Follow
Arinjita Paul
Arinjita Paul
Postdoctoral Research Fellow, University of Connecticut
Verified email at uconn.edu - Homepage
Title
Cited by
Cited by
Year
Extracting the combinatorial test parameters and values from UML sequence diagrams
P Satish, A Paul, K Rangarajan
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
242014
A CCA-secure collusion-resistant identity-based proxy re-encryption scheme
A Paul, V Srinivasavaradhan, S Sharmila Deva Selvi, C Pandu Rangan
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
212018
A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model
S Sharmila Deva Selvi, A Paul, C Pandurangan
International Conference on Cryptology and Network Security, 459-469, 2017
172017
A provably secure conditional proxy re-encryption scheme without pairing
A Paul, SSD Selvi, CP Rangan
Cryptology ePrint Archive, 2019
122019
An efficient certificateless proxy re-encryption scheme without pairing
S Sharmila Deva Selvi, A Paul, C Pandu Rangan
International Conference on Provable Security, 413-433, 2017
72017
Improving accuracy of differentially private kronecker social networks via graph clustering
A Paul, V Suppakitpaisarn, M Bafna, CP Rangan
2020 International Symposium on Networks, Computers and Communications …, 2020
62020
Efficient attribute-based proxy re-encryption with constant size ciphertexts
A Paul, SSD Selvi, CP Rangan
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
62020
Splitting and aggregating signatures in cryptocurrency protocols
SSD Selvi, A Paul, CP Rangan, S Dirisala, S Basu
2019 IEEE International Conference on Decentralized Applications and …, 2019
62019
Sharing of encrypted files in blockchain made simpler
SSD Selvi, A Paul, S Dirisala, S Basu, CP Rangan
Mathematical Research for Blockchain Economy: 1st International Conference …, 2020
52020
Non-transferability in proxy re-encryption revisited.
A Paul, L Wang, SSD Selvi, CP Rangan
J. Internet Serv. Inf. Secur. 10 (3), 1-30, 2020
42020
An efficient non-transferable proxy re-encryption scheme
S Sharmila Deva Selvi, A Paul, C Pandu Rangan
International Conference on Applications and Techniques in Information …, 2017
42017
Two-stage framework for accurate and differentially private network information publication
MB Adhikari, V Suppakitpaisarn, A Paul, CP Rangan
Computational Data and Social Networks: 9th International Conference, CSoNet …, 2020
32020
A distributed ledger management mechanism for storing and selling private data
S Dutta, A Paul, RH Ozaki, CP Ranzan, K Sakurai
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
12021
Smart contract-driven mechanism design to mitigate information diffusion in social networks
A Paul, V Suppakitpaisarn, CP Rangan
Mathematical research for blockchain economy: 1st international conference …, 2020
12020
An Efficient Two-Party ECDSA Scheme for Cryptocurrencies
H Syed, A Paul, M Singh, MA Rajan
International Conference on Information Systems Security, 411-430, 2023
2023
Method and system for distributed digital signature computation
HB Syed, A Paul, MSD Thakur, RMA BHATTACHAR
US Patent App. 18/052,767, 2023
2023
Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts.
A Paul, SSD Selvi, CP Rangan
IACR Cryptol. ePrint Arch. 2019, 1325, 2019
2019
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing
A Paul, SSD Selvi, CP Rangan
Cryptology ePrint Archive, 2017
2017
Improving Attribute Based Encryption
A Paul, H Wimmer
2017
On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing.
SSD Selvi, A Paul, CP Rangan
IACR Cryptol. ePrint Arch. 2017, 867, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20