If you made any changes in Pure these will be visible here soon.

Research Output 2013 2019

3 Citations (Scopus)

A categorical approach in handling event-ordering in distributed systems

Sisiaridis, D., Kuchta, V. & Markowitch, O., 2016, Proceedings 22nd IEEE International Conference on Parallel and Distributed Systems, ICPADS 2016. Liao, X., Lovas, R., Shen, X. & Zheng, R. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 1145-1150 6 p. 7823865

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Anonymous yet traceable strong designated verifier signature

Kuchta, V., Sahu, R. A., Saraswat, V., Sharma, G., Sharma, N. & Markowitch, O., 2018, Information Security : 21st International Conference, ISC 2018 Guildford, UK, September 9–12, 2018 Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Cham Switzerland: Springer, p. 403-421 19 p. (Lecture Notes in Computer Science ; vol. 11060).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

A twofold group key agreement protocol for NoC based MPSoCs

Sharma, G., Kuchta, V., Sahu, R. A., Ellinidou, S., Markowitch, O. & Dricot, J. M., 2018, 2018 16th Annual Conference on Privacy, Security and Trust (PST). McLaughlin, K., Ghorbani, A., Sezer, S., Lu, R., Chen, L., Deng, R. H., Miller, P., Marsh, S. & Nurse, J. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 325-326 2 p. 8514117

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

A twofold group key agreement protocol for NoC-based MPSoCs

Sharma, G., Kuchta, V., Anand Sahu, R., Ellinidou, S., Bala, S., Markowitch, O. & Dricot, J-M., Jun 2019, In : Transactions on Emerging Telecommunications Technologies. 30, 6, 18 p., e3633.

Research output: Contribution to journalArticleResearchpeer-review

3 Citations (Scopus)

Authenticated group key agreement protocol without pairing

Sharma, G., Sahu, R. A., Kuchta, V., Markowitch, O. & Bala, S., 2018, Information and Communications Security: 19th International Conference, ICICS 2017 Beijing, China, December 6–8, 2017 Proceedings. Qing, S., Mitchell, C., Chen, L. & Liu, D. (eds.). Cham Switzerland: Springer, p. 606-618 13 p. (Lecture Notes in Computer Science ; vol. 10631 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)

Generic framework for attribute-based group signature

Kuchta, V., Sharma, G., Sahu, R. A. & Markowitch, O., 2017, Information Security Practice and Experience: 13th International Conference, ISPEC 2017 Melbourne, VIC, Australia, December 13–15, 2017 Proceedings. Liu, J. K. & Samarati, P. (eds.). Cham Switzerland: Springer, p. 814-834 21 p. (Lecture Notes in Computer Science; vol. 10701).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

Identity-based threshold encryption on lattices with application to searchable encryption

Kuchta, V. & Markowitch, O., 2016, Applications and Techniques in Information Security: 6th International Conference, ATIS 2016 Cairns, QLD, Australia, October 26–28, 2016 Proceedings. Batten, L. & Li, G. (eds.). Singapore: Springer, p. 117-129 13 p. (Communications in Computer and Information Science; vol. 651).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Incentives for harvesting attack in proof of work mining pools

Zolotavkin, Y. & Kuchta, V., 2019, Computer Security – ESORICS 2019 : 24th European Symposium on Research in Computer Security Luxembourg, September 23–27, 2019 Proceedings, Part I. Sako, K., Schneider, S. & Y. A. Ryan, P. (eds.). Cham Switzerland: Springer, p. 703-725 23 p. (Lecture Notes in Computer Science ; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets

Alberto Torres, W., Kuchta, V., Steinfeld, R., Sakzad, A., Liu, J. K. & Cheng, J., 2019, Information Security and Privacy: 24th Australasian Conference, ACISP 2019 Christchurch, New Zealand, July 3–5, 2019 Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Cham Switzerland: Springer, p. 156-175 20 p. (Lecture Notes in Computer Science ; vol. 11547 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Multi-authority Distributed Attribute-Based Encryption with application to Searchable Encryption on lattices

Kuchta, V. & Markowitch, O., 2017, Paradigms in Cryptology – Mycrypt 2016 - Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016 Kuala Lumpur, Malaysia, December 1–2, 2016 Revised Selected Papers. Phan, R. C-W. & Yung, M. (eds.). Cham Switzerland: Springer, p. 409-435 27 p. (Lecture Notes in Computer Science ; vol. 10311 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings

Kuchta, V., Sharma, G., Sahu, R. A. & Markowitch, O., 2018, Information Security and Cryptology - ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. Kim, H. & Kim, D-C. (eds.). Cham Switzerland: Springer, p. 71-92 22 p. (Lecture Notes in Computer Science ; vol. 10779 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2 Citations (Scopus)

On new zero-knowledge arguments for attribute-based group signatures from lattices

Kuchta, V., Sahu, R. A., Sharma, G. & Markowitch, O., 2018, Information Security and Cryptology – ICISC 2017: 20th International Conference Seoul, South Korea, November 29 – December 1, 2017 Revised Selected Papers. Kim, H. & Kim, D-C. (eds.). Cham Switzerland: Springer, p. 284-309 26 p. (Lecture Notes in Computer Science ; vol. 10779 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

6 Citations (Scopus)

Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0)

Alberto Torres, W. A., Steinfeld, R., Sakzad, A., Liu, J. K., Kuchta, V., Bhattacharjee, N., Au, M. H. & Cheng, J., 2018, Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 Wollongong, NSW, Australia, July 11–13, 2018 Proceedings. Susilo, W. & Yang, G. (eds.). Cham Switzerland: Springer, p. 558-576 19 p. (Lecture Notes in Computer Science ; vol. 10946).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2 Citations (Scopus)

Public Key Encryption with distributed Keyword Search

Kuchta, V. & Manulis, M., 2016, Trusted Systems: 7th International Conference, INTRUST 2015 Beijing, China, December 7–8, 2015 Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Cham Switzerland: Springer, p. 62-83 22 p. (Lecture Notes in Computer Science; vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

Public-key encryption with integrated keyword search

Saraswat, V., Sahu, R. A., Sharma, G., Kuchta, V. & Markowitch, O., Mar 2019, In : Journal of Hardware and Systems Security. 3, 1, p. 12-25 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
File

Rerandomizable threshold blind signatures

Kuchta, V. & Manulis, M., 2015, Trusted Systems: 6th International Conference, INTRUST 2014 Beijing, China, December 16–17, 2014 Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Cham Switzerland: Springer, p. 70-89 20 p. (Lecture Notes in Computer Science ; vol. 9473).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Secure certificateless Proxy Re-encryption without pairing

Kuchta, V., Sharma, G., Sahu, R. A., Bhatia, T. & Markowitch, O., 2017, Advances in Information and Computer Security: 12th International Workshop on Security, IWSEC 2017 Hiroshima, Japan, August 30 – September 1, 2017 Proceedings. Obana, S. & Chida, K. (eds.). Cham Switzerland: Springer, p. 85-101 17 p. (Lecture Notes in Computer Science; vol. 10418 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

1 Citation (Scopus)

Secure communication on NoC based MPSoC

Sharma, G., Ellinidou, S., Kuchta, V., Sahu, R. A., Markowitch, O. & Dricot, J. M., 2018, Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018 Singapore, Singapore, August 8–10, 2018 Proceedings, Part II. Beyah, R., Chang, B., Li, Y. & Zhu, S. (eds.). Cham Switzerland: Springer, p. 417-428 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

4 Citations (Scopus)

Unique aggregate signatures with applications to distributed verifiable random functions

Kuchta, V. & Manulis, M., 1 Jan 2013, Cryptology and Network Security - 12th International Conference, CANS 2013, Proceedings. Springer, p. 251-270 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8257 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review