Follow
Partha Sarathi Roy
Partha Sarathi Roy
School of Computing and Information Technology; University of Wollongong.
Verified email at uow.edu.au - Homepage
Title
Cited by
Cited by
Year
A Lattice-Based Public Key Encryption with Equality Test in Standard Model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Australasian Conference on Information Security and Privacy 11547, 138-155, 2019
292019
An efficient robust secret sharing scheme with optimal cheater resiliency
PS Roy, A Adhikari, R Xu, K Morozov, K Sakurai
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
242014
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
A Adhikari, K Morozov, S Obana, PS Roy, K Sakurai, R Xu
Information Theoretic Security 10015, 3-23, 2016
232016
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
222021
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
W Susilo, P Dutta, DH Duong, PS Roy
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
222021
Lattice-Based IBE with Equality Test in Standard Model
DH Duong, HQ Le, PS Roy, W Susilo
International Conference on Provable Security 11821, 19-40, 2019
222019
RaCoSS: Random code-based signature scheme
K Fukushima, PS Roy, R Xu, S Kiyomoto, K Morozov, T Takagi
Submission to NIST post-quantum standardization process 5, 2017
14*2017
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
132021
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
International Conference on Information Security Applications, 245-257, 2020
11*2020
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai
Information Systems Security 11281, 171-188, 2018
112018
On unconditionally binding code-based commitment schemes
K Morozov, PS Roy, K Sakura
Proceeding IMCOM '17 Proceedings of the 11th International Conference on …, 2017
112017
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
PS Roy, DH Duong, W Susilo, A Sipasseuth, K Fukushima, S Kiyomoto
Theoretical Computer Science, 2022
102022
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
International Conference on Information Security Applications, 245-257, 2020
102020
On the security of the Courtois-Finiasz-Sendrier signature
K Morozov, PS Roy, R Steinwandt, X Rui
Open Mathematics 16, 161–167, 2018
102018
Code-based signature scheme without trapdoors
PS Roy, K Morozov, K Fukushima, S Kiyomoto, T Takagi
Int. Assoc. Cryptologic Res, 2018
102018
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
Journal of Internet Services and Information Security (JISIS) 10 (4), 1-22, 2020
92020
Secret sharing on evolving multi-level access structure
S Dutta, PS Roy, K Fukushima, S Kiyomoto, K Sakurai
International Workshop on Information Security Applications, 180-191, 2019
82019
Puncturable identity-based and attribute-based encryption from lattices
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 929, 18-38, 2022
72022
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
PS Roy, S Dutta, K Morozov, A Adhikari, K Fukushima, S Kiyomoto, ...
Information Security Practice and Experience, 2018 11125, 578-594, 2018
72018
RaCoSS: Random code-based signature scheme
K Fukushima, PS Roy, R Xu, S Kiyomoto, K Morozov, T Takagi
Submission to NIST post-quantum standardization process 5, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20