Search Results - "Bagchi, Prithwi"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature fornternet of Drones Applications by Bagchi, Prithwi, Maheshwari, Raj, Bera, Basudeb, Das, Ashok Kumar, Park, Youngho, Lorenz, Pascal, Yau, David K. Y.

    Published in IEEE transactions on vehicular technology (21-03-2023)
    “…Due to high effectiveness and robust security protocols, lattice-based cryptography becomes a very broadly applicable optimistic post-quantum technique that is…”
    Get full text
    Journal Article
  2. 2

    Public Blockchain-Envisioned Security Scheme Using Post Quantum Lattice-Based Aggregate Signature for Internet of Drones Applications by Bagchi, Prithwi, Maheshwari, Raj, Bera, Basudeb, Das, Ashok Kumar, Park, Youngho, Lorenz, Pascal, Yau, David K. Y.

    Published in IEEE transactions on vehicular technology (01-08-2023)
    “…Due to high effectiveness and robust security protocols, lattice-based cryptography becomes a very broadly applicable optimistic post-quantum technique that is…”
    Get full text
    Journal Article
  3. 3

    An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice by Bagchi, Prithwi, Bera, Basudeb, Maheshwari, Raj, Das, Ashok Kumar, Yau, David K. Y., Sikdar, Biplab

    “…This article deals with designing an efficient post-quantum lattice based encryption scheme that relies on the multi-authority Ciphertext-Policy…”
    Get full text
    Conference Proceeding
  4. 4

    Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications by Bagchi, Prithwi, Bera, Basudeb, Das, Ashok Kumar, Shetty, Sachin, Vijayakumar, Pandi, Karuppiah, Marimuthu

    Published in IEEE internet of things magazine (01-03-2023)
    “…Many classical cryptographic techniques are breakable due to the quantum computing security threats, and it leads to design public key cryptography based on…”
    Get full text
    Magazine Article