Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 115
1.
  • Identity-Based Encryption Identity-Based Encryption
    Sarkar, Palash; Chatterjee, Sanjit 2011, 20110228
    eBook

    Identity Based Encryption (IBE) is a type of public key encryption and has been intensely researched in the past decade. Identity-Based Encryption summarizes the available research for IBE and the ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
2.
Celotno besedilo

PDF
3.
  • Secure and efficient wildca... Secure and efficient wildcard search over encrypted data
    Chatterjee, Sanjit; Kesarwani, Manish; Modi, Jayam ... International journal of information security, 04/2021, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano

    In this work, we investigate the problem of secure wildcard search over encrypted data. The setting comprises of three entities, viz. the data owner, the server and the client. The data owner ...
Celotno besedilo
Dostopno za: CEKLJ, DOBA, EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, IZUM, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UILJ, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
4.
  • On the Efficiency and Secur... On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings
    Chatterjee, Sanjit; Hankerson, Darrel; Menezes, Alfred Arithmetic of Finite Fields
    Book Chapter
    Recenzirano

    We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and Type 4 pairings. On the implementation front, we report improved timings for Type 1 pairings derived ...
Celotno besedilo

PDF
5.
  • On cryptographic protocols ... On cryptographic protocols employing asymmetric pairings — The role of Ψ revisited
    Chatterjee, Sanjit; Menezes, Alfred Discrete Applied Mathematics, 08/2011, Letnik: 159, Številka: 13
    Journal Article
    Recenzirano
    Odprti dostop

    Asymmetric pairings e : G 1 × G 2 → G T for which an efficiently-computable isomorphism ψ : G 2 → G 1 is known are called Type 2 pairings; if such an isomorphism ψ is not known then e is called a ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
6.
  • New Constructions of Consta... New Constructions of Constant Size Ciphertext HIBE Without Random Oracle
    Chatterjee, Sanjit; Sarkar, Palash Information Security and Cryptology – ICISC 2006, 2006
    Book Chapter, Conference Proceeding
    Recenzirano

    At Eurocrypt 2005, Boneh-Boyen-Goh presented an interesting and important construction of a constant size ciphertext HIBE. The HIBE was proven to be secure in the selective-ID model. In this paper, ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ
7.
  • Converting pairing-based cr... Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis
    Chatterjee, Sanjit; Prem Laxman Das, M.; Kabaleeshwaran, R. Journal of mathematical cryptology, 09/2018, Letnik: 12, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Composite order pairing setting has been used to achieve cryptographic functionalities beyond what is attainable in prime order groups. However, such pairings are known to be significantly slower ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
8.
  • A Closer Look at Multiple F... A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound
    Chatterjee, Sanjit; Kamath, Chethan Algorithmica, 04/2016, Letnik: 74, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Boldyreva, Palacio and Warinschi introduced a multiple forking game as an extension of general forking. The notion of (multiple) forking is a useful abstraction from the actual simulation of ...
Celotno besedilo
Dostopno za: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
9.
  • Generalization of the Selec... Generalization of the Selective-ID Security Model for HIBE Protocols
    Chatterjee, Sanjit; Sarkar, Palash Lecture notes in computer science, 2006
    Book Chapter, Conference Proceeding
    Recenzirano
    Odprti dostop

    We generalize the selective-ID security model for HIBE by introducing two new security models. Both these models allow the adversary to commit to a set of identities and in the challenge phase choose ...
Celotno besedilo
Dostopno za: FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
10.
  • On Instantiating Pairing-Ba... On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One
    Chatterjee, Sanjit; Menezes, Alfred; Rodrıguez-Henrıquez, Francisco IEEE transactions on computers, 06/2017, Letnik: 66, Številka: 6
    Journal Article
    Recenzirano

    Since the discovery of identity-based encryption schemes in 2000, bilinear pairings have been used in the design of hundreds of cryptographic protocols. The most commonly used pairings are ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 115

Nalaganje filtrov