Zobrazeno 1 - 10
of 202
pro vyhledávání: '"Roy Partha Sarathi"'
Publikováno v:
Open Mathematics, Vol 16, Iss 1, Pp 161-167 (2018)
We prove that a variant of the Courtois-Finiasz-Sendrier signature is strongly existentially unforgeable under chosen message attack in the random oracle model, assuming hardness of the Permuted Goppa Syndrome Decoding Problem (also known as the Nied
Externí odkaz:
https://doaj.org/article/eb9f160fcf17475ea163fd260dad1bcc
Autor:
Pratzer, Marie, Meyfroidt, Patrick, Antongiovanni, Marina, Aragon, Roxana, Baldi, Germán, Czaplicki Cabezas, Stasiek, de la Vega-Leinert, Cristina A., Dhyani, Shalini, Diepart, Jean-Christophe, Fernandez, Pedro David, Garnett, Stephen T., Gavier Pizarro, Gregorio I., Kalam, Tamanna, Koulgi, Pradeep, le Polain de Waroux, Yann, Marinaro, Sofia, Mastrangelo, Matias, Mueller, Daniel, Mueller, Robert, Murali, Ranjini, Nanni, Sofía, Nuñez-Regueiro, Mauricio, Prieto-Torres, David A., Ratnam, Jayshree, Reddy, Chintala Sudhakar, Ribeiro, Natasha, Röder, Achim, Romero-Muñoz, Alfredo, Roy, Partha Sarathi, Rufin, Philippe, Rufino, Mariana, Sankaran, Mahesh, Torres, Ricardo, Vaidyanathan, Srinivas, Vallejos, Maria, Virah-Sawmy, Malika, Kuemmerle, Tobias
Publikováno v:
In Global Environmental Change May 2024 86
Autor:
Le, Huy Quoc, Duong, Dung Hoang, Roy, Partha Sarathi, Susilo, Willy, Fukushima, Kazuhide, Kiyomoto, Shinsaku
A signcryption, which is an integration of a public key encryption and a digital signature, can provide confidentiality and authenticity simultaneously. Additionally, a signcryption associated with equality test allows a third party (e.g., a cloud se
Externí odkaz:
http://arxiv.org/abs/2012.15423
The concept of proxy re-encryption (PRE) dates back to the work of Blaze, Bleumer, and Strauss in 1998. PRE offers delegation of decryption rights, i.e., it securely enables the re-encryption of ciphertexts from one key to another, without relying on
Externí odkaz:
http://arxiv.org/abs/2011.08456
Proxy re-encryption (PRE) securely enables the re-encryption of ciphertexts from one key to another, without relying on trusted parties, i.e., it offers delegation of decryption rights. PRE allows a semi-trusted third party termed as a "proxy" to sec
Externí odkaz:
http://arxiv.org/abs/2005.06741
Autor:
Duong, Dung Hoang, Fukushima, Kazuhide, Kiyomoto, Shinsaku, Roy, Partha Sarathi, Sipasseuth, Arnaud, Susilo, Willy
Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encryp
Externí odkaz:
http://arxiv.org/abs/2005.05308
Autor:
Duong, Dung Hoang, Roy, Partha Sarathi, Susilo, Willy, Fukushima, Kazuhide, Kiyomoto, Shinsaku, Sipasseuth, Arnaud
With the rapid growth of cloud storage and cloud computing services, many organisations and users choose to store the data on a cloud server for saving costs. However, due to security concerns, data of users would be encrypted before sending to the c
Externí odkaz:
http://arxiv.org/abs/2005.03178
Autor:
Roy, Partha Sarathi, Duong, Dung Hoang, Susilo, Willy, Sipasseuth, Arnaud, Fukushima, Kazuhide, Kiyomoto, Shinsaku
Publikováno v:
In Theoretical Computer Science 11 September 2022 929:124-139
Publikováno v:
In Theoretical Computer Science 11 September 2022 929:18-38
Publikováno v:
In Journal of Environmental Management 1 June 2022 311