S. Sree Vivek

Affiliations:
  • Samsung R&D Institute, Bangalore, India
  • Indian Institute of Technology Madras (IITM), Chennai, Theoretical Computer Science Laboratory


According to our database1, S. Sree Vivek authored at least 56 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Compact Identity Based Encryption Based on n^{th} - Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2023

2022
Delegated Anonymous Credentials With Revocation Capability for IoT Service Chains (DANCIS).
IEEE Internet Things J., 2022

2018
Dynamic Verifiable Encrypted Keyword Search - Using Bitmap Index.
J. Signal Process. Syst., 2018

2017
Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC.
IACR Cryptol. ePrint Arch., 2017

Secure Cloud Storage and File Sharing.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

2016
Stronger public key encryption system withstanding RAM scraper like attacks.
Secur. Commun. Networks, 2016

Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives.
J. Internet Serv. Inf. Secur., 2016

The Disintegration Protocol: An Ultimate Technique for Cloud Data Security.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

2015
Practical IBE Secure under CBDH - Encrypting Without Pairing.
Proceedings of the SECRYPT 2015, 2015

Controlled Proxy Re-signing - Conditional Proxy Re-Signatures.
Proceedings of the SECRYPT 2015, 2015

Stateful Certificateless Public Key Encryption with Application in Public Cloud.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Forward Secure On-device Encryption Scheme Withstanding Cold Boot Attack.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Efficient Certificateless Online/Offline Signature with tight security.
J. Internet Serv. Inf. Secur., 2013

A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2013

Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.
Proceedings of the Provable Security - 7th International Conference, 2013

2012
A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

PKI Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

Efficient Certificateless Online/Offline Signature.
J. Internet Serv. Inf. Secur., 2012

Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks.
IACR Cryptol. ePrint Arch., 2012

Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model.
IACR Cryptol. ePrint Arch., 2012

ID Based Signcryption Scheme in Standard Model.
IACR Cryptol. ePrint Arch., 2012

Compact Stateful Encryption Schemes with Ciphertext Verifiability.
Proceedings of the Advances in Information and Computer Security, 2012

Group key establishment (GKE): Two/three party key exchange to GKE.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Compact CCA-Secure Encryption with Ciphertext Verifiability.
IACR Cryptol. ePrint Arch., 2011

On the Security of ID Based Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2011

Identity Based Deterministic Signature Scheme Without Forking-Lemma.
IACR Cryptol. ePrint Arch., 2011

CCA Secure Certificateless Encryption Schemes based on RSA.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Identity Based Online/Offline Encryption and Signcryption Schemes Revisited.
Proceedings of the Security Aspects in Information Technology, 2011

2010
Identity Based Partial Aggregate Signature Scheme Without Pairing.
IACR Cryptol. ePrint Arch., 2010

CCA2 Secure Certificateless Encryption Schemes Based on RSA.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Identity Based Public Verifiable Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Identity Based Online/Offline Encryption Scheme.
IACR Cryptol. ePrint Arch., 2010

Security Weaknesses in Two Certificateless Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2010

On the Security of Identity Based Threshold Unsigncryption Schemes.
IACR Cryptol. ePrint Arch., 2010

Identity Based Self Delegated Signature - Self Proxy Signatures.
IACR Cryptol. ePrint Arch., 2010

An Identity based Ring Signcryption Scheme with Public Verifiability.
Proceedings of the SECRYPT 2010, 2010

2009
Scalable Compilers for Group Key Establishment : Two/Three Party to Group.
IACR Cryptol. ePrint Arch., 2009

ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES.
IACR Cryptol. ePrint Arch., 2009

Breaking and Building of Group Inside Signature.
IACR Cryptol. ePrint Arch., 2009

Security Analysis of Aggregate signature and Batch verification signature schemes.
IACR Cryptol. ePrint Arch., 2009

Certificateless KEM and Hybrid Signcryption Schemes Revisited.
IACR Cryptol. ePrint Arch., 2009

A note on the Certificateless Multi-receiver Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction Without Pairing.
IACR Cryptol. ePrint Arch., 2009

Breaking and Fixing of an Identity Based Multi-Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2009

On the security of Identity Based Ring Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2009

Identity Based Aggregate Signcryption Schemes.
Proceedings of the Progress in Cryptology, 2009

Breaking and Building of Threshold Signcryption Schemes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

On the Provable Security of Multi-Receiver Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2008

Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Efficient and Provably Secure Certificateless Multi-receiver Signcryption.
Proceedings of the Provable Security, Second International Conference, 2008


  Loading...