The following pages link to Sanjit Chatterjee (Q289920):
Displayed 40 items.
- A closer look at multiple forking: leveraging (in)dependence for a tighter bound (Q289922) (← links)
- Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption (Q381130) (← links)
- Comparing two pairing-based aggregate signature schemes (Q970534) (← links)
- Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature (extended abstract) (Q1616658) (← links)
- Keyword search meets membership testing: adaptive security from SXDH (Q1738041) (← links)
- CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient (Q1746827) (← links)
- Private set-intersection with common set-up (Q1783703) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption (Q2030873) (← links)
- Malleability and ownership of proxy signatures: towards a stronger definition and its limitations (Q2176286) (← links)
- Rerandomizable signatures under standard assumption (Q2179379) (← links)
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited (Q2275939) (← links)
- Large universe subset predicate encryption based on static assumption (without random oracle) (Q2290442) (← links)
- Another look at tightness. II: Practical issues in cryptography (Q2412214) (← links)
- Property Preserving Symmetric Encryption Revisited (Q2795994) (← links)
- Type 2 Structure-Preserving Signature Schemes Revisited (Q2811135) (← links)
- Another Look at Tightness (Q2889878) (← links)
- Variants of Waters’ Dual System Primitives Using Asymmetric Pairings (Q2900224) (← links)
- Fault Attacks on Pairing-Based Protocols: Revisited (Q2982248) (← links)
- A Generic Variant of NIST’s KAS2 Key Agreement Protocol (Q3013002) (← links)
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols (Q3058712) (← links)
- From Selective-ID to Full-ID IBS without Random Oracles (Q3189999) (← links)
- Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks (Q3503870) (← links)
- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings (Q3578469) (← links)
- (Q3615878) (← links)
- Reusing Static Keys in Key Agreement Protocols (Q3652310) (← links)
- A New Protocol for the Nearby Friend Problem (Q3654621) (← links)
- Galindo-Garcia Identity-Based Signature Revisited (Q4922893) (← links)
- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data (Q5253647) (← links)
- On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One (Q5353467) (← links)
- New Constructions of Constant Size Ciphertext HIBE Without Random Oracle (Q5385581) (← links)
- Identity-Based Encryption (Q5391636) (← links)
- Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields (Q5450899) (← links)
- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext (Q5458292) (← links)
- HIBE With Short Public Parameters Without Random Oracle (Q5459076) (← links)
- Public Key Cryptography - PKC 2006 (Q5898947) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899301) (← links)
- Identity-based signature and extended forking algorithm in the multivariate quadratic setting (Q6157598) (← links)
- Efficient IBS from a new assumption in the multivariate-quadratic setting (Q6169496) (← links)
- Revisiting the security of salted UOV signature (Q6169497) (← links)