Partha Sarathi Roy
Partha Sarathi Roy
School of Computing and Information Technology; University of Wollongong.
Verified email at - Homepage
Cited by
Cited by
A Lattice-Based Public Key Encryption with Equality Test in Standard Model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Australasian Conference on Information Security and Privacy 11547, 138-155, 2019
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
A Adhikari, K Morozov, S Obana, PS Roy, K Sakurai, R Xu
Information Theoretic Security 10015, 3-23, 2016
An efficient robust secret sharing scheme with optimal cheater resiliency
PS Roy, A Adhikari, R Xu, K Morozov, K Sakurai
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
Lattice-Based IBE with Equality Test in Standard Model
DH Duong, HQ Le, PS Roy, W Susilo
International Conference on Provable Security 11821, 19-40, 2019
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
W Susilo, P Dutta, DH Duong, PS Roy
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
Code-based signature scheme without trapdoors
PS Roy, K Morozov, K Fukushima, S Kiyomoto, T Takagi
Int. Assoc. Cryptologic Res, 2018
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
International Conference on Information Security Applications, 245-257, 2020
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters
J Pramanik, PS Roy, S Dutta, A Adhikari, K Sakurai
Information Systems Security 11281, 171-188, 2018
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
PS Roy, DH Duong, W Susilo, A Sipasseuth, K Fukushima, S Kiyomoto
Theoretical Computer Science, 2022
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
Journal of Internet Services and Information Security (JISIS) 10 (4), 1-22, 2020
On the security of the Courtois-Finiasz-Sendrier signature
K Morozov, PS Roy, R Steinwandt, X Rui
Open Mathematics 16, 161–167, 2018
RaCoSS: Random code-based signature scheme
K Fukushima, PS Roy, R Xu, S Kiyomoto, K Morozov, T Takagi
Submission to NIST post-quantum standardization process 5, 2017
On unconditionally binding code-based commitment schemes
K Morozov, PS Roy, K Sakura
Proceeding IMCOM '17 Proceedings of the 11th International Conference on …, 2017
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
PS Roy, S Dutta, K Morozov, A Adhikari, K Fukushima, S Kiyomoto, ...
Information Security Practice and Experience, 2018 11125, 578-594, 2018
Puncturable identity-based encryption from lattices
P Dutta, W Susilo, DH Duong, PS Roy
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
Light Weight Write Mechanism for Cloud Data
M Jahan, M Rezvani, Q Zhao, PS Roy, K Sakurai, A Seneviratne, S Jha
Transactions on Parallel and Distributed, 2018
Random code-based signature scheme (racoss)
K Fukushima, PS Roy, R Xu, S Kiyomoto, K Morozov, T Takagi
First round submission to the NIST post-quantum cryptography call, 2017
Multi-Use Multi-Secret Sharing Scheme for General Access Structure
PS Roy, A Adhikari
Annals of the University of Craiova, Mathematics and Computer Science Series …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20