Jiaxin Pan

Orcid: 0000-0002-7459-6850

Affiliations:
  • NTNU - Norwegian University of Science and Technology, Trondheim, Norway
  • Karlsruhe Institute of Technology, ITI, Karlsruhe, Germany (former)
  • Ruhr University of Bochum, Horst Görtz Institute for IT Security, Germany (former)


According to our database1, Jiaxin Pan authored at least 55 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generic constructions of master-key KDM secure attribute-based encryption.
Des. Codes Cryptogr., January, 2024

Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation.
IACR Cryptol. ePrint Arch., 2024

HGE: Embedding Temporal Knowledge Graphs in a Product Space of Heterogeneous Geometric Subspaces.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Robust Autonomous Vehicle Pursuit Without Expert Steering Labels.
IEEE Robotics Autom. Lett., October, 2023

Fine-Grained Secure Attribute-Based Encryption.
J. Cryptol., October, 2023

Compact Structure-Preserving Signatures with Almost Tight Security.
J. Cryptol., October, 2023

An empirical study of software architecture resilience evaluation methods.
J. Syst. Softw., August, 2023

Data for: NILK, entity linking dataset targeting NIL-linking cases.
Dataset, June, 2023

A Simple and Efficient Framework of Proof Systems for NP.
IACR Cryptol. ePrint Arch., 2023

Fine-Grained Secure Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2023

Unconditionally Secure NIZK in the Fine-Grained Setting.
IACR Cryptol. ePrint Arch., 2023

Selective Opening Security in the Quantum Random Oracle Model, Revisited.
IACR Cryptol. ePrint Arch., 2023

A Generic Construction of Tightly Secure Password-based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2023

Tighter Security for Generic Authenticated Key Exchange in the QROM.
IACR Cryptol. ePrint Arch., 2023

Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023

Lattice-based Authenticated Key Exchange with Tight Security.
IACR Cryptol. ePrint Arch., 2023

Toothpicks: More Efficient Fork-Free Two-Round Multi-Signatures.
IACR Cryptol. ePrint Arch., 2023

Chopsticks: Fork-Free Two-Round Multi-Signatures from Non-Interactive Assumptions.
IACR Cryptol. ePrint Arch., 2023

Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV.
IACR Cryptol. ePrint Arch., 2023

Backward-Leak Uni-Directional Updatable Encryption from (Homomorphic) Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Evaluating the Resilience of Software Architecture Based on Minimal Path.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

A Simple and Efficient Framework of Proof Systems for NP.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Signed (Group) Diffie-Hellman Key Exchange with Tight Security.
J. Cryptol., 2022

Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security.
IACR Cryptol. ePrint Arch., 2022

Lattice-based Signatures with Tight Adaptive Corruptions and More.
IACR Cryptol. ePrint Arch., 2022

Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

NILK: Entity Linking Dataset Targeting NIL-linking Cases.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Short Identity-Based Signatures with Tight Security from Lattices.
IACR Cryptol. ePrint Arch., 2021

Signatures with Tight Multi-User Security from Search Assumptions.
IACR Cryptol. ePrint Arch., 2021

Signed Diffie-Hellman Key Exchange with Tight Security.
IACR Cryptol. ePrint Arch., 2021

Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.
IACR Cryptol. ePrint Arch., 2021

Mention-centered Graph Neural Network for Document-level Relation Extraction.
CoRR, 2021

Multi-intent Attention and Top-k Network with Interactive Framework for Joint Multiple Intent Detection and Slot Filling.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

DCEN: A Decoupled Context Enhanced Network For Few-shot Slot Tagging.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Tightly Secure Hierarchical Identity-Based Encryption.
J. Cryptol., 2020

Unbounded HIBE with Tight Security.
IACR Cryptol. ePrint Arch., 2020

Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security.
IACR Cryptol. ePrint Arch., 2020

RDSGAN: Rank-based Distant Supervision Relation Extraction with Generative Adversarial Framework.
CoRR, 2020

2019
Tightly secure signature schemes from the LWE and subset sum assumptions.
Theor. Comput. Sci., 2019

Towards Instantiating the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2019

Shorter QA-NIZK and SPS with Tighter Security.
IACR Cryptol. ePrint Arch., 2019

2018
Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH.
IACR Cryptol. ePrint Arch., 2018

Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2018

More Efficient (Almost) Tightly Secure Structure-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2018

2017
Tightly-Secure Signatures from Five-Move Identification Protocols.
IACR Cryptol. ePrint Arch., 2017

2016
Improved security proofs and constructions for public-key cryptography.
PhD thesis, 2016

Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Inf. Secur., 2016

Optimal Security Proofs for Signatures from Identification Schemes.
IACR Cryptol. ePrint Arch., 2016

2015
Structure-Preserving Signatures from Standard Assumptions, Revisited.
IACR Cryptol. ePrint Arch., 2015

2014
(Hierarchical) Identity-Based Encryption from Affine Message Authentication.
IACR Cryptol. ePrint Arch., 2014

Tightly-Secure Signatures from Chameleon Hash Functions.
IACR Cryptol. ePrint Arch., 2014

2011
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

2010
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010


  Loading...