Sanjit Chatterjee

From MaRDI portal
(Redirected from Person:289920)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient IBS from a new assumption in the multivariate-quadratic setting
Lecture Notes in Computer Science
2023-08-14Paper
Revisiting the security of salted UOV signature
Lecture Notes in Computer Science
2023-08-14Paper
Identity-based signature and extended forking algorithm in the multivariate quadratic setting
Lecture Notes in Computer Science
2023-05-12Paper
From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption2021-06-08Paper
Rerandomizable signatures under standard assumption2020-05-12Paper
Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Advances in Mathematics of Communications
2020-05-04Paper
Large universe subset predicate encryption based on static assumption (without random oracle)2020-01-28Paper
Keyword search meets membership testing: adaptive security from SXDH2019-03-29Paper
Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature (extended abstract)2018-11-07Paper
Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
Journal of Mathematical Cryptology
2018-10-04Paper
Private set-intersection with common set-up
Advances in Mathematics of Communications
2018-09-21Paper
CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient2018-04-26Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
IEEE Transactions on Computers
2017-09-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited
IEEE Transactions on Computers
2017-05-16Paper
Type 2 structure-preserving signature schemes revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
A closer look at multiple forking: leveraging (in)dependence for a tighter bound
Algorithmica
2016-05-31Paper
Property preserving symmetric encryption revisited
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Framework for efficient search and statistics computation on encrypted cloud data
Advances in Information and Computer Security
2015-05-27Paper
From selective-ID to full-ID IBS without random oracles
Security, Privacy, and Applied Cryptography Engineering
2014-09-15Paper
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
International Journal of Applied Cryptography
2013-11-15Paper
Galindo-Garcia identity-based signature revisited
Lecture Notes in Computer Science
2013-06-04Paper
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract)
Public Key Cryptography – PKC 2012
2012-07-20Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
Discrete Applied Mathematics
2011-08-10Paper
A generic variant of NIST'S KAS2 key agreement protocol
Information Security and Privacy
2011-07-07Paper
Identity-based encryption2011-04-07Paper
Combined security analysis of the one- and three-pass unified model key agreement protocols
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
Arithmetic of Finite Fields
2010-07-20Paper
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography
2010-05-19Paper
A new protocol for the nearby friend problem
Cryptography and Coding
2010-01-07Paper
Reusing static keys in key agreement protocols
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Identity-based encryption and hierarchical identity-based encryption2009-03-24Paper
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Provable Security
2008-06-10Paper
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
HIBE With Short Public Parameters Without Random Oracle
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
Lecture Notes in Computer Science
2008-03-17Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Sanjit Chatterjee