Rajeev Anand Sahu

Orcid: 0000-0003-2220-9019

According to our database1, Rajeev Anand Sahu authored at least 31 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Patent Landscape in the field of Hash-Based Post-Quantum Signatures - (Invited Paper).
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

Secure Boot in Post-Quantum Era - (Invited Paper).
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Lattice-Based Inner Product Argument.
Proceedings of the Progress in Cryptology, 2022

2021
Partitioned Searchable Encryption.
Proceedings of the Provable and Practical Security, 2021

2020
Anonymous Proof-of-Asset Transactions Using Designated Blind Signatures.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

2019
Public-Key Encryption with Integrated Keyword Search.
J. Hardw. Syst. Secur., 2019

Supersingular Isogeny-Based Designated Verifier Blind Signature.
IACR Cryptol. ePrint Arch., 2019

A twofold group key agreement protocol for NoC-based MPSoCs.
Trans. Emerg. Telecommun. Technol., 2019

2018
Secure Communication on NoC Based MPSoC.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Twofold Group Key Agreement Protocol for NoC based MPSoCs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Anonymous yet Traceable Strong Designated Verifier Signature.
Proceedings of the Information Security - 21st International Conference, 2018

Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
A secure anonymous proxy signcryption scheme.
J. Math. Cryptol., 2017

Short Integrated PKE+PEKS in Standard Model.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2017

Secure Certificateless Proxy Re-encryption Without Pairing.
Proceedings of the Advances in Information and Computer Security, 2017

Generic Framework for Attribute-Based Group Signature.
Proceedings of the Information Security Practice and Experience, 2017

On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Authenticated Group Key Agreement Protocol Without Pairing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Efficient Proxy Signature Scheme from Pairings.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Adaptively Secure Strong Designated Signature.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Differential Fault Attack on SIMECK.
Proceedings of the Third Workshop on Cryptography and Security in Computing Systems, 2016

2015
Provable secure identity-based multi-proxy signature scheme.
Int. J. Commun. Syst., 2015

Identity-based multi-proxy multi-signature scheme provably secure in random oracle model.
Trans. Emerg. Telecommun. Technol., 2015

Efficient and provable secure scheme for delegation of signing rights between the groups.
Ann. des Télécommunications, 2015

Practical and Secure Integrated PKE+PEKS with Keyword Privacy.
Proceedings of the SECRYPT 2015, 2015

Efficient and Secure Many-to-One Signature Delegation.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
A Secure Anonymous Proxy Multi-signature Scheme.
Proceedings of the SECRYPT 2014, 2014

Secure and Efficient Scheme for Delegation of Signing Rights.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

An Anonymous Proxy Multi-signature with Accountablility.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2012
Efficient ID-based proxy multi-signature scheme secure in random oracle.
Frontiers Comput. Sci., 2012


  Loading...