Ratna Dutta

Orcid: 0000-0002-8502-150X

According to our database1, Ratna Dutta authored at least 147 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.
Multim. Tools Appl., October, 2024

An efficient post-quantum secure dynamic EPID signature scheme using lattices.
Multim. Tools Appl., February, 2024

Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting.
Theor. Comput. Sci., 2024

Post-quantum secure fully-dynamic logarithmic-size deniable group signature in code-based setting.
Adv. Math. Commun., 2024

Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.
Proceedings of the Advances in Information and Computer Security, 2024

Compact Adaptor Signature from Isogenies with Enhanced Security.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Secure and efficient multi-key FHE scheme supporting multi-bit messages from LWE preserving non-interactive decryption.
J. Ambient Intell. Humaniz. Comput., December, 2023

Progress in Multivariate Cryptography: Systematic Review, Challenges, and Research Directions.
ACM Comput. Surv., December, 2023

A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things.
J. Inf. Secur. Appl., August, 2023

Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism.
IEEE Trans. Inf. Theory, July, 2023

Short attribute-based signatures for arbitrary Turing machines from standard assumptions.
Des. Codes Cryptogr., May, 2023

Communication-friendly threshold trapdoor function from weaker assumption for distributed cryptography.
Ann. des Télécommunications, April, 2023

Cloud assisted semi-static secure accountable authority identity-based broadcast encryption featuring public traceability without random oracles.
Ann. des Télécommunications, February, 2023

Implementation of key predistribution scheme in WSN based on binary Goppa codes and Reed Solomon codes with enhanced connectivity and resiliency.
J. Ambient Intell. Humaniz. Comput., 2023

Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

Hierarchical Identity-Based Inner Product Functional Encryption for Unbounded Hierarchical Depth.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023

Compact Identity-Based Signature and Puncturable Signature from SQISign.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Dynamic multi-key FHE in symmetric key setting from LWE without using common reference matrix.
J. Ambient Intell. Humaniz. Comput., 2022

Post-quantum secure identity-based signature achieving forward secrecy.
J. Inf. Secur. Appl., 2022

Efficient Multi-Signature Scheme Using Lattice.
Comput. J., 2022

Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Constructing Pairing Free Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner Product Policy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption.
Proceedings of the Emerging Information Security and Applications, 2022

2021
Ternary subset difference revocation in public key framework supporting outsider anonymity.
J. Ambient Intell. Humaniz. Comput., 2021

Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment.
J. Inf. Secur. Appl., 2021

Constructing provable secure broadcast encryption scheme with dealership.
J. Inf. Secur. Appl., 2021

Lattice-based nominative signature using pseudorandom function.
IET Inf. Secur., 2021

Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.
IACR Cryptol. ePrint Arch., 2021

Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF.
IACR Cryptol. ePrint Arch., 2021

Attribute-Based Access Control for Inner Product Functional Encryption from LWE.
IACR Cryptol. ePrint Arch., 2021

Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key.
IACR Cryptol. ePrint Arch., 2021

Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies.
Proceedings of the Provable and Practical Security, 2021

Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys.
Proceedings of the Provable and Practical Security, 2021

Key-Oblivious Encryption from Isogenies with Application to Accountable Tracing Signatures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE.
IACR Cryptol. ePrint Arch., 2020

Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications.
IACR Cryptol. ePrint Arch., 2020

Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption.
IACR Cryptol. ePrint Arch., 2020

Group signature from lattices preserving forward security in dynamic setting.
Adv. Math. Commun., 2020

Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020

2019
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
J. Inf. Secur. Appl., 2019

Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice.
IACR Cryptol. ePrint Arch., 2019

Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code.
IACR Cryptol. ePrint Arch., 2019

Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation.
Algorithmica, 2019

Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Construction for a Nominative Signature Scheme from Lattice with Enhanced Security.
Proceedings of the Codes, Cryptology and Information Security, 2019

Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Functional Signcryption.
J. Inf. Secur. Appl., 2018

Constructing Witness PRF and Offline Witness Encryption Without Multilinear Maps.
IACR Cryptol. ePrint Arch., 2018

Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors.
IACR Cryptol. ePrint Arch., 2018

Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Computational friendly attribute-based encryptions with short ciphertext.
Theor. Comput. Sci., 2017

Strongly full-hiding inner product encryption.
Theor. Comput. Sci., 2017

Forward Secure Efficient Group Signature in Dynamic Setting using Lattices.
IACR Cryptol. ePrint Arch., 2017

Attribute-Based Signatures for Turing Machines.
IACR Cryptol. ePrint Arch., 2017

Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation.
IACR Cryptol. ePrint Arch., 2017

Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext.
IACR Cryptol. ePrint Arch., 2017

UC Secure Issuer-Free Adaptive Oblivious Transfer with Hidden Access Policy.
CoRR, 2017

Provable Secure Constructions for Broadcast Encryption with Personalized Messages.
Proceedings of the Provable Security, 2017

Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
Efficient oblivious transfer with adaptive queries in UC framework.
Secur. Commun. Networks, 2016

Towards fair mutual private set intersection with linear complexity.
Secur. Commun. Networks, 2016

Bandwidth-efficient attribute-based key-insulated signatures with message recovery.
Inf. Sci., 2016

Efficient attribute-based signature and signcryption realizing expressive access structures.
Int. J. Inf. Sec., 2016

Attribute-based key-insulated signature for boolean formula.
Int. J. Comput. Math., 2016

Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary.
IACR Cryptol. ePrint Arch., 2016

Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs.
IACR Cryptol. ePrint Arch., 2016

Secure and E fficient Construction of Broadcast Encryption with Dealership.
IACR Cryptol. ePrint Arch., 2016

Secure and Efficient Construction of Broadcast Encryption with Dealership.
Proceedings of the Provable Security, 2016

New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Adaptively Secure Broadcast Encryption with Dealership.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Fully secure bandwidth-efficient anonymous ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Universally composable issuer-free adaptive oblivious transfer with access policy.
Secur. Commun. Networks, 2015

Fully secure anonymous spatial encryption under affine space delegation functionality revisited.
J. Inf. Secur. Appl., 2015

Functional Encryption for Inner Product with Full Function Privacy.
IACR Cryptol. ePrint Arch., 2015

Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015

Functional Signcryption: Notion, Construction, and Applications.
IACR Cryptol. ePrint Arch., 2015

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2015

Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2015

Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries.
Proceedings of the Provable Security, 2015

Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter.
Proceedings of the Information Security - 18th International Conference, 2015

Fully Secure Online/Offline Predicate and Attribute-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2015

2014
A group-based deterministic key pre-distribution scheme for wireless sensor network.
Int. J. Wirel. Mob. Comput., 2014

Anti-collusive self-healing key distributions for wireless networks.
Int. J. Wirel. Mob. Comput., 2014

A deterministic key pre-distribution scheme for WSN using projective planes and their complements.
Int. J. Trust. Manag. Comput. Commun., 2014

Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2014

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
IACR Cryptol. ePrint Arch., 2014

Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction.
Proceedings of the SECRYPT 2014, 2014

Lightweight Universally Composable Adaptive Oblivious Transfer.
Proceedings of the Network and System Security - 8th International Conference, 2014

Efficient Adaptive Oblivious Transfer in UC Framework.
Proceedings of the Information Security Practice and Experience, 2014

Issuer-Free Adaptive Oblivious Transfer with Access Policy.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Attribute Based Key-Insulated Signatures with Message Recovery.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Adaptive Oblivious Transfer Realizing Expressive Hidden Access Policy.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy.
Proceedings of the Distributed Computing and Internet Technology, 2014

Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Expressive Attribute Based Signcryption with Constant-Size Ciphertext.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
Proceedings of the Provable Security - 7th International Conference, 2013

Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network.
Proceedings of the Network and System Security - 7th International Conference, 2013

Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Recipient Anonymous Ciphertext-Policy Attribute Based Encryption.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption.
Proceedings of the Communications and Multimedia Security, 2013

2012
Collusion resistant self-healing key distribution in mobile wireless networks.
Int. J. Wirel. Mob. Comput., 2012

Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

A Flexible Deterministic Approach to Key Pre-distribution in Grid Based WSNs.
Proceedings of the Ad Hoc Networks - 4th International ICST Conference, 2012

2011
Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks.
Ad Hoc Networks, 2011

Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane.
Proceedings of the Security and Privacy in Communication Networks, 2011

Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture.
Proceedings of the Security Aspects in Information Technology, 2011

Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance.
Proceedings of the Security Aspects in Information Technology, 2011

A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes.
Proceedings of the Ad Hoc Networks - Third International ICST Conference, 2011

Vector Space Access Structure and ID Based Distributed DRM Key Management.
Proceedings of the Advances in Computing and Communications, 2011

2010
Computationally secure self-healing key distribution with revocation in wireless ad hoc networks.
Ad Hoc Networks, 2010

2009
Secure and Efficient Group Key Agreements for Cluster Based Networks.
Trans. Comput. Sci., 2009

Enhanced Access Polynomial Based Self-healing Key Distribution.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user's pre-arranged life cycle and collusion resistance.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

2008
Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting.
IEEE Trans. Inf. Theory, 2008

Generalized Self-healing Key Distribution Using Vector Space Access Structure.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Low Bandwidth Self-Healing Key Distribution for Broadcast Encryption.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study.
J. Comput., 2007

Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Overcome Weakness of a Password-Based Group Key Agreement Protocol.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2007

Multi-Party Key Agreement in Password-Based Setting.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007

Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Password-based Encrypted Group Key Agreement.
Int. J. Netw. Secur., 2006

2005
Overview of Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2005

Constant Round Dynamic Group Key Agreement.
IACR Cryptol. ePrint Arch., 2005

Dynamic Group Key Agreement in Tree-Based Setting.
IACR Cryptol. ePrint Arch., 2005

2004
Provably Secure Authenticated Tree Based Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2004

Pairing-Based Cryptographic Protocols : A Survey.
IACR Cryptol. ePrint Arch., 2004

Provably Secure Authenticated Tree Based Group Key Agreement.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Extending Joux's Protocol to Multi Party Key Agreement.
IACR Cryptol. ePrint Arch., 2003

Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract).
Proceedings of the Progress in Cryptology, 2003


  Loading...