Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jiaxin Pan
@article{DBLP:journals/dcc/PanQW24, author = {Jiaxin Pan and Chen Qian and Benedikt Wagner}, title = {Generic constructions of master-key {KDM} secure attribute-based encryption}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {51--92}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01296-4}, doi = {10.1007/S10623-023-01296-4}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PanQW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/PanNLS24, author = {Jiaxin Pan and Mojtaba Nayyeri and Yinan Li and Steffen Staab}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {{HGE:} Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous Geometric Subspaces}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {8913--8920}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i8.28739}, doi = {10.1609/AAAI.V38I8.28739}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/PanNLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanRZ24, author = {Jiaxin Pan and Doreen Riepel and Runzhi Zeng}, title = {Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2024}, url = {https://eprint.iacr.org/2024/361}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PanRZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/WangPC23, author = {Yuyu Wang and Jiaxin Pan and Yu Chen}, title = {Fine-Grained Secure Attribute-Based Encryption}, journal = {J. Cryptol.}, volume = {36}, number = {4}, pages = {33}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09479-x}, doi = {10.1007/S00145-023-09479-X}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/WangPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbeHNOP23, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-Preserving Signatures with Almost Tight Security}, journal = {J. Cryptol.}, volume = {36}, number = {4}, pages = {37}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09477-z}, doi = {10.1007/S00145-023-09477-Z}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeHNOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PanLLWL23, author = {Jiaxin Pan and Zixuan Liu and Donglin Li and Lulu Wang and Bixin Li}, title = {An empirical study of software architecture resilience evaluation methods}, journal = {J. Syst. Softw.}, volume = {202}, pages = {111726}, year = {2023}, url = {https://doi.org/10.1016/j.jss.2023.111726}, doi = {10.1016/J.JSS.2023.111726}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/PanLLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/PanZGKC23, author = {Jiaxin Pan and Changyao Zhou and Mariia Gladkova and Qadeer Khan and Daniel Cremers}, title = {Robust Autonomous Vehicle Pursuit Without Expert Steering Labels}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {8}, number = {10}, pages = {6595--6602}, year = {2023}, url = {https://doi.org/10.1109/LRA.2023.3308060}, doi = {10.1109/LRA.2023.3308060}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ral/PanZGKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PanZ23, author = {Jiaxin Pan and Runzhi Zeng}, editor = {Jian Guo and Ron Steinfeld}, title = {A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14445}, pages = {143--175}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8742-9\_5}, doi = {10.1007/978-981-99-8742-9\_5}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PanZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangSPC23, author = {Yuyu Wang and Chuanjie Su and Jiaxin Pan and Yu Chen}, editor = {Jian Guo and Ron Steinfeld}, title = {A Simple and Efficient Framework of Proof Systems for {NP}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, pages = {174--207}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5\_6}, doi = {10.1007/978-981-99-8724-5\_6}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangSPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PanWZ23, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, editor = {Jian Guo and Ron Steinfeld}, title = {Tighter Security for Generic Authenticated Key Exchange in the {QROM}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14441}, pages = {401--433}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8730-6\_13}, doi = {10.1007/978-981-99-8730-6\_13}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PanWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PanWZ22, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Lattice-Based Authenticated Key Exchange with Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {616--647}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_20}, doi = {10.1007/978-3-031-38554-4\_20}, timestamp = {Tue, 26 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PanWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KiltzPRR23, author = {Eike Kiltz and Jiaxin Pan and Doreen Riepel and Magnus Ringerud}, editor = {Mike Rosulek}, title = {Multi-user {CDH} Problems and the Concrete Security of {NAXOS} and {HMQV}}, booktitle = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, pages = {645--671}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7\_25}, doi = {10.1007/978-3-031-30872-7\_25}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KiltzPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsa/LiLPL23, author = {Donglin Li and Zixuan Liu and Jiaxin Pan and Bixin Li}, title = {Evaluating the Resilience of Software Architecture Based on Minimal Path}, booktitle = {10th International Conference on Dependable Systems and Their Applications, {DSA} 2023, Tokyo, Japan, August 10-11, 2023}, pages = {42--53}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSA59317.2023.00016}, doi = {10.1109/DSA59317.2023.00016}, timestamp = {Fri, 24 Nov 2023 19:56:37 +0100}, biburl = {https://dblp.org/rec/conf/dsa/LiLPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PanW23, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Carmit Hazay and Martijn Stam}, title = {Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {597--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_21}, doi = {10.1007/978-3-031-30589-4\_21}, timestamp = {Thu, 20 Apr 2023 11:35:02 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PanW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GaltelandP23, author = {Yao Jiang Galteland and Jiaxin Pan}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {399--428}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_14}, doi = {10.1007/978-3-031-31371-4\_14}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GaltelandP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/IurshinaPBS23, author = {Anastasiia Iurshina and Jiaxin Pan and Rafika Boutalbi and Steffen Staab}, title = {Data for: NILK, entity linking dataset targeting NIL-linking cases {(1.0)}}, publisher = {DaRUS}, year = {2023}, month = jun, howpublished = {\url{https://darus.uni-stuttgart.de/dataset.xhtml?persistentId=doi:10.18419/darus-3454{\&}version=1.0}}, note = {Accessed on YYYY-MM-DD.}, url = {https://darus.uni-stuttgart.de/dataset.xhtml?persistentId=doi:10.18419/darus-3454\&\#38;version=1.0}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/IurshinaPBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-08380, author = {Jiaxin Pan and Changyao Zhou and Mariia Gladkova and Qadeer Khan and Daniel Cremers}, title = {Robust Autonomous Vehicle Pursuit without Expert Steering Labels}, journal = {CoRR}, volume = {abs/2308.08380}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.08380}, doi = {10.48550/ARXIV.2308.08380}, eprinttype = {arXiv}, eprint = {2308.08380}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-08380.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-13680, author = {Jiaxin Pan and Mojtaba Nayyeri and Yinan Li and Steffen Staab}, title = {{HGE:} Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous Geometric Subspaces}, journal = {CoRR}, volume = {abs/2312.13680}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.13680}, doi = {10.48550/ARXIV.2312.13680}, eprinttype = {arXiv}, eprint = {2312.13680}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-13680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangP23, author = {Yuyu Wang and Jiaxin Pan}, title = {Unconditionally Secure {NIZK} in the Fine-Grained Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2023}, url = {https://eprint.iacr.org/2023/015}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPRR23, author = {Eike Kiltz and Jiaxin Pan and Doreen Riepel and Magnus Ringerud}, title = {Multi-User {CDH} Problems and the Concrete Security of {NAXOS} and {HMQV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2023}, url = {https://eprint.iacr.org/2023/115}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanW23, author = {Jiaxin Pan and Benedikt Wagner}, title = {Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2023}, url = {https://eprint.iacr.org/2023/198}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PanW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanWZ23, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, title = {Lattice-based Authenticated Key Exchange with Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2023}, url = {https://eprint.iacr.org/2023/823}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanWZ23a, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, title = {Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1321}, year = {2023}, url = {https://eprint.iacr.org/2023/1321}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanWZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangPC23, author = {Yuyu Wang and Jiaxin Pan and Yu Chen}, title = {Fine-Grained Secure Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1327}, year = {2023}, url = {https://eprint.iacr.org/2023/1327}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanZ23, author = {Jiaxin Pan and Runzhi Zeng}, title = {A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1334}, year = {2023}, url = {https://eprint.iacr.org/2023/1334}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanWZ23b, author = {Jiaxin Pan and Benedikt Wagner and Runzhi Zeng}, title = {Tighter Security for Generic Authenticated Key Exchange in the {QROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1380}, year = {2023}, url = {https://eprint.iacr.org/2023/1380}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanWZ23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanW23a, author = {Jiaxin Pan and Benedikt Wagner}, title = {Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1613}, year = {2023}, url = {https://eprint.iacr.org/2023/1613}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PanW23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanZ23a, author = {Jiaxin Pan and Runzhi Zeng}, title = {Selective Opening Security in the Quantum Random Oracle Model, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1682}, year = {2023}, url = {https://eprint.iacr.org/2023/1682}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PanZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangSPC23, author = {Yuyu Wang and Chuanjie Su and Jiaxin Pan and Yu Chen}, title = {A Simple and Efficient Framework of Proof Systems for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1857}, year = {2023}, url = {https://eprint.iacr.org/2023/1857}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangSPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PanQR22, author = {Jiaxin Pan and Chen Qian and Magnus Ringerud}, title = {Signed (Group) Diffie-Hellman Key Exchange with Tight Security}, journal = {J. Cryptol.}, volume = {35}, number = {4}, pages = {26}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09438-y}, doi = {10.1007/S00145-022-09438-Y}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/PanQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PanZ22, author = {Jiaxin Pan and Runzhi Zeng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {363--393}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_13}, doi = {10.1007/978-3-031-22969-5\_13}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/PanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangP22, author = {Yuyu Wang and Jiaxin Pan}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Unconditionally Secure {NIZK} in the Fine-Grained Setting}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {437--465}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_15}, doi = {10.1007/978-3-031-22966-4\_15}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/IurshinaPBS22, author = {Anastasiia Iurshina and Jiaxin Pan and Rafika Boutalbi and Steffen Staab}, editor = {Mohammad Al Hasan and Li Xiong}, title = {{NILK:} Entity Linking Dataset Targeting NIL-linking Cases}, booktitle = {Proceedings of the 31st {ACM} International Conference on Information {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022}, pages = {4069--4073}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511808.3557659}, doi = {10.1145/3511808.3557659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/IurshinaPBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangP22, author = {Yuyu Wang and Jiaxin Pan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {305--335}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_11}, doi = {10.1007/978-3-031-07085-3\_11}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PanW22, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Lattice-Based Signatures with Tight Adaptive Corruptions and More}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {347--378}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_12}, doi = {10.1007/978-3-030-97131-1\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PanW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanW22, author = {Jiaxin Pan and Benedikt Wagner}, title = {Lattice-based Signatures with Tight Adaptive Corruptions and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2022}, url = {https://eprint.iacr.org/2022/015}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PanW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaltelandP22, author = {Yao Jiang Galteland and Jiaxin Pan}, title = {Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {324}, year = {2022}, url = {https://eprint.iacr.org/2022/324}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaltelandP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangP22, author = {Yuyu Wang and Jiaxin Pan}, title = {Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2022}, url = {https://eprint.iacr.org/2022/548}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WangPC21, author = {Yuyu Wang and Jiaxin Pan and Yu Chen}, editor = {Tal Malkin and Chris Peikert}, title = {Fine-Grained Secure Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {179--207}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_7}, doi = {10.1007/978-3-030-84259-8\_7}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WangPC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanJKLPRS21, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Sch{\"{a}}ge}, editor = {Tal Malkin and Chris Peikert}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {670--700}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_23}, doi = {10.1007/978-3-030-84259-8\_23}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanJKLPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/PanQR21, author = {Jiaxin Pan and Chen Qian and Magnus Ringerud}, editor = {Kenneth G. Paterson}, title = {Signed Diffie-Hellman Key Exchange with Tight Security}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {201--226}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_9}, doi = {10.1007/978-3-030-75539-3\_9}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/PanQR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/YuanPJLP21, author = {Youliang Yuan and Jiaxin Pan and Xu Jia and Luchen Liu and Min Peng}, title = {{DCEN:} {A} Decoupled Context Enhanced Network For Few-shot Slot Tagging}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9533361}, doi = {10.1109/IJCNN52387.2021.9533361}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcnn/YuanPJLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nlpcc/JiaPYP21, author = {Xu Jia and Jiaxin Pan and Youliang Yuan and Min Peng}, editor = {Lu Wang and Yansong Feng and Yu Hong and Ruifang He}, title = {Multi-intent Attention and Top-k Network with Interactive Framework for Joint Multiple Intent Detection and Slot Filling}, booktitle = {Natural Language Processing and Chinese Computing - 10th {CCF} International Conference, {NLPCC} 2021, Qingdao, China, October 13-17, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13028}, pages = {467--479}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88480-2\_37}, doi = {10.1007/978-3-030-88480-2\_37}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nlpcc/JiaPYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/PanW21, author = {Jiaxin Pan and Benedikt Wagner}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Short Identity-Based Signatures with Tight Security from Lattices}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {360--379}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_19}, doi = {10.1007/978-3-030-81293-5\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/PanW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08200, author = {Jiaxin Pan and Min Peng and Yiyan Zhang}, title = {Mention-centered Graph Neural Network for Document-level Relation Extraction}, journal = {CoRR}, volume = {abs/2103.08200}, year = {2021}, url = {https://arxiv.org/abs/2103.08200}, eprinttype = {arXiv}, eprint = {2103.08200}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08200.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanR21, author = {Jiaxin Pan and Magnus Ringerud}, title = {Signatures with Tight Multi-User Security from Search Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2021}, url = {https://eprint.iacr.org/2021/382}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanQR21, author = {Jiaxin Pan and Chen Qian and Magnus Ringerud}, title = {Signed Diffie-Hellman Key Exchange with Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {607}, year = {2021}, url = {https://eprint.iacr.org/2021/607}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanQR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanJKLPRS21, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Sch{\"{a}}ge}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2021}, url = {https://eprint.iacr.org/2021/863}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanJKLPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanW21, author = {Jiaxin Pan and Benedikt Wagner}, title = {Short Identity-Based Signatures with Tight Security from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {970}, year = {2021}, url = {https://eprint.iacr.org/2021/970}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LangrehrP20, author = {Roman Langrehr and Jiaxin Pan}, title = {Tightly Secure Hierarchical Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1787--1821}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09356-x}, doi = {10.1007/S00145-020-09356-X}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LangrehrP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LangrehrP20, author = {Roman Langrehr and Jiaxin Pan}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Unbounded {HIBE} with Tight Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {129--159}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_5}, doi = {10.1007/978-3-030-64834-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LangrehrP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PanR20, author = {Jiaxin Pan and Magnus Ringerud}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Signatures with Tight Multi-user Security from Search Assumptions}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {485--504}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_24}, doi = {10.1007/978-3-030-59013-0\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PanR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangrehrP20, author = {Roman Langrehr and Jiaxin Pan}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Hierarchical Identity-Based Encryption with Tight Multi-challenge Security}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {153--183}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_6}, doi = {10.1007/978-3-030-45374-9\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LangrehrP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-14722, author = {Guoqing Luo and Jiaxin Pan and Min Peng}, title = {{RDSGAN:} Rank-based Distant Supervision Relation Extraction with Generative Adversarial Framework}, journal = {CoRR}, volume = {abs/2009.14722}, year = {2020}, url = {https://arxiv.org/abs/2009.14722}, eprinttype = {arXiv}, eprint = {2009.14722}, timestamp = {Wed, 07 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-14722.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangrehrP20, author = {Roman Langrehr and Jiaxin Pan}, title = {Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2020}, url = {https://eprint.iacr.org/2020/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LangrehrP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangrehrP20a, author = {Roman Langrehr and Jiaxin Pan}, title = {Unbounded {HIBE} with Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1099}, year = {2020}, url = {https://eprint.iacr.org/2020/1099}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LangrehrP20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhangLPG19, author = {Xiao Zhang and Shengli Liu and Jiaxin Pan and Dawu Gu}, title = {Tightly secure signature schemes from the {LWE} and subset sum assumptions}, journal = {Theor. Comput. Sci.}, volume = {795}, pages = {326--344}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2019.07.015}, doi = {10.1016/J.TCS.2019.07.015}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/ZhangLPG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeJOP0W19, author = {Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Shorter {QA-NIZK} and {SPS} with Tighter Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {669--699}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_23}, doi = {10.1007/978-3-030-34618-8\_23}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeJOP0W19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LangrehrP19, author = {Roman Langrehr and Jiaxin Pan}, editor = {Dongdai Lin and Kazue Sako}, title = {Tightly Secure Hierarchical Identity-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {436--465}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_15}, doi = {10.1007/978-3-030-17253-4\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/LangrehrP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LangrehrP19, author = {Roman Langrehr and Jiaxin Pan}, title = {Tightly secure hierarchical identity-based encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {58}, year = {2019}, url = {https://eprint.iacr.org/2019/058}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LangrehrP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KastnerP19, author = {Julia Kastner and Jiaxin Pan}, title = {Towards Instantiating the Algebraic Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2019}, url = {https://eprint.iacr.org/2019/1018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KastnerP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeJOPRW19, author = {Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang}, title = {Shorter {QA-NIZK} and {SPS} with Tighter Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1284}, year = {2019}, url = {https://eprint.iacr.org/2019/1284}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeJOPRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HofheinzJP18, author = {Dennis Hofheinz and Dingding Jia and Jiaxin Pan}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {190--220}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_7}, doi = {10.1007/978-3-030-03329-3\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HofheinzJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JagerKP18, author = {Tibor Jager and Rafael Kurek and Jiaxin Pan}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Simple and More Efficient PRFs with Tight Security from {LWE} and Matrix-DDH}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, pages = {490--518}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3\_18}, doi = {10.1007/978-3-030-03332-3\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JagerKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayHKP18, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {230--258}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_8}, doi = {10.1007/978-3-319-78375-8\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayHKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayHKP18, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan}, title = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2018}, url = {http://eprint.iacr.org/2018/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayHKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JagerKP18, author = {Tibor Jager and Rafael Kurek and Jiaxin Pan}, title = {Simple and More Efficient PRFs with Tight Security from {LWE} and Matrix-DDH}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2018}, url = {https://eprint.iacr.org/2018/826}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JagerKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzJP18, author = {Dennis Hofheinz and Dingding Jia and Jiaxin Pan}, title = {Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2018}, url = {https://eprint.iacr.org/2018/834}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KiltzLP17, author = {Eike Kiltz and Julian Loss and Jiaxin Pan}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Tightly-Secure Signatures from Five-Move Identification Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {68--94}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_3}, doi = {10.1007/978-3-319-70700-6\_3}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KiltzLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, editor = {Jonathan Katz and Hovav Shacham}, title = {Compact Structure-Preserving Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {548--580}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_19}, doi = {10.1007/978-3-319-63715-0\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-preserving Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2017}, url = {http://eprint.iacr.org/2017/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzLP17, author = {Eike Kiltz and Julian Loss and Jiaxin Pan}, title = {Tightly-Secure Signatures from Five-Move Identification Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {870}, year = {2017}, url = {http://eprint.iacr.org/2017/870}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Pan16, author = {Jiaxin Pan}, title = {Improved security proofs and constructions for public-key cryptography}, school = {Ruhr University Bochum, Germany}, year = {2016}, url = {http://hss-opus.ub.ruhr-uni-bochum.de/opus4/frontdoor/index/index/docId/4979}, urn = {urn:nbn:de:hbz:294-49797}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Pan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WenWP16, author = {Weiqiang Wen and Libin Wang and Jiaxin Pan}, title = {Unified security model of authenticated key exchange with specific adversarial capabilities}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {8--17}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2014.0234}, doi = {10.1049/IET-IFS.2014.0234}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WenWP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzMP16, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {33--61}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_2}, doi = {10.1007/978-3-662-53008-5\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzMP16, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2016}, url = {http://eprint.iacr.org/2016/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KiltzPW15, author = {Eike Kiltz and Jiaxin Pan and Hoeteck Wee}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Structure-Preserving Signatures from Standard Assumptions, Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {275--295}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_14}, doi = {10.1007/978-3-662-48000-7\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KiltzPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BlazyKKP15, author = {Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan}, editor = {Jonathan Katz}, title = {Tightly-Secure Signatures from Chameleon Hash Functions}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {256--279}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_12}, doi = {10.1007/978-3-662-46447-2\_12}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BlazyKKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiltzPW15, author = {Eike Kiltz and Jiaxin Pan and Hoeteck Wee}, title = {Structure-Preserving Signatures from Standard Assumptions, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2015}, url = {http://eprint.iacr.org/2015/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiltzPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlazyKP14, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, editor = {Juan A. Garay and Rosario Gennaro}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {408--425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_23}, doi = {10.1007/978-3-662-44371-2\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlazyKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyKP14, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2014}, url = {http://eprint.iacr.org/2014/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyKKP14, author = {Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan}, title = {Tightly-Secure Signatures from Chameleon Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2014}, url = {http://eprint.iacr.org/2014/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyKKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WenWP13, author = {Weiqiang Wen and Libin Wang and Jiaxin Pan}, title = {A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2013}, url = {http://eprint.iacr.org/2013/871}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WenWP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/PanW11, author = {Jiaxin Pan and Libin Wang}, title = {{TMQV:} {A} Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {107--124}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.107}, doi = {10.22667/JISIS.2011.08.31.107}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/PanW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PanWM11, author = {Jiaxin Pan and Libin Wang and Changshe Ma}, editor = {Feng Bao and Jian Weng}, title = {Analysis and Improvement of an Authenticated Key Exchange Protocol}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {417--431}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_31}, doi = {10.1007/978-3-642-21031-0\_31}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PanWM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PanW11, author = {Jiaxin Pan and Libin Wang}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {{TMQV:} {A} Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {380--388}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_27}, doi = {10.1007/978-3-642-24316-5\_27}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PanW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PanWM10, author = {Jiaxin Pan and Libin Wang and Changshe Ma}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Security Enhancement and Modular Treatment towards Authenticated Key Exchange}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {203--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_15}, doi = {10.1007/978-3-642-17650-0\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PanWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.