Sayantan Mukherjee

Orcid: 0000-0002-1236-8086

According to our database1, Sayantan Mukherjee authored at least 13 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Unbounded Predicate Inner Product Functional Encryption from Pairings.
J. Cryptol., July, 2023

Oblivious Identity-based Encryption (IBE Secure Against an Adversarial KGC).
IACR Cryptol. ePrint Arch., 2023

Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
IACR Cryptol. ePrint Arch., 2022

Segmentation of Blood Vessels, Optic Disc Localization, Detection of Exudates and Diabetic Retinopathy Diagnosis from Digital Fundus Images.
CoRR, 2022

2021
Secure and efficient wildcard search over encrypted data.
Int. J. Inf. Sec., 2021

Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions.
IACR Cryptol. ePrint Arch., 2021

2020
CCA-Secure ABE Using Tag and Pair Encoding.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

2018
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle).
IACR Cryptol. ePrint Arch., 2018

Keyword Search Meets Membership Testing: Adaptive Security from SXDH.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient.
IACR Cryptol. ePrint Arch., 2017

2015
Efficient Protocol for Authenticated Email Search.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014
Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data.
Proceedings of the Advances in Information and Computer Security, 2014


  Loading...