2018 Conference Publication Authenticated group key agreement protocol without pairingSharma, Gaurav, Sahu, Rajeev Anand, Kuchta, Veronika, Markowitch, Olivier and Bala, Suman (2018). Authenticated group key agreement protocol without pairing. 19th International Conference on Information and Communications Security (ICICS), Beijing, China, Dec 06-08, 2017. CHAM: Springer. doi: 10.1007/978-3-319-89500-0_52 |
2017 Conference Publication Generic framework for attribute-based group signatureKuchta, Veronika, Sharma, Gaurav, Sahu, Rajeev Anand and Markowitch, Olivier (2017). Generic framework for attribute-based group signature. 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, Dec 13-15, 2017. CHAM: Springer. doi: 10.1007/978-3-319-72359-4_51 |
2017 Conference Publication Secure certificateless proxy re-encryption without pairingKuchta, Veronika, Sharma, Gaurav, Sahu, Rajeev Anand, Bhatia, Tarunpreet and Markowitch, Olivier (2017). Secure certificateless proxy re-encryption without pairing. 12th International Workshop on Security (IWSEC), Hiroshima, Japan, Aug 30-Sep 01, 2017. CHAM: Springer. doi: 10.1007/978-3-319-64200-0_6 |
2016 Conference Publication A categorical approach in handling event-ordering in distributed systemsSisiaridis, Dimitrios , Kuchta, Veronika and Markowitch, Olivier (2016). A categorical approach in handling event-ordering in distributed systems. 22nd International Conference on Parallel and Distributed Systems (ICPADS), Wuhan, China, 13-16 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICPADS.2016.0150 |
2016 Conference Publication Multi-authority distributed attribute-based encryption with application to searchable encryption on latticesKuchta, Veronika and Markowitch, Olivier (2016). Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. Mycrypt 2016: Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology, Kuala-Lumpur, Malaysia, 1-2 December 2016. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-61273-7_20 |
2016 Conference Publication Identity-based threshold encryption on lattices with application to searchable encryptionKuchta, Veronika and Markowitch, Olivier (2016). Identity-based threshold encryption on lattices with application to searchable encryption. 7th International Conference on Applications and Techniques in Information Security (ATIS), Cairns, Australia, Oct 26-28, 2016. Singapore: Springer. doi: 10.1007/978-981-10-2741-3_10 |
2015 Conference Publication Public key encryption with distributed keyword searchKuchta, Veronika and Manulis, Mark (2015). Public key encryption with distributed keyword search. INTRUST 2015: Trusted Systems , Beijing, China, 7-8 December 2015. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-31550-8_5 |
2014 Conference Publication Rerandomizable threshold blind signaturesKuchta, Veronika and Manulis, Mark (2014). Rerandomizable threshold blind signatures. INTRUST 2014: Trusted Systems, Beijing, China, 16-17 December 2014. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-27998-5_5 |
2013 Conference Publication Unique aggregate signatures with applications to distributed verifiable random functionsKuchta, Veronika and Manulis, Mark (2013). Unique aggregate signatures with applications to distributed verifiable random functions. CANS 2013: Cryptology and Network Security, Paraty, Brazil, 20-22 November 2013. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-02937-5_14 |