Jiaxin Pan

Orcid: 0000-0002-7459-6850

Affiliations:
  • University of Kassel, Germany
  • NTNU - Norwegian University of Science and Technology, Trondheim, Norway (former)
  • Karlsruhe Institute of Technology, ITI, Karlsruhe, Germany (former)
  • Ruhr University of Bochum, Horst Görtz Institute for IT Security, Germany (PhD 2016)


According to our database1, Jiaxin Pan authored at least 46 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
XHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV.
IACR Cryptol. ePrint Arch., 2025

sfXHMQV: Better Efficiency and Stronger Security for Signal's Initial Handshake based on HMQV.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Generic constructions of master-key KDM secure attribute-based encryption.
Des. Codes Cryptogr., January, 2024

Selective Opening Security in the Quantum Random Oracle Model, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023

Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

Lattice-Based Authenticated Key Exchange with Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

A Simple and Efficient Framework of Proof Systems for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

A Generic Construction of Tightly Secure Password-Based Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Tighter Security for Generic Authenticated Key Exchange in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Signed (Group) Diffie-Hellman Key Exchange with Tight Security.
J. Cryptol., 2022

Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

Lattice-Based Signatures with Tight Adaptive Corruptions and More.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Unconditionally Secure NIZK in the Fine-Grained Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Short Identity-Based Signatures with Tight Security from Lattices.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Signed Diffie-Hellman Key Exchange with Tight Security.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Fine-Grained Secure Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Hierarchical Identity-Based Encryption with Tight Multi-challenge Security.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Signatures with Tight Multi-user Security from Search Assumptions.
Proceedings of the Computer Security - ESORICS 2020, 2020

Unbounded HIBE with Tight Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Tightly secure signature schemes from the LWE and subset sum assumptions.
Theor. Comput. Sci., 2019

Towards Instantiating the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2019

Tightly Secure Hierarchical Identity-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Shorter QA-NIZK and SPS with Tighter Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Compact Structure-Preserving Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Tightly-Secure Signatures from Five-Move Identification Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Improved security proofs and constructions for public-key cryptography.
PhD thesis, 2016

Optimal Security Proofs for Signatures from Identification Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Tightly-Secure Signatures from Chameleon Hash Functions.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Structure-Preserving Signatures from Standard Assumptions, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
(Hierarchical) Identity-Based Encryption from Affine Message Authentication.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities.
IACR Cryptol. ePrint Arch., 2013

2011
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption.
Proceedings of the Provable Security - 5th International Conference, 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

2010
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010


  Loading...