Sanjit Chatterjee

According to our database1, Sanjit Chatterjee authored at least 53 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Revisiting the Security of Salted UOV Signature.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Secure and efficient wildcard search over encrypted data.
Int. J. Inf. Sec., 2021

Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Efficient backward private searchable encryption.
J. Comput. Secur., 2020

Signcryption in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption.
IACR Cryptol. ePrint Arch., 2020

Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.
Adv. Math. Commun., 2020

2019
Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions.
IACR Cryptol. ePrint Arch., 2019

Rerandomizable Signatures under Standard Assumption.
IACR Cryptol. ePrint Arch., 2019

2018
Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis.
J. Math. Cryptol., 2018

Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle).
IACR Cryptol. ePrint Arch., 2018

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature.
IACR Cryptol. ePrint Arch., 2018

Private set-intersection with common set-up.
Adv. Math. Commun., 2018

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract).
Proceedings of the Provable Security, 2018

Keyword Search Meets Membership Testing: Adaptive Security from SXDH.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.
IEEE Trans. Computers, 2017

CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient.
IACR Cryptol. ePrint Arch., 2017

Encrypting Messages for Incomplete Chains of Certificates.
IACR Cryptol. ePrint Arch., 2017

2016
On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.
IACR Cryptol. ePrint Arch., 2016

Another Look at Tightness II: Practical Issues in Cryptography.
IACR Cryptol. ePrint Arch., 2016

A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound.
Algorithmica, 2016

2015
Fault Attacks on Pairing-Based Protocols Revisited.
IEEE Trans. Computers, 2015

Efficient Protocol for Authenticated Email Search.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014
Type 2 Structure-Preserving Signature Schemes Revisited.
IACR Cryptol. ePrint Arch., 2014

Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption.
Int. J. Appl. Cryptogr., 2013

Property Preserving Symmetric Encryption: Revisited.
IACR Cryptol. ePrint Arch., 2013

From Selective-ID to Full-ID IBS without Random Oracles.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

2012
Variants of Waters' Dual-System Primitives Using Asymmetric Pairings.
IACR Cryptol. ePrint Arch., 2012

Galindo-Garcia Identity-Based Signature Revisited.
IACR Cryptol. ePrint Arch., 2012

Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract).
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Another Look at Tightness.
IACR Cryptol. ePrint Arch., 2011

On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited.
Discret. Appl. Math., 2011

A Generic Variant of NIST's KAS2 Key Agreement Protocol.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.
IACR Cryptol. ePrint Arch., 2010

Comparing two pairing-based aggregate signature schemes.
Des. Codes Cryptogr., 2010

Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009
Identity-Based Encryption and Hierarchical Identity-Based Encryption.
Proceedings of the Identity-Based Cryptography, 2009

On Cryptographic Protocols Employing Asymmetric Pairings - The Role of Psi Revisited.
IACR Cryptol. ePrint Arch., 2009

Reusing Static Keys in Key Agreement Protocols.
Proceedings of the Progress in Cryptology, 2009

A New Protocol for the Nearby Friend Problem.
Proceedings of the Cryptography and Coding, 2009

2007
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions.
J. Univers. Comput. Sci., 2007

Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks.
Proceedings of the Provable Security, 2007

2006
Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks.
IACR Cryptol. ePrint Arch., 2006

On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique).
IACR Cryptol. ePrint Arch., 2006

Generalization of the Selective-ID Security Model for HIBE Protocols.
IACR Cryptol. ePrint Arch., 2006

Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext.
Proceedings of the Progress in Cryptology, 2006

New Constructions of Constant Size Ciphertext HIBE Without Random Oracle.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

HIBE With Short Public Parameters Without Random Oracle.
Proceedings of the Advances in Cryptology, 2006

2005
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.
Proceedings of the Information Security and Cryptology, 2005

2004
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.
Proceedings of the Information Security and Cryptology, 2004


  Loading...