Optimal security proofs for signatures from identification schemes E Kiltz, D Masny, J Pan Annual International Cryptology Conference, 33-61, 2016 | 117 | 2016 |
(Hierarchical) identity-based encryption from affine message authentication O Blazy, E Kiltz, J Pan Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 106 | 2014 |
Structure-preserving signatures from standard assumptions, revisited E Kiltz, J Pan, H Wee Annual Cryptology Conference, 275-295, 2015 | 81 | 2015 |
Tightly-secure signatures from chameleon hash functions O Blazy, SA Kakvi, E Kiltz, J Pan Public-Key Cryptography--PKC 2015: 18th IACR International Conference on …, 2015 | 77 | 2015 |
More efficient (almost) tightly secure structure-preserving signatures R Gay, D Hofheinz, L Kohl, J Pan Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 50 | 2018 |
Compact structure-preserving signatures with almost tight security M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 44 | 2017 |
Identity-based encryption tightly secure under chosen-ciphertext attacks D Hofheinz, D Jia, J Pan Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 37 | 2018 |
Authenticated key exchange and signatures with tight security in the standard model S Han, T Jager, E Kiltz, S Liu, J Pan, D Riepel, S Schäge Annual International Cryptology Conference, 670-700, 2021 | 35 | 2021 |
Tightly secure hierarchical identity-based encryption R Langrehr, J Pan Journal of Cryptology 33 (4), 1787-1821, 2020 | 33 | 2020 |
Signed (group) diffie–hellman key exchange with tight security J Pan, C Qian, M Ringerud Journal of Cryptology 35 (4), 26, 2022 | 29 | 2022 |
Hierarchical identity-based encryption with tight multi-challenge security R Langrehr, J Pan Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020 | 29 | 2020 |
Shorter QA-NIZK and SPS with tighter security M Abe, CS Jutla, M Ohkubo, J Pan, A Roy, Y Wang International Conference on the Theory and Application of Cryptology and …, 2019 | 26 | 2019 |
Chopsticks: Fork-free two-round multi-signatures from non-interactive assumptions J Pan, B Wagner Annual International Conference on the Theory and Applications of …, 2023 | 21 | 2023 |
Lattice-based signatures with tight adaptive corruptions and more J Pan, B Wagner IACR International Conference on Public-Key Cryptography, 347-378, 2022 | 19 | 2022 |
Fine-grained secure attribute-based encryption Y Wang, J Pan, Y Chen Journal of Cryptology 36 (4), 33, 2023 | 18 | 2023 |
Unbounded HIBE with tight security R Langrehr, J Pan Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 15 | 2020 |
Backward-leak uni-directional updatable encryption from (homomorphic) public key encryption YJ Galteland, J Pan Cryptology ePrint Archive, 2022 | 14 | 2022 |
Tightly-secure signatures from five-move identification protocols E Kiltz, J Loss, J Pan International Conference on the Theory and Application of Cryptology and …, 2017 | 14 | 2017 |
Simple and more efficient PRFs with tight security from LWE and matrix-DDH T Jager, R Kurek, J Pan Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 11 | 2018 |
Non-interactive zero-knowledge proofs with fine-grained security Y Wang, J Pan Annual International Conference on the Theory and Applications of …, 2022 | 10 | 2022 |