Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance

    Consider a state-level adversary who observes and stores large amounts of encrypted data from all users on the Internet, but does not have the capacity to store it all. Later, it may target certain “persons of...

    Jiaxin Guan, Daniel Wichs, Mark Zhandry in Theory of Cryptography (2023)

  2. No Access

    Chapter and Conference Paper

    A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies

    We give the first black box lower bound for signature protocols that can be described as group actions, which include many based on isogenies. We show that, for a large class of signature schemes making black ...

    Dan Boneh, Jiaxin Guan, Mark Zhandry in Advances in Cryptology – EUROCRYPT 2023 (2023)

  3. No Access

    Chapter and Conference Paper

    Streaming Functional Encryption

    We initiate the study of streaming functional encryption (sFE) which is designed for scenarios in which data arrives in a streaming manner and is computed on in an iterative manner as the stream arrives. Unlike i...

    Jiaxin Guan, Alexis Korb, Amit Sahai in Advances in Cryptology – CRYPTO 2023 (2023)

  4. No Access

    Chapter and Conference Paper

    Incompressible Cryptography

    Incompressible encryption allows us to make the ciphertext size flexibly large and ensures that an adversary learns nothing about the encrypted data, even if the decryption key later leaks, unless she stores esse...

    Jiaxin Guan, Daniel Wichs, Mark Zhandry in Advances in Cryptology – EUROCRYPT 2022 (2022)

  5. No Access

    Chapter and Conference Paper

    Disappearing Cryptography in the Bounded Storage Model

    In this work, we study disappearing cryptography in thebounded storage model. Here, a component of the transmission, say a ciphertext, a digital signature, or even a program, is streamed bit by bit. The stream is...

    Jiaxin Guan, Mark Zhandry in Theory of Cryptography (2021)

  6. No Access

    Article

    Numerical simulation on crystallization-induced warpage of injection-molded PP/EPDM part

    Prediction on crystallization-induced warpage in injection-molded semi-crystalline polymers is important in satisfying the required specifications of molded products. In this study, we chose a polypropylene (P...

    **aoyan Li, Qian Wei, Jun Li, Jian Yang, Jiaxin Guan in Journal of Polymer Research (2019)

  7. No Access

    Chapter and Conference Paper

    Simple Schemes in the Bounded Storage Model

    The bounded storage model promises unconditional security proofs against computationally unbounded adversaries, so long as the adversary’s space is bounded. In this work, we develop simple new constructions of...

    Jiaxin Guan, Mark Zhandary in Advances in Cryptology – EUROCRYPT 2019 (2019)

  8. Chapter and Conference Paper

    Return of GGH15: Provable Security Against Zeroizing Attacks

    The GGH15 multilinear maps have served as the foundation for a number of cutting-edge cryptographic proposals. Unfortunately, many schemes built on GGH15 have been explicitly broken by so-called “zeroizing att...

    James Bartusek, Jiaxin Guan, Fermi Ma, Mark Zhandry in Theory of Cryptography (2018)