#### Filter Results:

- Full text PDF available (18)

#### Publication Year

2007

2017

- This year (3)
- Last 5 years (13)
- Last 10 years (19)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Charanjit S. Jutla, Arnab Roy
- Journal of Cryptology
- 2013

We define a novel notion of quasi-adaptive non-interactive zero-knowledge (NIZK) proofs for probability distributions on parameterized languages. It is quasi-adaptive in the sense that the common reference string (CRS) generator can generate the CRS depending on the language parameters. However, the simulation is required to be uniform, i.e., a singleâ€¦ (More)

- Charanjit S. Jutla, Arnab Roy
- CRYPTO
- 2013

We state a switching lemma for tests on adversarial responses involving bilinear pairings in hard groups, where the tester can effectively switch the randomness used in the test from being given to the adversary at the outset to being chosen after the adversary commits its response. The switching lemma can be based on any k-linear hardness assumptions onâ€¦ (More)

- Meimei Xu, P Ross Wilderman, +6 authors Reuben J Peters
- Phytochemistry
- 2007

The rice (Oryza sativa) genome contains a family of kaurene synthase-like genes (OsKSL) presumably involved in diterpenoid biosynthesis. While a number of OsKSL enzymes have been functionally characterized, several have not been previously investigated, and the gene family has not been broadly analyzed. Here we report cloning of several OsKSL genes andâ€¦ (More)

- Charanjit S. Jutla, Arnab Roy
- Public Key Cryptography
- 2011

We define a new notion of relatively-sound non-interactive zero-knowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Adversary has access to simulated proofs and common reference strings. It is likely that this weaker notion of relative-soundness suffices in most applications that needâ€¦ (More)

- Sam Kim, Kevin Lewi, Avradip Mandal, Hart William Montgomery, Arnab Roy, David J. Wu
- IACR Cryptology ePrint Archive
- 2016

In a functional encryption scheme, secret keys are associated with functions and ciphertexts are associated with messages. Given a secret key for a function f and a ciphertext for a message x, a decryptor learns f(x) and nothing else about x. Inner product encryption is a special case of functional encryption where both secret keys and ciphertexts areâ€¦ (More)

- Suresh Chari, Charanjit S. Jutla, Arnab Roy
- IACR Cryptology ePrint Archive
- 2011

This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is password-based. We give a universally-composable (UC) realization of this ideal functionality assuming the availability of an SSL-like ideal functionality. We also show that this implementation can be further refined to give aâ€¦ (More)

- Hang Zhao, Jorge Lobo, Arnab Roy, Steven M. Bellovin
- 12th IFIP/IEEE International Symposium onâ€¦
- 2011

In this paper, we describe a framework for a refinement scheme located in a centralized policy server that consists of three components: a knowledge database, a refinement rule set, and a policy repository. The refinement process includes two successive steps: policy transformation and policy composition. Our refinement scheme takes policies written in ourâ€¦ (More)

- Charanjit S. Jutla, Arnab Roy
- Public Key Cryptography
- 2017

We show that the recent structure-preserving signature (SPS) scheme of Kiltz, Pan and Wee [CRYPTO 2015], provably secure under the standard bilinear pairings group assumption SXDH, can be improved to have one less group element and one less pairing product equation in the signature verification step. Our improved SPS scheme only requires six group elementsâ€¦ (More)

- Avradip Mandal, Arnab Roy
- CRYPTO
- 2015

Traditional cryptographic hash functions allow one to easily check whether the original plaintexts are equal or not, given a pair of hash values. Probabilistic hash functions extend this concept where given a probabilistic hash of a value and the value itself, one can efficiently check whether the hash corresponds to the given value. However, given distinctâ€¦ (More)

- Avradip Mandal, Arnab Roy, Masaya Yasuda
- DPM/QASA@ESORICS
- 2015