S. Sharmila Deva Selvi

According to our database1, S. Sharmila Deva Selvi authored at least 62 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2023

2021
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing.
J. Internet Serv. Inf. Secur., 2021

2020
Non-transferability in Proxy Re-Encryption Revisited.
J. Internet Serv. Inf. Secur., 2020

Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2019
Sharing of Encrypted files in Blockchain Made Simpler.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds.
IACR Cryptol. ePrint Arch., 2019

Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

A Closer Look at Anonymous Proxy Re-Encryption Schemes.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Splitting and Aggregating Signatures in Cryptocurrency Protocols.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

2018
A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018

A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme.
IACR Cryptol. ePrint Arch., 2018

2017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2017

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2017

Identity-Based Group Encryption Revisited.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

An Efficient Non-transferable Proxy Re-encryption Scheme.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Stronger public key encryption system withstanding RAM scraper like attacks.
Secur. Commun. Networks, 2016

Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives.
J. Internet Serv. Inf. Secur., 2016

2015
Practical IBE Secure under CBDH - Encrypting Without Pairing.
Proceedings of the SECRYPT 2015, 2015

2013
Efficient Certificateless Online/Offline Signature with tight security.
J. Internet Serv. Inf. Secur., 2013

A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2013

Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
Proceedings of the Provable Security - 7th International Conference, 2013

2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Efficient Certificateless Online/Offline Signature.
J. Internet Serv. Inf. Secur., 2012

Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.
IACR Cryptol. ePrint Arch., 2012

Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.
IACR Cryptol. ePrint Arch., 2012

ID Based Signcryption Scheme in Standard Model.
IACR Cryptol. ePrint Arch., 2012

Compact Stateful Encryption Schemes with Ciphertext Verifiability.
Proceedings of the Advances in Information and Computer Security, 2012

Group key establishment (GKE): Two/three party key exchange to GKE.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Compact CCA-Secure Encryption with Ciphertext Verifiability.
IACR Cryptol. ePrint Arch., 2011

On the Security of ID Based Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2011

Identity Based Deterministic Signature Scheme Without Forking-Lemma.
IACR Cryptol. ePrint Arch., 2011

CCA Secure Certificateless Encryption Schemes based on RSA.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Identity Based Online/Offline Encryption and Signcryption Schemes Revisited.
Proceedings of the Security Aspects in Information Technology, 2011

2010
Identity Based Partial Aggregate Signature Scheme Without Pairing.
IACR Cryptol. ePrint Arch., 2010

CCA2 Secure Certificateless Encryption Schemes Based on RSA.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Identity Based Public Verifiable Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Encryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Security Weaknesses in Two Certificateless Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2010

On the Security of Identity Based Threshold Unsigncryption Schemes.
IACR Cryptol. ePrint Arch., 2010

Identity Based Self Delegated Signature - Self Proxy Signatures.
IACR Cryptol. ePrint Arch., 2010

An Identity based Ring Signcryption Scheme with Public Verifiability.
Proceedings of the SECRYPT 2010, 2010

2009
Scalable Compilers for Group Key Establishment : Two/Three Party to Group.
IACR Cryptol. ePrint Arch., 2009

ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES.
IACR Cryptol. ePrint Arch., 2009

Breaking and Building of Group Inside Signature.
IACR Cryptol. ePrint Arch., 2009

Security Analysis of Aggregate signature and Batch verification signature schemes.
IACR Cryptol. ePrint Arch., 2009

Certificateless KEM and Hybrid Signcryption Schemes Revisited.
IACR Cryptol. ePrint Arch., 2009

A note on the Certificateless Multi-receiver Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing.
IACR Cryptol. ePrint Arch., 2009

Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

On the security of Identity Based Ring Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2009

Identity Based Aggregate Signcryption Schemes.
Proceedings of the Progress in Cryptology, 2009

Breaking and Building of Threshold Signcryption Schemes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

On the Provable Security of Multi-Receiver Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2008

Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Efficient and Provably Secure Certificateless Multi-receiver Signcryption.
Proceedings of the Provable Security, Second International Conference, 2008


  Loading...