Datta, Pratish
20  Ergebnisse:
Personensuche X
?
1

Decentralized Multi-Authority Attribute-Based Inner-Product..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023,
Datta, Pratish ; Pal, Tapas - p. 587-621 , 2023
 
?
 
?
3

Fully Adaptive Decentralized Multi-Authority ABE:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
 
?
4

(Compact) Adaptively secure FE for attribute-weighted sums ..:

Datta, Pratish ; Pal, Tapas
Designs, Codes and Cryptography.  91 (2023)  9 - p. 2917-3034 , 2023
 
?
6

Compact FE for Unbounded Attribute-Weighted Sums for Logspa..:

, In: Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science,
 
?
7

(Compact) Adaptively Secure FE for Attribute-Weighted Sums ..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2021,
Datta, Pratish ; Pal, Tapas - p. 434-467 , 2021
 
?
8

Decentralized Multi-authority ABE for DNFs from LWE:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
 
?
9

Efficient Attribute-Based Signatures for Unbounded Arithmet..:

DATTA, Pratish ; OKAMOTO, Tatsuaki ; TAKASHIMA, Katsuyuki
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E104.A (2021)  1 - p. 25-57 , 2021
 
?
10

Constrained pseudorandom functions from functional encrypti..:

Datta, Pratish
Theoretical Computer Science.  809 (2020)  - p. 137-170 , 2020
 
?
11

Adaptively Simulation-Secure Attribute-Hiding Predicate Enc..:

DATTA, Pratish ; OKAMOTO, Tatsuaki ; TAKASHIMA, Katsuyuki
IEICE Transactions on Information and Systems.  E103.D (2020)  7 - p. 1556-1597 , 2020
 
?
12

Succinct Predicate and Online-Offline Multi-Input Inner Pro..:

Datta, Pratish ; Dutta, Ratna ; Mukhopadhyay, Sourav
Journal of Information Security and Applications.  48 (2019)  - p. 102353 , 2019
 
?
14

Efficient Attribute-Based Signatures for Unbounded Arithmet..:

, In: Public-Key Cryptography – PKC 2019; Lecture Notes in Computer Science,
 
?
15

Constrained (Verifiable) Pseudorandom Function from Functio..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Datta, Pratish - p. 141-159 , 2018
 
1-15