Research Publications/Reports
Listing last 25 publications. (View All) View/Hide Filter- Asynchronous Byzantine Agreement with Optimal Resilience
Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Appeared in Distributed Computing, Vol 27, No.2, pp.111-146, Apr 2014.
- Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings
Prateek Barapatre, C. Pandu Rangan, Appeared in Security, Privacy, and Applied Cryptography Engineering - Third International Conference (SPACE 2013), Oct 2013.
- Identity-Based Identification Schemes from ID-KEMs
Prateek Barapatre, C. Pandu Rangan, Appeared in Security, Privacy, and Applied Cryptography Engineering - Third International Conference (SPACE 2013), Oct 2013.
- On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission
Ashwinkumar B.V., Arpita Patra, Ashish Choudhary, Kannan Srinathan, C. Pandu Rangan, Appeared in Journal of the Association of Computing Machinery (JACM), Vol 59, No.5, pp.22, Sep 2012.
- Cache Me If You Can: Capacitated Selfish Replication Games.
Raghavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram, Appeared in 10th Latin American Symposium on Theoretical Informatics (LATIN 2012), Lecture Notes in Computer Science, Vol 7256, pp.420-432, Aug 2012.
- A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
Preetha Mathew K, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan, Appeared in 8th International Conference on Information Security Practice and Experience (ISPEC 2012), Lecture Notes in Computer Science, Vol 7232, pp.144-157, Aug 2012.
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
Preetha Mathew K, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan, Appeared in 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in Computer Science, Vol 7372, pp.166-179, Jul 2012.
- Optimal Parameters for Efficient Two-Party Computation Protocols
Chaya Ganesh, C. Pandu Rangan, Appeared in International Workshop on Information Security Theory and Practice (WISTP 2012), Lecture Notes in Computer Science, Vol 7332, pp.128--143, Jun 2012.
- A New Approach to Threshold Attribute Based Signatures
Sharmila Deva Selvi S., Subhashini Venugopalan, C. Pandu Rangan, Appeared in Manuscript, Jun 2011.
- A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs
Esha Ghosh, Narayanaswamy N S, C. Pandu Rangan, Appeared in 5th International Workshop on Algorithms and Computation (WALCOM 2011), Lecture Notes in Computer Science, Vol 6552, pp.191-201, Feb 2011.
- Size-Efficient Multi-level Threshold Attribute Based Encryption
Subhashini Venugopalan, C. Pandu Rangan, Appeared in Manuscript, Jun 2010.
- Distributed consensus in the presence of sectional faults
Amitanand Aiyer S., Sanketh Indrapu, Kannan Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan, Appeared in Proceedings of the 22nd ACM Annual Symposium on Principles of Distributed Computing, pp.202-210, Aug 2003.
- Brief announcement: Efficient Perfectly Secure Communication over Synchronous Networks
Kannan Srinathan, Vinod Vaikuntanathan, C. Pandu Rangan, Appeared in Proceedings of the 22nd ACM Annual Symposium on Principles of Distributed Computing, pp.252-252, Aug 2003.
- On the generative power of Simple H Systems
Lakshminarayanan, Muralidhar Talupur, Kamala Krithivasan, C. Pandu Rangan, Appeared in Journal of Automata, Languages and Combinatorics, Vol 5, pp.457--473, Sep 2000.