrint Arch. 2021: 863 (2021) - [i16]Jiaxin Pan, Benedikt Wagner:
Short Identity-Based Signatures with Tight Security from Lattices. IACR Cryptol. ePrint Arch. 2021: 970 (2021) - 2020
- [j4]Roman Langrehr, Jiaxin Pan:
Tightly Secure Hierarchical Identity-Based Encryption. J. Cryptol. 33(4): 1787-1821 (2020) - [c17]Roman Langrehr, Jiaxin Pan:
Unbounded HIBE with Tight Security. ASIACRYPT (2) 2020: 129-159 - [c16]Jiaxin Pan, Magnus Ringerud:
Signatures with Tight Multi-user Security from Search Assumptions. ESORICS (2) 2020: 485-504 - [c15]Roman Langrehr, Jiaxin Pan:
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security. Public Key Cryptography (1) 2020: 153-183 - [i15]Roman Langrehr, Jiaxin Pan:
Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security. IACR Cryptol. ePrint Arch. 2020: 146 (2020) - [i14]Roman Langrehr, Jiaxin Pan:
Unbounded HIBE with Tight Security. IACR Cryptol. ePrint Arch. 2020: 1099 (2020)
2010 – 2019
- 2019
- [j3]Xiao Zhang, Shengli Liu, Jiaxin Pan, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. Theor. Comput. Sci. 795: 326-344 (2019) - [c14]Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. ASIACRYPT (3) 2019: 669-699 - [c13]Roman Langrehr, Jiaxin Pan:
Tightly Secure Hierarchical Identity-Based Encryption. Public Key Cryptography (1) 2019: 436-465 - [i13]Roman Langrehr, Jiaxin Pan:
Tightly secure hierarchical identity-based encryption. IACR Cryptol. ePrint Arch. 2019: 58 (2019) - [i12]Julia Kastner, Jiaxin Pan:
Towards Instantiating the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2019: 1018 (2019) - [i11]Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. IACR Cryptol. ePrint Arch. 2019: 1284 (2019) - 2018
- [c12]Dennis Hofheinz, Dingding Jia, Jiaxin Pan:
Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks. ASIACRYPT (2) 2018: 190-220 - [c11]Tibor Jager, Rafael Kurek, Jiaxin Pan:
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. ASIACRYPT (3) 2018: 490-518 - [c10]Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan:
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. EUROCRYPT (2) 2018: 230-258 - [i10]Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan:
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. IACR Cryptol. ePrint Arch. 2018: 54 (2018) - [i9]Tibor Jager, Rafael Kurek, Jiaxin Pan:
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH. IACR Cryptol. ePrint Arch. 2018: 826 (2018) - [i8]Dennis Hofheinz, Dingding Jia, Jiaxin Pan:
Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 834 (2018) - 2017
- [c9]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. ASIACRYPT (3) 2017: 68-94 - [c8]Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-Preserving Signatures with Almost Tight Security. CRYPTO (2) 2017: 548-580 - [i7]Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan:
Compact Structure-preserving Signatures with Almost Tight Security. IACR Cryptol. ePrint Arch. 2017: 524 (2017) - [i6]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. IACR Cryptol. ePrint Arch. 2017: 870 (2017) - 2016
- [b1]Jiaxin Pan:
Improved security proofs and constructions for public-key cryptography. Ruhr University Bochum, Germany, 2016 - [j2]Weiqiang Wen, Libin Wang, Jiaxin Pan:
Unified security model of authenticated key exchange with specific adversarial capabilities. IET Inf. Secur. 10(1): 8-17 (2016) - [c7]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. CRYPTO (2) 2016: 33-61 - [i5]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptol. ePrint Arch. 2016: 191 (2016) - 2015
- [c6]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. CRYPTO (2) 2015: 275-295 - [c5]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. Public Key Cryptography 2015: 256-279 - [i4]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptol. ePrint Arch. 2015: 604 (2015) - 2014
- [c4]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. CRYPTO (1) 2014: 408-425 - [i3]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. IACR Cryptol. ePrint Arch. 2014: 581 (2014) - [i2]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. IACR Cryptol. ePrint Arch. 2014: 1021 (2014) - 2013
- [i1]Weiqiang Wen, Libin Wang, Jiaxin Pan:
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities. IACR Cryptol. ePrint Arch. 2013: 871 (2013) - 2011
- [j1]Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption. J. Internet Serv. Inf. Secur. 1(2/3): 107-124 (2011) - [c3]Jiaxin Pan, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431 - [c2]Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. ProvSec 2011: 380-388 - 2010
- [c1]Jiaxin Pan, Libin Wang, Changshe Ma:
Security Enhancement and Modular Treatment towards Authenticated Key Exchange. ICICS 2010: 203-217
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint