Tapas Pandit

Orcid: 0000-0002-1028-3951

According to our database1, Tapas Pandit authored at least 18 papers between 2012 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient fully CCA-secure predicate encryptions from pair encodings.
Adv. Math. Commun., 2022

Efficient IBS from a New Assumption in the Multivariate-Quadratic Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Revisiting the Security of Salted UOV Signature.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Identity-Based Signature and Extended Forking Algorithm in the Multivariate Quadratic Setting.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Delegation-based conversion from CPA to CCA-secure predicate encryption.
Int. J. Appl. Cryptogr., 2020

Signcryption in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

2019
Predicate signatures from pair encodings via dual system proof technique.
J. Math. Cryptol., 2019

2018
Verifiability-based conversion from CPA to CCA-secure predicate encryption.
Appl. Algebra Eng. Commun. Comput., 2018

2017
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient.
IACR Cryptol. ePrint Arch., 2017

2016
On the security of joint signature and encryption revisited.
J. Math. Cryptol., 2016

Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version).
J. Internet Serv. Inf. Secur., 2016

2015
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack.
IACR Cryptol. ePrint Arch., 2015

On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2015

Generic Conversions from CPA to CCA secure Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

2014
eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version).
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption.
IACR Cryptol. ePrint Arch., 2014

eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy.
Proceedings of the Network and System Security - 8th International Conference, 2014

2012
Efficient Fully Secure Attribute-Based Encryption Schemes for General Access Structures.
Proceedings of the Provable Security - 6th International Conference, 2012


  Loading...