Follow
Arinjita Paul
Arinjita Paul
Research Scientist, TCS Research, India
Verified email at cse.iitm.ac.in
Title
Cited by
Cited by
Year
Extracting the combinatorial test parameters and values from UML sequence diagrams
P Satish, A Paul, K Rangarajan
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
242014
A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
A Paul, V Srinivasavaradhan, S Sharmila Deva Selvi, C Pandu Rangan
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
212018
A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
S Sharmila Deva Selvi, A Paul, C Pandurangan
International Conference on Cryptology and Network Security, 459-469, 2017
172017
A provably secure conditional proxy re-encryption scheme without pairing
A Paul, SSD Selvi, CP Rangan
Cryptology ePrint Archive, 2019
122019
An efficient certificateless proxy re-encryption scheme without pairing
S Sharmila Deva Selvi, A Paul, C Pandu Rangan
International Conference on Provable Security, 413-433, 2017
72017
Improving accuracy of differentially private kronecker social networks via graph clustering
A Paul, V Suppakitpaisarn, M Bafna, CP Rangan
2020 International Symposium on Networks, Computers and Communications …, 2020
62020
Efficient attribute-based proxy re-encryption with constant size ciphertexts
A Paul, SSD Selvi, CP Rangan
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
62020
Splitting and aggregating signatures in cryptocurrency protocols
SSD Selvi, A Paul, CP Rangan, S Dirisala, S Basu
2019 IEEE International Conference on Decentralized Applications and …, 2019
62019
Sharing of encrypted files in blockchain made simpler
SSD Selvi, A Paul, S Dirisala, S Basu, CP Rangan
Mathematical Research for Blockchain Economy: 1st International Conference …, 2020
52020
Non-transferability in proxy re-encryption revisited.
A Paul, L Wang, SSD Selvi, CP Rangan
J. Internet Serv. Inf. Secur. 10 (3), 1-30, 2020
42020
An efficient non-transferable proxy re-encryption scheme
S Sharmila Deva Selvi, A Paul, C Pandu Rangan
International Conference on Applications and Techniques in Information …, 2017
42017
Two-stage framework for accurate and differentially private network information publication
MB Adhikari, V Suppakitpaisarn, A Paul, CP Rangan
Computational Data and Social Networks: 9th International Conference, CSoNet …, 2020
32020
A distributed ledger management mechanism for storing and selling private data
S Dutta, A Paul, RH Ozaki, CP Ranzan, K Sakurai
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
12021
Smart contract-driven mechanism design to mitigate information diffusion in social networks
A Paul, V Suppakitpaisarn, CP Rangan
Mathematical research for blockchain economy: 1st international conference …, 2020
12020
An Efficient Two-Party ECDSA Scheme for Cryptocurrencies
H Syed, A Paul, M Singh, MA Rajan
International Conference on Information Systems Security, 411-430, 2023
2023
Method and system for distributed digital signature computation
HB Syed, A Paul, MSD Thakur, RMA BHATTACHAR
US Patent App. 18/052,767, 2023
2023
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.
A Paul, SSD Selvi, CP Rangan
IACR Cryptol. ePrint Arch. 2019, 1325, 2019
2019
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
A Paul, SSD Selvi, CP Rangan
Cryptology ePrint Archive, 2017
2017
Improving Attribute Based Encryption
A Paul, H Wimmer
2017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
SSD Selvi, A Paul, CP Rangan
IACR Cryptol. ePrint Arch. 2017, 867, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20