11. Partha Sarathi Roy, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Public-key Encryption with Equality Test supporting Flexible Authorization in Standard Model. Theoretical Computer Science, 2022; 929: 124-139.
10. Priyanka Dutta, Willy Susilo, Dung Hoang Duong, and Partha Sarathi Roy:
Puncturable Identity-based and Attribute-based Encryption from Lattices. Theoretical Computer Science, 2022; 929: 18-38.
9. Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Chosen-Ciphertext Lattice-based Public Key Encryption with Equality Test in Standard Model. Theoretical Computer Science, 2022; 905: 31-53.
8. Priyanka Dutta, Willy Susilo, Dung Hoang Duong, and Partha Sarathi Roy:
Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model. Theoretical Computer Science, 2021; 871: 16-29.
7. Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. Computer Standards & Interfaces, 2021; 74: 103515.
6. Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek and Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. JISIS, 2020; 10(4): 1-22.
5. Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. Concurrency and Computation: Practice and Experience, 2018.
4. Kirill Morozov, Partha Sarathi Roy, Rainer Steinwnadt, Rui Xu:
On the security of CFS signature. Open Mathematics Journal, 2018; 16 (1): 161-167.
3. Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Light weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distrib. Syst. 29(5): 1131-1146 (2018).
2. Partha Sarathi Roy, Avishek Adhikari:
One-Sided Leakage-Resilient Privacy Only Two-Message Oblivious Transfer, journal of information security and applications 19 (2014) 295-300.
1. Partha Sarathi Roy, Avishek Adhikari:
Multi-Use Multi-Secret Sharing Scheme for General Access Structure, Annals of the University of Craiova, Mathematics and Computer Science Series, Volume 37(4), pp. 50-57, 2010.
20. Joonsang Baek, Seongbong Choi, Willy Susilo, Partha Sarathi Roy and Hyung Tae Lee:
Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. ESORICS 2025.
19. Khoa Nguyen, Partha Sarathi Roy, Willy Susilo, and Yanhong Xu:
Bicameral and Auditably Private Signatures. ASIACRYPT 2023.
18. Partha Sarathi Roy, Sabyasachi Dutta, Willy Susilo, and Reihaneh Safavi-Naini:
Password Protected Secret Sharing from Lattices. ACNS 2021.
17. Willy Susilo, Priyanka Dutta, Dung Hoang Duong, and Partha Sarathi Roy:
Lattice-based HRA-secure Attribute-based Proxy Re-Encryption in Standard Model. ESORICS 2021.
16. Priyanka Dutta, Willy Susilo, Dung Hoang Duong, and Partha Sarathi Roy:
Puncturable Identity-based Encryption from Lattices. ACISP 2021.
15. Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy, and Avishek Adhikari:
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. ICISS 2020.
14. Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek and Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption in Standard Model: A Lattice-based Construction. WISA 2020
13. Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto and Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019
12. Dung Hoang Duong, Huy Quoc Le , Partha Sarathi Roy and Willy Susilo:
Lattice-Based IBE with Equality Test in Standard Model. ProvSec 2019.
11. Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy and Willy Susilo:
A lattice-based public key encryption with equality test in standard model. ACISP 2019.
10. Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, and Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-Based Signature Schemes. ICISSP 2019.
9. Jyotirmoy Pramanik, Partha Sarathi Roy, Sabyasachi Dutta, Avishek Adhikari, and Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018.
8. Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, and Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018.
7. Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. IEEE Trustcom 2017.
6. Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai:
On unconditionally binding code-based commitment schemes. IMCOM 2017.
5. Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262
4. Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. ICITS 2016.
3. Angsuman Das, Partha Sarathi Roy, Avishek Adhikari:
Computationally Secure Robust Multi-Secret Sharing for General Access Structure. ICMC-2015.
2. Partha Sarathi Roy, Angsuman Das, Avishek Adhikari:
Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure. ICDCIT-2015.
1. Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, Kouichi Sakurai:
An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency, SPACE 2014.
3. Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima and Shinsaku Kiyomoto
Evaluation of Code-based Signature Schemes. IACR Cryptology ePrint Archive 2019/544.
2. Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. IACR Cryptology ePrint Archive 2015: 1115 (2015).
1. Roy P. S., Adhikari A., Xu R., Kirill M., Sakurai K.:
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency, eprint.iacr.org/201/628.pdf.