Arinjita Paul

According to our database1, Arinjita Paul authored at least 17 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2021
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.
J. Internet Serv. Inf. Secur., 2021

A Distributed Ledger Management Mechanism for Storing and Selling Private Data.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Non-transferability in Proxy Re-Encryption Revisited.
J. Internet Serv. Inf. Secur., 2020

Improving Accuracy of Differentially Private Kronecker Social Networks via Graph Clustering.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Two-Stage Framework for Accurate and Differentially Private Network Information Publication.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

2019
Sharing of Encrypted files in Blockchain Made Simpler.
IACR Cryptol. ePrint Arch., 2019

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019

Splitting and Aggregating Signatures in Cryptocurrency Protocols.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018

A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme.
IACR Cryptol. ePrint Arch., 2018

2017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2017

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2017

An Efficient Non-transferable Proxy Re-encryption Scheme.
Proceedings of the Applications and Techniques in Information Security, 2017

2014
Extracting the Combinatorial Test Parameters and Values from UML Sequence Diagrams.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014


  Loading...