Sanjit Chatterjee
According to our database1,
Sanjit Chatterjee
authored at least 53 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
2021
Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
2020
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption.
IACR Cryptol. ePrint Arch., 2020
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.
Adv. Math. Commun., 2020
2019
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis.
J. Math. Cryptol., 2018
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle).
IACR Cryptol. ePrint Arch., 2018
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature.
IACR Cryptol. ePrint Arch., 2018
Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract).
Proceedings of the Provable Security, 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data.
Proceedings of the Information Systems Security - 14th International Conference, 2018
2017
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.
IEEE Trans. Computers, 2017
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Algorithmica, 2016
2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Advances in Information and Computer Security, 2014
2013
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption.
Int. J. Appl. Cryptogr., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract).
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
Discret. Appl. Math., 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.
IACR Cryptol. ePrint Arch., 2010
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
2009
Proceedings of the Identity-Based Cryptography, 2009
On Cryptographic Protocols Employing Asymmetric Pairings - The Role of Psi Revisited.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Cryptography and Coding, 2009
2007
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions.
J. Univers. Comput. Sci., 2007
Proceedings of the Provable Security, 2007
2006
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks.
IACR Cryptol. ePrint Arch., 2006
On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique).
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.
Proceedings of the Information Security and Cryptology, 2005
2004
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
Proceedings of the Information Security and Cryptology, 2004