Ratna Dutta
Orcid: 0000-0002-8502-150X
According to our database1,
Ratna Dutta
authored at least 147 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.
Multim. Tools Appl., October, 2024
Multim. Tools Appl., February, 2024
Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting.
Theor. Comput. Sci., 2024
Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting.
Adv. Math. Commun., 2024
Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.
Proceedings of the Advances in Information and Computer Security, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
2023
Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption.
J. Ambient Intell. Humaniz. Comput., December, 2023
Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions.
ACM Comput. Surv., December, 2023
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things.
J. Inf. Secur. Appl., August, 2023
Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism.
IEEE Trans. Inf. Theory, July, 2023
Short attribute-based signatures for arbitrary Turing machines from standard assumptions.
Des. Codes Cryptogr., May, 2023
Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography.
Ann. des Télécommunications, April, 2023
Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles.
Ann. des Télécommunications, February, 2023
Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency.
J. Ambient Intell. Humaniz. Comput., 2023
Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix.
J. Ambient Intell. Humaniz. Comput., 2022
J. Inf. Secur. Appl., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption.
Proceedings of the Emerging Information Security and Applications, 2022
2021
Ternary subset difference revocation in public key framework supporting outsider anonymity.
J. Ambient Intell. Humaniz. Comput., 2021
Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment.
J. Inf. Secur. Appl., 2021
J. Inf. Secur. Appl., 2021
IET Inf. Secur., 2021
Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies.
Proceedings of the Provable and Practical Security, 2021
Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys.
Proceedings of the Provable and Practical Security, 2021
Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications.
IACR Cryptol. ePrint Arch., 2020
Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption.
IACR Cryptol. ePrint Arch., 2020
Adv. Math. Commun., 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
J. Inf. Secur. Appl., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice.
IACR Cryptol. ePrint Arch., 2019
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code.
IACR Cryptol. ePrint Arch., 2019
Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation.
Algorithmica, 2019
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors.
IACR Cryptol. ePrint Arch., 2018
Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
Theor. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext.
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the Provable Security, 2017
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Inf. Sci., 2016
Efficient attribute-based signature and signcryption realizing expressive access structures.
Int. J. Inf. Sec., 2016
Int. J. Comput. Math., 2016
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary.
IACR Cryptol. ePrint Arch., 2016
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Provable Security, 2016
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016
2015
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Fully secure anonymous spatial encryption under affine space delegation functionality revisited.
J. Inf. Secur. Appl., 2015
IACR Cryptol. ePrint Arch., 2015
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2015
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries.
Proceedings of the Provable Security, 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
Int. J. Wirel. Mob. Comput., 2014
Int. J. Wirel. Mob. Comput., 2014
A deterministic key pre-distribution scheme for WSN using projective planes and their complements.
Int. J. Trust. Manag. Comput. Commun., 2014
IACR Cryptol. ePrint Arch., 2014
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the Distributed Computing and Internet Technology, 2014
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.
Proceedings of the Communications and Multimedia Security, 2013
2012
Int. J. Wirel. Mob. Comput., 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012
2011
Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks.
Ad Hoc Networks, 2011
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.
Proceedings of the Security and Privacy in Communication Networks, 2011
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011
Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance.
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks.
Ad Hoc Networks, 2010
2009
Trans. Comput. Sci., 2009
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009
Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
2008
IEEE Trans. Inf. Theory, 2008
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2007
J. Comput., 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Progress in Cryptology, 2003