BibTeX records: Jiaxin Pan

download as .bib file

@article{DBLP:journals/dcc/PanQW24,
  author       = {Jiaxin Pan and
                  Chen Qian and
                  Benedikt Wagner},
  title        = {Generic constructions of master-key {KDM} secure attribute-based encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {51--92},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01296-4},
  doi          = {10.1007/S10623-023-01296-4},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PanQW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/PanNLS24,
  author       = {Jiaxin Pan and
                  Mojtaba Nayyeri and
                  Yinan Li and
                  Steffen Staab},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {{HGE:} Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous
                  Geometric Subspaces},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {8913--8920},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i8.28739},
  doi          = {10.1609/AAAI.V38I8.28739},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/PanNLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanRZ24,
  author       = {Jiaxin Pan and
                  Doreen Riepel and
                  Runzhi Zeng},
  title        = {Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/361},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PanRZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/WangPC23,
  author       = {Yuyu Wang and
                  Jiaxin Pan and
                  Yu Chen},
  title        = {Fine-Grained Secure Attribute-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {4},
  pages        = {33},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09479-x},
  doi          = {10.1007/S00145-023-09479-X},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/WangPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeHNOP23,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  title        = {Compact Structure-Preserving Signatures with Almost Tight Security},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {4},
  pages        = {37},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09477-z},
  doi          = {10.1007/S00145-023-09477-Z},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeHNOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/PanLLWL23,
  author       = {Jiaxin Pan and
                  Zixuan Liu and
                  Donglin Li and
                  Lulu Wang and
                  Bixin Li},
  title        = {An empirical study of software architecture resilience evaluation
                  methods},
  journal      = {J. Syst. Softw.},
  volume       = {202},
  pages        = {111726},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jss.2023.111726},
  doi          = {10.1016/J.JSS.2023.111726},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/PanLLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/PanZGKC23,
  author       = {Jiaxin Pan and
                  Changyao Zhou and
                  Mariia Gladkova and
                  Qadeer Khan and
                  Daniel Cremers},
  title        = {Robust Autonomous Vehicle Pursuit Without Expert Steering Labels},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {8},
  number       = {10},
  pages        = {6595--6602},
  year         = {2023},
  url          = {https://doi.org/10.1109/LRA.2023.3308060},
  doi          = {10.1109/LRA.2023.3308060},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ral/PanZGKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PanZ23,
  author       = {Jiaxin Pan and
                  Runzhi Zeng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {A Generic Construction of Tightly Secure Password-Based Authenticated
                  Key Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14445},
  pages        = {143--175},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8742-9\_5},
  doi          = {10.1007/978-981-99-8742-9\_5},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PanZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangSPC23,
  author       = {Yuyu Wang and
                  Chuanjie Su and
                  Jiaxin Pan and
                  Yu Chen},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {A Simple and Efficient Framework of Proof Systems for {NP}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  pages        = {174--207},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5\_6},
  doi          = {10.1007/978-981-99-8724-5\_6},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangSPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PanWZ23,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Tighter Security for Generic Authenticated Key Exchange in the {QROM}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14441},
  pages        = {401--433},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8730-6\_13},
  doi          = {10.1007/978-981-99-8730-6\_13},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PanWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PanWZ22,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Lattice-Based Authenticated Key Exchange with Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {616--647},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_20},
  doi          = {10.1007/978-3-031-38554-4\_20},
  timestamp    = {Tue, 26 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PanWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KiltzPRR23,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Magnus Ringerud},
  editor       = {Mike Rosulek},
  title        = {Multi-user {CDH} Problems and the Concrete Security of {NAXOS} and
                  {HMQV}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  pages        = {645--671},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7\_25},
  doi          = {10.1007/978-3-031-30872-7\_25},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KiltzPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsa/LiLPL23,
  author       = {Donglin Li and
                  Zixuan Liu and
                  Jiaxin Pan and
                  Bixin Li},
  title        = {Evaluating the Resilience of Software Architecture Based on Minimal
                  Path},
  booktitle    = {10th International Conference on Dependable Systems and Their Applications,
                  {DSA} 2023, Tokyo, Japan, August 10-11, 2023},
  pages        = {42--53},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSA59317.2023.00016},
  doi          = {10.1109/DSA59317.2023.00016},
  timestamp    = {Fri, 24 Nov 2023 19:56:37 +0100},
  biburl       = {https://dblp.org/rec/conf/dsa/LiLPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PanW23,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive
                  Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_21},
  doi          = {10.1007/978-3-031-30589-4\_21},
  timestamp    = {Thu, 20 Apr 2023 11:35:02 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PanW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GaltelandP23,
  author       = {Yao Jiang Galteland and
                  Jiaxin Pan},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic)
                  Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {399--428},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_14},
  doi          = {10.1007/978-3-031-31371-4\_14},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GaltelandP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/IurshinaPBS23,
  author       = {Anastasiia Iurshina and
                  Jiaxin Pan and
                  Rafika Boutalbi and
                  Steffen Staab},
  title        = {Data for: NILK, entity linking dataset targeting NIL-linking cases
                  {(1.0)}},
  publisher    = {DaRUS},
  year         = {2023},
  month        = jun,
  howpublished = {\url{https://darus.uni-stuttgart.de/dataset.xhtml?persistentId=doi:10.18419/darus-3454{\&}version=1.0}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://darus.uni-stuttgart.de/dataset.xhtml?persistentId=doi:10.18419/darus-3454\&\#38;version=1.0},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/IurshinaPBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-08380,
  author       = {Jiaxin Pan and
                  Changyao Zhou and
                  Mariia Gladkova and
                  Qadeer Khan and
                  Daniel Cremers},
  title        = {Robust Autonomous Vehicle Pursuit without Expert Steering Labels},
  journal      = {CoRR},
  volume       = {abs/2308.08380},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.08380},
  doi          = {10.48550/ARXIV.2308.08380},
  eprinttype    = {arXiv},
  eprint       = {2308.08380},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-08380.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-13680,
  author       = {Jiaxin Pan and
                  Mojtaba Nayyeri and
                  Yinan Li and
                  Steffen Staab},
  title        = {{HGE:} Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous
                  Geometric Subspaces},
  journal      = {CoRR},
  volume       = {abs/2312.13680},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.13680},
  doi          = {10.48550/ARXIV.2312.13680},
  eprinttype    = {arXiv},
  eprint       = {2312.13680},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-13680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangP23,
  author       = {Yuyu Wang and
                  Jiaxin Pan},
  title        = {Unconditionally Secure {NIZK} in the Fine-Grained Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/015},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPRR23,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Magnus Ringerud},
  title        = {Multi-User {CDH} Problems and the Concrete Security of {NAXOS} and
                  {HMQV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/115},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanW23,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  title        = {Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/198},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PanW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanWZ23,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  title        = {Lattice-based Authenticated Key Exchange with Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {823},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/823},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanWZ23a,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  title        = {Generic Constructions of Compact and Tightly Selective-Opening Secure
                  Public-key Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1321},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1321},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanWZ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangPC23,
  author       = {Yuyu Wang and
                  Jiaxin Pan and
                  Yu Chen},
  title        = {Fine-Grained Secure Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1327},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1327},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanZ23,
  author       = {Jiaxin Pan and
                  Runzhi Zeng},
  title        = {A Generic Construction of Tightly Secure Password-based Authenticated
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1334},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1334},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanWZ23b,
  author       = {Jiaxin Pan and
                  Benedikt Wagner and
                  Runzhi Zeng},
  title        = {Tighter Security for Generic Authenticated Key Exchange in the {QROM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1380},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1380},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanWZ23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanW23a,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  title        = {Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1613},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1613},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PanW23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanZ23a,
  author       = {Jiaxin Pan and
                  Runzhi Zeng},
  title        = {Selective Opening Security in the Quantum Random Oracle Model, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1682},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1682},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PanZ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangSPC23,
  author       = {Yuyu Wang and
                  Chuanjie Su and
                  Jiaxin Pan and
                  Yu Chen},
  title        = {A Simple and Efficient Framework of Proof Systems for {NP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1857},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1857},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangSPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PanQR22,
  author       = {Jiaxin Pan and
                  Chen Qian and
                  Magnus Ringerud},
  title        = {Signed (Group) Diffie-Hellman Key Exchange with Tight Security},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {4},
  pages        = {26},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09438-y},
  doi          = {10.1007/S00145-022-09438-Y},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/PanQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PanZ22,
  author       = {Jiaxin Pan and
                  Runzhi Zeng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Compact and Tightly Selective-Opening Secure Public-key Encryption
                  Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {363--393},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_13},
  doi          = {10.1007/978-3-031-22969-5\_13},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangP22,
  author       = {Yuyu Wang and
                  Jiaxin Pan},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Unconditionally Secure {NIZK} in the Fine-Grained Setting},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {437--465},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_15},
  doi          = {10.1007/978-3-031-22966-4\_15},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/IurshinaPBS22,
  author       = {Anastasiia Iurshina and
                  Jiaxin Pan and
                  Rafika Boutalbi and
                  Steffen Staab},
  editor       = {Mohammad Al Hasan and
                  Li Xiong},
  title        = {{NILK:} Entity Linking Dataset Targeting NIL-linking Cases},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Information
                  {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022},
  pages        = {4069--4073},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511808.3557659},
  doi          = {10.1145/3511808.3557659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/IurshinaPBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangP22,
  author       = {Yuyu Wang and
                  Jiaxin Pan},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {305--335},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_11},
  doi          = {10.1007/978-3-031-07085-3\_11},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PanW22,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Lattice-Based Signatures with Tight Adaptive Corruptions and More},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {347--378},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_12},
  doi          = {10.1007/978-3-030-97131-1\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PanW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanW22,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  title        = {Lattice-based Signatures with Tight Adaptive Corruptions and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {15},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/015},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PanW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaltelandP22,
  author       = {Yao Jiang Galteland and
                  Jiaxin Pan},
  title        = {Backward-Leak Uni-Directional Updatable Encryption from Public Key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/324},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaltelandP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangP22,
  author       = {Yuyu Wang and
                  Jiaxin Pan},
  title        = {Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/548},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WangPC21,
  author       = {Yuyu Wang and
                  Jiaxin Pan and
                  Yu Chen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Fine-Grained Secure Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {179--207},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_7},
  doi          = {10.1007/978-3-030-84259-8\_7},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WangPC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanJKLPRS21,
  author       = {Shuai Han and
                  Tibor Jager and
                  Eike Kiltz and
                  Shengli Liu and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Authenticated Key Exchange and Signatures with Tight Security in the
                  Standard Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {670--700},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_23},
  doi          = {10.1007/978-3-030-84259-8\_23},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/PanQR21,
  author       = {Jiaxin Pan and
                  Chen Qian and
                  Magnus Ringerud},
  editor       = {Kenneth G. Paterson},
  title        = {Signed Diffie-Hellman Key Exchange with Tight Security},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {201--226},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_9},
  doi          = {10.1007/978-3-030-75539-3\_9},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/PanQR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/YuanPJLP21,
  author       = {Youliang Yuan and
                  Jiaxin Pan and
                  Xu Jia and
                  Luchen Liu and
                  Min Peng},
  title        = {{DCEN:} {A} Decoupled Context Enhanced Network For Few-shot Slot Tagging},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9533361},
  doi          = {10.1109/IJCNN52387.2021.9533361},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcnn/YuanPJLP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nlpcc/JiaPYP21,
  author       = {Xu Jia and
                  Jiaxin Pan and
                  Youliang Yuan and
                  Min Peng},
  editor       = {Lu Wang and
                  Yansong Feng and
                  Yu Hong and
                  Ruifang He},
  title        = {Multi-intent Attention and Top-k Network with Interactive Framework
                  for Joint Multiple Intent Detection and Slot Filling},
  booktitle    = {Natural Language Processing and Chinese Computing - 10th {CCF} International
                  Conference, {NLPCC} 2021, Qingdao, China, October 13-17, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13028},
  pages        = {467--479},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88480-2\_37},
  doi          = {10.1007/978-3-030-88480-2\_37},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nlpcc/JiaPYP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/PanW21,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Short Identity-Based Signatures with Tight Security from Lattices},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {360--379},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_19},
  doi          = {10.1007/978-3-030-81293-5\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/PanW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08200,
  author       = {Jiaxin Pan and
                  Min Peng and
                  Yiyan Zhang},
  title        = {Mention-centered Graph Neural Network for Document-level Relation
                  Extraction},
  journal      = {CoRR},
  volume       = {abs/2103.08200},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08200},
  eprinttype    = {arXiv},
  eprint       = {2103.08200},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08200.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanR21,
  author       = {Jiaxin Pan and
                  Magnus Ringerud},
  title        = {Signatures with Tight Multi-User Security from Search Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/382},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanQR21,
  author       = {Jiaxin Pan and
                  Chen Qian and
                  Magnus Ringerud},
  title        = {Signed Diffie-Hellman Key Exchange with Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {607},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/607},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanQR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanJKLPRS21,
  author       = {Shuai Han and
                  Tibor Jager and
                  Eike Kiltz and
                  Shengli Liu and
                  Jiaxin Pan and
                  Doreen Riepel and
                  Sven Sch{\"{a}}ge},
  title        = {Authenticated Key Exchange and Signatures with Tight Security in the
                  Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/863},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanJKLPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PanW21,
  author       = {Jiaxin Pan and
                  Benedikt Wagner},
  title        = {Short Identity-Based Signatures with Tight Security from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {970},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/970},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PanW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LangrehrP20,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  title        = {Tightly Secure Hierarchical Identity-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1787--1821},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09356-x},
  doi          = {10.1007/S00145-020-09356-X},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LangrehrP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LangrehrP20,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Unbounded {HIBE} with Tight Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {129--159},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_5},
  doi          = {10.1007/978-3-030-64834-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LangrehrP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PanR20,
  author       = {Jiaxin Pan and
                  Magnus Ringerud},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Signatures with Tight Multi-user Security from Search Assumptions},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {485--504},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_24},
  doi          = {10.1007/978-3-030-59013-0\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PanR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangrehrP20,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Hierarchical Identity-Based Encryption with Tight Multi-challenge
                  Security},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {153--183},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_6},
  doi          = {10.1007/978-3-030-45374-9\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LangrehrP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-14722,
  author       = {Guoqing Luo and
                  Jiaxin Pan and
                  Min Peng},
  title        = {{RDSGAN:} Rank-based Distant Supervision Relation Extraction with
                  Generative Adversarial Framework},
  journal      = {CoRR},
  volume       = {abs/2009.14722},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.14722},
  eprinttype    = {arXiv},
  eprint       = {2009.14722},
  timestamp    = {Wed, 07 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-14722.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangrehrP20,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  title        = {Hierarchical Identity-Based Encryption with Tight Multi-Challenge
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangrehrP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangrehrP20a,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  title        = {Unbounded {HIBE} with Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1099},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1099},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangrehrP20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhangLPG19,
  author       = {Xiao Zhang and
                  Shengli Liu and
                  Jiaxin Pan and
                  Dawu Gu},
  title        = {Tightly secure signature schemes from the {LWE} and subset sum assumptions},
  journal      = {Theor. Comput. Sci.},
  volume       = {795},
  pages        = {326--344},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2019.07.015},
  doi          = {10.1016/J.TCS.2019.07.015},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhangLPG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeJOP0W19,
  author       = {Masayuki Abe and
                  Charanjit S. Jutla and
                  Miyako Ohkubo and
                  Jiaxin Pan and
                  Arnab Roy and
                  Yuyu Wang},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Shorter {QA-NIZK} and {SPS} with Tighter Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {669--699},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_23},
  doi          = {10.1007/978-3-030-34618-8\_23},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeJOP0W19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LangrehrP19,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Tightly Secure Hierarchical Identity-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {436--465},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_15},
  doi          = {10.1007/978-3-030-17253-4\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LangrehrP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LangrehrP19,
  author       = {Roman Langrehr and
                  Jiaxin Pan},
  title        = {Tightly secure hierarchical identity-based encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {58},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LangrehrP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KastnerP19,
  author       = {Julia Kastner and
                  Jiaxin Pan},
  title        = {Towards Instantiating the Algebraic Group Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KastnerP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeJOPRW19,
  author       = {Masayuki Abe and
                  Charanjit S. Jutla and
                  Miyako Ohkubo and
                  Jiaxin Pan and
                  Arnab Roy and
                  Yuyu Wang},
  title        = {Shorter {QA-NIZK} and {SPS} with Tighter Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1284},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1284},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeJOPRW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HofheinzJP18,
  author       = {Dennis Hofheinz and
                  Dingding Jia and
                  Jiaxin Pan},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {190--220},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_7},
  doi          = {10.1007/978-3-030-03329-3\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HofheinzJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JagerKP18,
  author       = {Tibor Jager and
                  Rafael Kurek and
                  Jiaxin Pan},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Simple and More Efficient PRFs with Tight Security from {LWE} and
                  Matrix-DDH},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  pages        = {490--518},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3\_18},
  doi          = {10.1007/978-3-030-03332-3\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JagerKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GayHKP18,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Lisa Kohl and
                  Jiaxin Pan},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {230--258},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_8},
  doi          = {10.1007/978-3-319-78375-8\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GayHKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GayHKP18,
  author       = {Romain Gay and
                  Dennis Hofheinz and
                  Lisa Kohl and
                  Jiaxin Pan},
  title        = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GayHKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JagerKP18,
  author       = {Tibor Jager and
                  Rafael Kurek and
                  Jiaxin Pan},
  title        = {Simple and More Efficient PRFs with Tight Security from {LWE} and
                  Matrix-DDH},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/826},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JagerKP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzJP18,
  author       = {Dennis Hofheinz and
                  Dingding Jia and
                  Jiaxin Pan},
  title        = {Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {834},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/834},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KiltzLP17,
  author       = {Eike Kiltz and
                  Julian Loss and
                  Jiaxin Pan},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Tightly-Secure Signatures from Five-Move Identification Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {68--94},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_3},
  doi          = {10.1007/978-3-319-70700-6\_3},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KiltzLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Compact Structure-Preserving Signatures with Almost Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {548--580},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_19},
  doi          = {10.1007/978-3-319-63715-0\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  title        = {Compact Structure-preserving Signatures with Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzLP17,
  author       = {Eike Kiltz and
                  Julian Loss and
                  Jiaxin Pan},
  title        = {Tightly-Secure Signatures from Five-Move Identification Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {870},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/870},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Pan16,
  author       = {Jiaxin Pan},
  title        = {Improved security proofs and constructions for public-key cryptography},
  school       = {Ruhr University Bochum, Germany},
  year         = {2016},
  url          = {http://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/4979},
  urn          = {urn:nbn:de:hbz:294-49797},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Pan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/WenWP16,
  author       = {Weiqiang Wen and
                  Libin Wang and
                  Jiaxin Pan},
  title        = {Unified security model of authenticated key exchange with specific
                  adversarial capabilities},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {8--17},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0234},
  doi          = {10.1049/IET-IFS.2014.0234},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/WenWP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzMP16,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Jiaxin Pan},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Optimal Security Proofs for Signatures from Identification Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {33--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_2},
  doi          = {10.1007/978-3-662-53008-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzMP16,
  author       = {Eike Kiltz and
                  Daniel Masny and
                  Jiaxin Pan},
  title        = {Optimal Security Proofs for Signatures from Identification Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KiltzPW15,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Hoeteck Wee},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Structure-Preserving Signatures from Standard Assumptions, Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {275--295},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_14},
  doi          = {10.1007/978-3-662-48000-7\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KiltzPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BlazyKKP15,
  author       = {Olivier Blazy and
                  Saqib A. Kakvi and
                  Eike Kiltz and
                  Jiaxin Pan},
  editor       = {Jonathan Katz},
  title        = {Tightly-Secure Signatures from Chameleon Hash Functions},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {256--279},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_12},
  doi          = {10.1007/978-3-662-46447-2\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/BlazyKKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiltzPW15,
  author       = {Eike Kiltz and
                  Jiaxin Pan and
                  Hoeteck Wee},
  title        = {Structure-Preserving Signatures from Standard Assumptions, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiltzPW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlazyKP14,
  author       = {Olivier Blazy and
                  Eike Kiltz and
                  Jiaxin Pan},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {408--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_23},
  doi          = {10.1007/978-3-662-44371-2\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyKP14,
  author       = {Olivier Blazy and
                  Eike Kiltz and
                  Jiaxin Pan},
  title        = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyKKP14,
  author       = {Olivier Blazy and
                  Saqib A. Kakvi and
                  Eike Kiltz and
                  Jiaxin Pan},
  title        = {Tightly-Secure Signatures from Chameleon Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyKKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WenWP13,
  author       = {Weiqiang Wen and
                  Libin Wang and
                  Jiaxin Pan},
  title        = {A Unified Security Model of Authenticated Key Exchange with Specific
                  Adversarial Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/871},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WenWP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/PanW11,
  author       = {Jiaxin Pan and
                  Libin Wang},
  title        = {{TMQV:} {A} Strongly eCK-secure Diffie-Hellman Protocol without Gap
                  Assumption},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {107--124},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.107},
  doi          = {10.22667/JISIS.2011.08.31.107},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/PanW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PanWM11,
  author       = {Jiaxin Pan and
                  Libin Wang and
                  Changshe Ma},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Analysis and Improvement of an Authenticated Key Exchange Protocol},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {417--431},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_31},
  doi          = {10.1007/978-3-642-21031-0\_31},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PanWM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PanW11,
  author       = {Jiaxin Pan and
                  Libin Wang},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {{TMQV:} {A} Strongly eCK-Secure Diffie-Hellman Protocol without Gap
                  Assumption},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {380--388},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_27},
  doi          = {10.1007/978-3-642-24316-5\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PanW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PanWM10,
  author       = {Jiaxin Pan and
                  Libin Wang and
                  Changshe Ma},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Security Enhancement and Modular Treatment towards Authenticated Key
                  Exchange},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {203--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_15},
  doi          = {10.1007/978-3-642-17650-0\_15},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/PanWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics