• Login
    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Advisor 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Advisor
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Advisor
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Division of Electrical, Electronics, and Computer Science (EECS) by Advisor "Chatterjee, Sanjit"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-10 of 10

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Constructing Provably Secure Identity-Based Signature Schemes 

        Chethan Kamath, H (2018-04-03)
        An identity-based cryptosystem (IBC) is a public-key system where the public key can be represented by any arbitrary string such as an e-mail address. The notion was introduced by Shamir with the primary goal of simplifying ...
      • Construction of Secure and Efficient Private Set Intersection Protocol 

        Kumar, Vikas (2018-03-17)
        Private set intersection(PSI) is a two party protocol where both parties possess a private set and at the end of the protocol, one party (client) learns the intersection while other party (server) learns nothing. Motivated ...
      • Efficient and Secure Search over Encrypted Data 

        Shah, Akash
        Due to a variety of crucial bene fits, enterprises outsource their data to cloud resident storage. The outsourced data needs to be stored in encrypted form on remote untrusted servers to preserve privacy. However, if the ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement 

        Tiwari, Mayank
        Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party ...
      • Quantum-Safe Identity-Based Signature Scheme in Multivariate Quadratic Setting 

        Dimri, Akansha
        Cryptographic techniques are essential for the security of communication in modern society. Today, nearly all public key cryptographic schemes used in practice are based on the two problems of factoring large integers and ...
      • Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved 

        Majumdar, Aalo
        Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ...
      • Signcryption in a Quantum World 

        Puria, Shravan Kumar Parshuram
        With recent advancements and research on quantum computers, it is conjectured that in the foreseeable future, sufficiently large quantum computers will be built to break essentially all public key cryptosystems currently ...
      • Towards Effcient Privacy-Preserving Two-Party k-Means Clustering Protocol 

        Chim, Sonali
        Two-party data mining is a win-win game if played with a guarantee of data privacy from each other. This guarantee is provided by the use of cryptographic techniques in designing the two-party protocol. The need to ...
      • Towards Secure and Efficient Realization of Pairing-Based Signatures from Static Assumptions. 

        Kabaleeshwaran, R
        Bilinear pairing defined over elliptic curve group was first used to design novel cryptosystem in 2000. Since then a large number of cryptosystems has been proposed in pairing-based cryptography (PBC). The main tool for ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CommunityTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV