Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where C. Pandu Rangan is active.

Publication


Featured researches published by C. Pandu Rangan.


Archive | 2007

Progress in Cryptology – INDOCRYPT 2007

Kannan Srinathan; C. Pandu Rangan; Moti Yung

Thank you for reading progress in cryptology indocrypt 2004 5th international conference on cryptology in india chennai india december 20 22 2004 proceedings. As you may know, people have search hundreds times for their chosen books like this progress in cryptology indocrypt 2004 5th international conference on cryptology in india chennai india december 20 22 2004 proceedings, but end up in malicious downloads. Rather than reading a good book with a cup of coffee in the afternoon, instead they juggled with some harmful bugs inside their laptop.


Information Processing Letters | 1990

Linear algorithm for optimal path cover problem on interval graphs

S. Rao Arikati; C. Pandu Rangan

Abstract A path cover of a graph G is a set of vertex-disjoint paths that cover all the vertices of G. An optimal path cover of G is a path cover of minimum cardinality. This problem is known to be NP-complete for arbitrary graphs. We present a linear algorithm for this problem on interval graphs. Given the adjacency lists of an interval graph with n vertices and m edges, our algorithm runs in O(m+n) time.


principles of distributed computing | 2002

On perfectly secure communication over arbitrary networks

M. V. N. Ashwin Kumar; Pranava R. Goundan; Kannan Srinathan; C. Pandu Rangan

We study the interplay of network connectivity and perfectly secure message transmission under the corrupting influence of generalized Byzantine adversaries. It is known that in the threshold adversary model, where the Byzantine adversary can corrupt upto any t among the n players (nodes), perfectly secure communication among any pair of players is possible if and only if the underlying synchronous network is (2t + 1)-connected. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure communication among any pair of players is possible if and only if the union of no two sets in the adversary structure is a vertex cutset of the synchronous network. The computation and communication complexities of the transmission protocol are polynomial in the size of the network and the maximal basis of the adversary structure.


international cryptology conference | 2004

Optimal Perfectly Secure Message Transmission

Kannan Srinathan; Arvind Narayanan; C. Pandu Rangan

In the perfectly secure message transmission (PSMT) problem, two synchronized non-faulty players (or processors), the Sender S and the Receiver R are connected by n wires (each of which facilitates 2-way communication); S has an l-bit message that he wishes to send to R; after exchanging messages in phases R should correctly obtain S’s message, while an adversary listening on and actively controlling any set of t (or less) wires should have no information about S’s message.


Discrete Applied Mathematics | 2000

Algorithmic aspects of clique-transversal and clique-independent sets

Venkatesan Guruswami; C. Pandu Rangan

Abstract A minimum clique-transversal set MCT ( G ) of a graph G =( V , E ) is a set S ⊆ V of minimum cardinality that meets all maximal cliques in G . A maximum clique-independent set MCI ( G ) of G is a set of maximum number of pairwise vertex-disjoint maximal cliques. We prove that the problem of finding an MCT ( G ) and an MCI ( G ) is NP -hard for cocomparability, planar, line and total graphs. As an interesting corollary we obtain that the problem of finding a minimum number of elements of a poset to meet all maximal antichains of the poset remains NP -hard even if the poset has height two, thereby generalizing a result of Duffas et al. (J. Combin. Theory Ser. A 58 (1991) 158–164). We present a polynomial algorithm for the above problems on Helly circular-arc graphs which is the first such algorithm for a class of graphs that is not clique-perfect . We also present polynomial algorithms for the weighted version of the clique-transversal problem on strongly chordal graphs, chordal graphs of bounded clique size, and cographs. The algorithms presented run in linear time for strongly chordal graphs and cographs. These mark the first attempts at the weighted version of the problem.


Information & Computation | 1997

Restrictions of minimum spanner problems

G. Venkatesan; Udi Rotics; M.S. Madanlal; Johann A. Makowsky; C. Pandu Rangan

Abstract A t -spanner of a graph G is a spanning subgraph H such that the distance between any two vertices in H is at most t times their distance in G . Spanners arise in the context of approximating the original graph with a sparse subgraph (Peleg, D., and Schaffer, A. A. (1989), J. Graph. Theory 13 (1), 99–116). The MINIMUM t -SPANNER problem seeks to find a t -spanner with the minimum number of edges for the given graph. In this paper, we completely settle the complexity status of this problem for various values of t , on chordal graphs, split graphs, bipartite graphs and convex bipartite graphs. Our results settle an open question raised by L. Cai (1994, Discrete Appl. Math. 48 , 187–194) and also greatly simplify some of the proofs presented by Cai and by L. Cai and M. Keil (1994, Networks 24 , 233–249). We also give a factor 2 approximation algorithm for the MINIMUM 2-SPANNER problem on interval graphs. Finally, we provide approximation algorithms for the bandwidth minimization problem on convex bipartite graphs and split graphs using the notion of tree spanners.


Information Processing Letters | 1996

Tree 3-spanners on interval, permutation and regular bipartite graphs

M.S. Madanlal; G. Venkatesan; C. Pandu Rangan

The tree 3-spanner problem consists of finding a tree 3-spanner of a given graph G(V, E). We study the tree 3-spanner problem for some special classes of graphs namely interval graphs, permutation graphs and regular bipartite graphs.


theory of cryptography conference | 2006

Round-Optimal and efficient verifiable secret sharing

Matthias Fitzi; Juan A. Garay; Shyamnath Gollakota; C. Pandu Rangan; Kannan Srinathan

We consider perfect verifiable secret sharing (VSS) in a synchronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players in a way that no t of them obtain any information, but any t + 1 players obtain full information about the secret. The round complexity of a VSS protocol is defined as the number of rounds performed in the sharing phase. Gennaro, Ishai, Kushilevitz and Rabin showed that three rounds are necessary and sufficient when n > 3t. Sufficiency, however, was only demonstrated by means of an inefficient (i.e., exponential-time) protocol, and the construction of an efficient three-round protocol was left as an open problem. In this paper, we present an efficient three-round protocol for VSS. The solution is based on a three-round solution of so-called weak verifiable secret sharing (WSS), for which we also prove that three rounds is a lower bound. Furthermore, we also demonstrate that one round is sufficient for WSS when n > 4t, and that VSS can be achieved in 1 + e amortized rounds (for any e > 0 ) when n>3t.


Information Processing Letters | 1996

Clique transversal and clique independence on comparability graphs

V. Balachandran; P. Nagavamsi; C. Pandu Rangan

Abstract We present O ( m √ n + M ( n )) algorithms for finding the clique transversal number and the clique independence number for a comparability graph of n nodes, where M ( n ) is the complexity of multiplying two n × n matrices.


Archive | 2001

Progress in Cryptology — INDOCRYPT 2001

C. Pandu Rangan; Cunsheng Ding

Function Secret Sharing (FSS) and Homomorphic Secret Sharing (HSS) are two extensions of standard secret sharing, which support rich forms of homomorphism on secret shared values. – An m-party FSS scheme for a given function family F enables splitting a function f : {0, 1}n → G from F (for Abelian group G) into m succinctly described functions f1, . . . , fm such that strict subsets of the fi hide f , and f(x) = f1(x) + · · · + fm(x) for every input x. – An m-party HSS is a dual notion, where an input x is split into shares x, . . . , x, such that strict subsets of x hide x, and one can recover the evaluation P (x) of a program P on x given homomorphically evaluated share values Eval(x, P ), . . . ,Eval(x, P ). In the last few years, many new constructions and applications of FSS and HSS have been discovered, yielding implications ranging from efficient private database manipulation and secure computation protocols, to worst-case to average-case reductions. In this treatise, we introduce the reader to the background required to understand these developments, and give a roadmap of recent advances (up to October 2017).

Collaboration


Dive into the C. Pandu Rangan's collaboration.

Top Co-Authors

Avatar

S. Sharmila Deva Selvi

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

S. Sree Vivek

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

Arpita Patra

Indian Institute of Science

View shared research outputs
Top Co-Authors

Avatar

Kannan Srinathan

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ashish Choudhary

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kunwar Singh

National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Suvradip Chakraborty

Indian Institute of Technology Madras

View shared research outputs
Top Co-Authors

Avatar

A. K. Banerjee

National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

V. Kamakoti

Indian Institute of Technology Madras

View shared research outputs
Researchain Logo
Decentralizing Knowledge