[go: up one dir, main page]

Follow
Partha Sarathi Roy
Partha Sarathi Roy
School of Computing and Information Technology; University of Wollongong.
Verified email at uow.edu.au - Homepage
Title
Cited by
Cited by
Year
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
W Susilo, P Dutta, DH Duong, PS Roy
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
412021
A Lattice-Based Public Key Encryption with Equality Test in Standard Model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Australasian Conference on Information Security and Privacy 11547, 138-155, 2019
392019
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
352021
Lattice-Based IBE with Equality Test in Standard Model
DH Duong, HQ Le, PS Roy, W Susilo
International Conference on Provable Security 11821, 19-40, 2019
282019
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
A Adhikari, K Morozov, S Obana, PS Roy, K Sakurai, R Xu
Information Theoretic Security 10015, 3-23, 2016
252016
An efficient robust secret sharing scheme with optimal cheater resiliency
PS Roy, A Adhikari, R Xu, K Morozov, K Sakurai
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
232014
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
222021
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
PS Roy, DH Duong, W Susilo, A Sipasseuth, K Fukushima, S Kiyomoto
Theoretical Computer Science, 2022
202022
Puncturable identity-based and attribute-based encryption from lattices
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 929, 18-38, 2022
172022
RaCoSS: Random code-based signature scheme
K Fukushima, PS Roy, R Xu, S Kiyomoto, K Morozov, T Takagi
Submission to NIST post-quantum standardization process 5, 2017
17*2017
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
International Conference on Information Security Applications, 245-257, 2020
16*2020
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
Journal of Internet Services and Information Security (JISIS) 10 (4), 1-22, 2020
142020
Secret sharing on evolving multi-level access structure
S Dutta, PS Roy, K Fukushima, S Kiyomoto, K Sakurai
International Workshop on Information Security Applications, 180-191, 2019
142019
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
International Conference on Information Security Applications, 245-257, 2020
132020
Chosen-ciphertext lattice-based public key encryption with equality test in standard model
DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto, A Sipasseuth
Theoretical Computer Science 905, 31-53, 2022
122022
Puncturable identity-based encryption from lattices
P Dutta, W Susilo, DH Duong, PS Roy
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
122021
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai
Information Systems Security 11281, 171-188, 2018
112018
On unconditionally binding code-based commitment schemes
K Morozov, PS Roy, K Sakura
Proceeding IMCOM '17 Proceedings of the 11th International Conference on …, 2017
112017
Password protected secret sharing from Lattices
PS Roy, S Dutta, W Susilo, R Safavi-Naini
International Conference on Applied Cryptography and Network Security, 442-459, 2021
102021
On the security of the Courtois-Finiasz-Sendrier signature
K Morozov, PS Roy, R Steinwandt, X Rui
Open Mathematics 16, 161–167, 2018
102018
The system can't perform the operation now. Try again later.
Articles 1–20