Partha Sarathi Roy

Orcid: 0000-0002-5788-5554

Affiliations:
  • University of Wollongong, Australia
  • KDDI Research, Information Security Group, Japan (former)


According to our database1, Partha Sarathi Roy authored at least 33 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Password Protected Universal Thresholdizer.
IACR Cryptol. ePrint Arch., 2024

2023
Bicameral and Auditably Private Signatures.
IACR Cryptol. ePrint Arch., 2023

2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022

Puncturable identity-based and attribute-based encryption from lattices.
Theor. Comput. Sci., 2022

Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022

2021
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model.
Theor. Comput. Sci., 2021

Lattice-based signcryption with equality test in standard model.
Comput. Stand. Interfaces, 2021

Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model.
Proceedings of the Computer Security - ESORICS 2021, 2021

Password Protected Secret Sharing from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2021

Puncturable Identity-Based Encryption from Lattices.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020

Lattice-based Unidirectional IBPRE Secure in Standard Model.
CoRR, 2020

Lattice-based public key encryption with equality test in standard model, revisited.
CoRR, 2020

Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
Evaluation of Code-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2019

Light weight and fine-grained access mechanism for secure access to outsourced data.
Concurr. Comput. Pract. Exp., 2019

Secret Sharing on Evolving Multi-level Access Structure.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Lattice-Based IBE with Equality Test in Standard Model.
Proceedings of the Provable Security, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Light Weight Write Mechanism for Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

On unconditionally binding code-based commitment schemes.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2016
On the Robustness of Visual Cryptographic Schemes.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015

Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure.
Proceedings of the Distributed Computing and Internet Technology, 2015

2014
One-sided leakage-resilient privacy only two-message oblivious transfer.
J. Inf. Secur. Appl., 2014

An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014

Multi-Use Multi-Secret Sharing Scheme for General Access Structure.
CoRR, 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014


  Loading...