Partha Sarathi Roy
According to our database1, Partha Sarathi Roy authored at least 26 papers between 2014 and 2021.
Legend:Book In proceedings Article PhD thesis Other
Comput. Stand. Interfaces, 2021
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020
Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model.
Lattice-based public key encryption with equality test supporting flexible authorization in standard model.
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Provable Security, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
IEEE Trans. Parallel Distributed Syst., 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information Systems Security - 14th International Conference, 2018
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
IACR Cryptol. ePrint Arch., 2015
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure.
Proceedings of the Distributed Computing and Internet Technology, 2015
J. Inf. Secur. Appl., 2014
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014