S. Sharmila Deva Selvi

According to our database1, S. Sharmila Deva Selvi authored at least 63 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Security Analysis and Performance Evaluation of Certificateless Proxy Re-Encryption for Blockchain Applications.
IEEE Access, 2025

2023
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2023

2021
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.
J. Internet Serv. Inf. Secur., 2021

2020
Non-transferability in Proxy Re-Encryption Revisited.
J. Internet Serv. Inf. Secur., 2020

Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
IACR Cryptol. ePrint Arch., 2019

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

A Closer Look at Anonymous Proxy Re-Encryption Schemes.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Sharing of Encrypted Files in Blockchain Made Simpler.
Proceedings of the 1st International Conference on Mathematical Research for Blockchain Economy, 2019

Splitting and Aggregating Signatures in Cryptocurrency Protocols.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme.
Proceedings of the Provable Security, 2018

2017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2017

An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing.
Proceedings of the Provable Security, 2017

Identity-Based Group Encryption Revisited.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

An Efficient Non-transferable Proxy Re-encryption Scheme.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Stronger public key encryption system withstanding RAM scraper like attacks.
Secur. Commun. Networks, 2016

Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives.
J. Internet Serv. Inf. Secur., 2016

2015
Practical IBE Secure under CBDH - Encrypting Without Pairing.
Proceedings of the SECRYPT 2015, 2015

2013
Efficient Certificateless Online/Offline Signature with tight security.
J. Internet Serv. Inf. Secur., 2013

A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2013

Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
Proceedings of the Provable Security - 7th International Conference, 2013

2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Efficient Certificateless Online/Offline Signature.
J. Internet Serv. Inf. Secur., 2012

Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.
IACR Cryptol. ePrint Arch., 2012

Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.
IACR Cryptol. ePrint Arch., 2012

Identity based partial aggregate signature scheme without pairing.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

ID Based Signcryption Scheme in Standard Model.
Proceedings of the Provable Security - 6th International Conference, 2012

Compact Stateful Encryption Schemes with Ciphertext Verifiability.
Proceedings of the Advances in Information and Computer Security, 2012

Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

Group key establishment (GKE): Two/three party key exchange to GKE.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Compact CCA-Secure Encryption with Ciphertext Verifiability.
IACR Cryptol. ePrint Arch., 2011

On the Security of ID Based Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011

CCA Secure Certificateless Encryption Schemes based on RSA.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Identity-Based Deterministic Signature Scheme without Forking-Lemma.
Proceedings of the Advances in Information and Computer Security, 2011

Identity Based Online/Offline Encryption and Signcryption Schemes Revisited.
Proceedings of the Security Aspects in Information Technology, 2011

2010
CCA2 Secure Certificateless Encryption Schemes Based on RSA.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Encryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Security Weaknesses in Two Certificateless Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2010

An Identity based Ring Signcryption Scheme with Public Verifiability.
Proceedings of the SECRYPT 2010, 2010

Identity Based Public Verifiable Signcryption Scheme.
Proceedings of the Provable Security - 4th International Conference, 2010

On the Security of Identity Based Threshold Unsigncryption Schemes.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Identity Based Self Delegated Signature - Self Proxy Signatures.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Certificateless KEM and Hybrid Signcryption Schemes Revisited.
Proceedings of the Information Security, 2010

2009
Scalable Compilers for Group Key Establishment : Two/Three Party to Group.
IACR Cryptol. ePrint Arch., 2009

Security Analysis of Aggregate signature and Batch verification signature schemes.
IACR Cryptol. ePrint Arch., 2009

A note on the Certificateless Multi-receiver Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Breaking and Building of Group Inside Signature.
Proceedings of the Security and Privacy in Communication Networks, 2009

On the Security of Two Ring Signcryption Schemes.
Proceedings of the SECRYPT 2009, 2009

Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.
Proceedings of the Provable Security, Third International Conference, 2009

An Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
Proceedings of the Advances in Information and Computer Security, 2009

On the Security of Identity Based Ring Signcryption Schemes.
Proceedings of the Information Security, 12th International Conference, 2009

Identity Based Aggregate Signcryption Schemes.
Proceedings of the Progress in Cryptology, 2009

Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Breaking and Building of Threshold Signcryption Schemes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
On the Provable Security of Multi-Receiver Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2008

Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-Hoc Networks.
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008

Efficient and Provably Secure Certificateless Multi-receiver Signcryption.
Proceedings of the Provable Security, Second International Conference, 2008

Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...