Aakash Saxena

Learn More
In this paper, we describe applications of pairing based cryptosystems in GRID computing. In particular, we focus on various signature schemes and describe how efficient authentication mechanisms can be constructed using pairings. The methods described here were originally designed for group environments and therefore we feel that grid infrastructures can(More)
In this paper, we introduce the concept of additive zero knowledge. Essentially, an additive proof can be considered as a proof system involving many provers and one verifier such that the statements of all the provers are proved simultaneously. Our model of additive proofs is presented using constructions of blind group identification, aggregate signatures(More)
In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of(More)
In this paper, a new power flow controlling device called distributed power flow controller (DPFC) is presented that offers the same control capability as the unified power-flow controller (UPFC) but with much lower cost and high reliability. The DPFC eliminates the common DC link within the UPFC, to enable the independent operation of the shunt and the(More)
In this paper we propose a two-round authenticated key agreement protocol using non-interactive zero-knowledge (NIZK) proofs. Essentially, a NIZK proof allows a prover to convince a verifier about the correctness of a statement without interaction. An obvious application of this is in a two-round key agreement protocol where each participant proves(More)
  • 1