Arnab Roy

Affiliations:
  • Fujitsu Laboratories of America, Sunnyvale, CA, USA
  • IBM T. J. Watson Research Center, Yorktown Heights, CA, USA (former)
  • Stanford University, USA (PhD)
  • IIT, Kharagpur, India (former)


According to our database1, Arnab Roy authored at least 56 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Efficient Hash Function for Imaginary Class Groups.
IACR Cryptol. ePrint Arch., 2024

zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
CoRR, 2024

2023
Minicrypt Primitives with Algebraic Structure and Applications.
J. Cryptol., 2023

A Novel Power-Sum PRG with Applications to Lattice-Based zkSNARKs.
IACR Cryptol. ePrint Arch., 2023

Subset-optimized BLS Multi-signature with Key Aggregation.
IACR Cryptol. ePrint Arch., 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Oblivious Revocable Functions and Encrypted Indexing.
IACR Cryptol. ePrint Arch., 2022

Leveraging special-purpose hardware for local search heuristics.
Comput. Optim. Appl., 2022

2021
STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

Time-Release Cryptography from Minimal Circuit Assumptions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Unified Clustering and Outlier Detection on Specialized Hardware.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Single-Message Credential-Hiding Login.
IACR Cryptol. ePrint Arch., 2020

Time-release Cryptography from Minimal Circuit Assumptions.
IACR Cryptol. ePrint Arch., 2020

Binary Matrix Factorization on Special Purpose Hardware.
CoRR, 2020

Ising-Based Consensus Clustering on Specialized Hardware.
Proceedings of the Advances in Intelligent Data Analysis XVIII, 2020

Compressed Quadratization of Higher Order Binary Optimization Problems.
Proceedings of the Data Compression Conference, 2020

2019
Shorter QA-NIZK and SPS with Tighter Security.
IACR Cryptol. ePrint Arch., 2019

On Modeling Local Search with Special-Purpose Combinatorial Optimization Hardware.
CoRR, 2019

2018
Data Oblivious Genome Variants Search on Intel SGX.
IACR Cryptol. ePrint Arch., 2018

Improved (Almost) Tightly-Secure Structure-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2018

Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.
IACR Cryptol. ePrint Arch., 2018

Smooth NIZK Arguments.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

2017
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces.
J. Cryptol., 2017

Privacy for Targeted Advertising.
IACR Cryptol. ePrint Arch., 2017

Improved Structure Preserving Signatures under Standard Bilinear Assumptions.
IACR Cryptol. ePrint Arch., 2017

2016
Function-Hiding Inner Product Encryption is Practical.
IACR Cryptol. ePrint Arch., 2016

Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE.
IACR Cryptol. ePrint Arch., 2016

2015
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue.
IACR Cryptol. ePrint Arch., 2015

A Symbolic Logic with Concrete Bounds for Cryptographic Protocols.
CoRR, 2015

Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Privacy Preserving Technique for Set-Based Biometric Authentication using Reed-Solomon Decoding.
Proceedings of the BIOSIG 2015, 2015

2014
Relational Hash.
IACR Cryptol. ePrint Arch., 2014

Dual-System Simulation-Soundness with Applications to UC-PAKE and More.
IACR Cryptol. ePrint Arch., 2014

Privacy preserving disclosure of authenticated energy usage data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Big Data: Challenges, practices and technologies: NIST Big Data Public Working Group workshop at IEEE Big Data 2014.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces.
IACR Cryptol. ePrint Arch., 2013

2012
Decision Procedures for Simulatability.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Relatively-Sound NIZKs and Password-Based Key-Exchange.
IACR Cryptol. ePrint Arch., 2011

Universally Composable Security Analysis of OAuth v2.0.
IACR Cryptol. ePrint Arch., 2011

Policy refinement of network services for MANETs.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Protocol Composition Logic.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Formal proofs of cryptographic security of network protocols.
PhD thesis, 2010

Composable Security Analysis of OS Services.
IACR Cryptol. ePrint Arch., 2010

A Completeness Theorem for Pseudo-Linear Functions with Applications to UC Security.
Electron. Colloquium Comput. Complex., 2010

2009
Operational Semantics for DKAL: Application and Analysis.
Proceedings of the Trust, 2009

2008
Simulation-based verification using Temporally Attributed Boolean Logic.
ACM Trans. Design Autom. Electr. Syst., 2008

An Automated Approach for Proving PCL Invariants.
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008

Analysis of EAP-GPSK Authentication Protocol.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Inductive Proof Method for Computational Secrecy.
IACR Cryptol. ePrint Arch., 2007

Protocol Composition Logic (PCL).
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007

Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Inductive Proofs of Computational Secrecy.
Proceedings of the Computer Security, 2007

2006
Inductive Trace Properties for Computational Security.
IACR Cryptol. ePrint Arch., 2006

Secrecy Analysis in Protocol Composition Logic.
Proceedings of the Advances in Computer Science, 2006

2005
A framework for systematic validation and debugging of pipeline simulators.
ACM Trans. Design Autom. Electr. Syst., 2005


  Loading...