# Sanjit Chatterjee

According to our database

Collaborative distances:

^{1}, Sanjit Chatterjee authored at least 53 papers between 2004 and 2022.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2022

Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021

Int. J. Inf. Sec., 2021

Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.

Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020

J. Comput. Secur., 2020

IACR Cryptol. ePrint Arch., 2020

From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption.

IACR Cryptol. ePrint Arch., 2020

Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.

Adv. Math. Commun., 2020

2019

Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions.

IACR Cryptol. ePrint Arch., 2019

IACR Cryptol. ePrint Arch., 2019

2018

Converting pairing-based cryptosystems from composite to prime order setting - A comparative analysis.

J. Math. Cryptol., 2018

Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle).

IACR Cryptol. ePrint Arch., 2018

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature.

IACR Cryptol. ePrint Arch., 2018

Adv. Math. Commun., 2018

Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature (Extended Abstract).

Proceedings of the Provable Security, 2018

Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data.

Proceedings of the Information Systems Security - 14th International Conference, 2018

2017

On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.

IEEE Trans. Computers, 2017

CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient.

IACR Cryptol. ePrint Arch., 2017

IACR Cryptol. ePrint Arch., 2017

2016

On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One.

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

Algorithmica, 2016

2015

IEEE Trans. Computers, 2015

Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014

IACR Cryptol. ePrint Arch., 2014

Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data.

Proceedings of the Advances in Information and Computer Security, 2014

2013

Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption.

Int. J. Appl. Cryptogr., 2013

IACR Cryptol. ePrint Arch., 2013

Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013

2012

IACR Cryptol. ePrint Arch., 2012

IACR Cryptol. ePrint Arch., 2012

Variants of Waters' Dual System Primitives Using Asymmetric Pairings - (Extended Abstract).

Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011

IACR Cryptol. ePrint Arch., 2011

On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited.

Discret. Appl. Math., 2011

Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010

On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings.

IACR Cryptol. ePrint Arch., 2010

Des. Codes Cryptogr., 2010

Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.

Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

2009

Proceedings of the Identity-Based Cryptography, 2009

On Cryptographic Protocols Employing Asymmetric Pairings - The Role of Psi Revisited.

IACR Cryptol. ePrint Arch., 2009

Proceedings of the Progress in Cryptology, 2009

Proceedings of the Cryptography and Coding, 2009

2007

Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions.

J. Univers. Comput. Sci., 2007

Proceedings of the Provable Security, 2007

2006

Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks.

IACR Cryptol. ePrint Arch., 2006

On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters (With an Exposition of Waters' Artificial Abort Technique).

IACR Cryptol. ePrint Arch., 2006

IACR Cryptol. ePrint Arch., 2006

Proceedings of the Progress in Cryptology, 2006

Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Proceedings of the Advances in Cryptology, 2006

2005

Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model.

Proceedings of the Information Security and Cryptology, 2005

2004

Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields.

Proceedings of the Information Security and Cryptology, 2004