Sanjit Chatterjee

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient IBS from a new assumption in the multivariate-quadratic setting
Lecture Notes in Computer Science
2023-08-14Paper
Revisiting the security of salted UOV signature
Lecture Notes in Computer Science
2023-08-14Paper
Identity-based signature and extended forking algorithm in the multivariate quadratic setting
Lecture Notes in Computer Science
2023-05-12Paper
From rerandomizability to sequential aggregation: efficient signature schemes based on SXDH assumption2021-06-08Paper
Rerandomizable signatures under standard assumption2020-05-12Paper
Malleability and ownership of proxy signatures: towards a stronger definition and its limitations
Advances in Mathematics of Communications
2020-05-04Paper
Large universe subset predicate encryption based on static assumption (without random oracle)2020-01-28Paper
Keyword search meets membership testing: adaptive security from SXDH2019-03-29Paper
Towards static assumption based cryptosystem in pairing setting: further applications of DéjàQ and dual-form signature (extended abstract)2018-11-07Paper
Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis
Journal of Mathematical Cryptology
2018-10-04Paper
Private set-intersection with common set-up
Advances in Mathematics of Communications
2018-09-21Paper
CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient2018-04-26Paper
Another look at tightness. II: Practical issues in cryptography2017-10-23Paper
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
IEEE Transactions on Computers
2017-09-08Paper
Fault Attacks on Pairing-Based Protocols: Revisited
IEEE Transactions on Computers
2017-05-16Paper
Type 2 structure-preserving signature schemes revisited
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
A closer look at multiple forking: leveraging (in)dependence for a tighter bound
Algorithmica
2016-05-31Paper
Property preserving symmetric encryption revisited
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Framework for efficient search and statistics computation on encrypted cloud data
Advances in Information and Computer Security
2015-05-27Paper
From selective-ID to full-ID IBS without random oracles
Security, Privacy, and Applied Cryptography Engineering
2014-09-15Paper
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption
International Journal of Applied Cryptography
2013-11-15Paper
Galindo-Garcia identity-based signature revisited
Lecture Notes in Computer Science
2013-06-04Paper
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract)
Public Key Cryptography – PKC 2012
2012-07-20Paper
Another look at tightness
Selected Areas in Cryptography
2012-06-08Paper
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
Discrete Applied Mathematics
2011-08-10Paper
A generic variant of NIST'S KAS2 key agreement protocol
Information Security and Privacy
2011-07-07Paper
Identity-based encryption2011-04-07Paper
Combined security analysis of the one- and three-pass unified model key agreement protocols
Progress in Cryptology - INDOCRYPT 2010
2010-12-07Paper
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings
Arithmetic of Finite Fields
2010-07-20Paper
Comparing two pairing-based aggregate signature schemes
Designs, Codes and Cryptography
2010-05-19Paper
A new protocol for the nearby friend problem
Cryptography and Coding
2010-01-07Paper
Reusing static keys in key agreement protocols
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Identity-based encryption and hierarchical identity-based encryption2009-03-24Paper
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks
Provable Security
2008-06-10Paper
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
HIBE With Short Public Parameters Without Random Oracle
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields
Lecture Notes in Computer Science
2008-03-17Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Sanjit Chatterjee