Journal/Conferences
All the papers
below have appeared in refereed journals or refereed conference proceedings.
Lecture Notes in Computer Science (LNCS) is a book series published by
Springer-Verlag and IEEE conference proceedings are
published by IEEE Computer Society.
2024
1. Jayashree Dey
and Ratna Dutta: Privacy Enhanced Secure Compact Attribute-Based Signature from MQ
Problem for Monotone Span Program. Theoretical Computer Science (TCS) Journal,
ELSEVIER, 2024 (Accepted).
2. Pratima Jana and Ratna Dutta: CPAKE :
An Identity-binding Password Authenticated Key Exchange from Quasi-Cyclic
Codes. In the Proceedings of the 25th International Conference on Cryptology in
India (Indocrypt 2024), LNCS ,
Springer-Verlag, Chennai, India, 18 - 21 December,
2024 (Accepted).
3. Pratima Jana and Ratna Dutta: Quantum Safe
Computation-friendly Identity-binding Password Authenticated Key Exchanges. In
the Proceedings of the 18th International Conference on Provable and Practical
Security (ProvSec 2024), LNCS ,
Springer-Verlag, Gold Coast, Australia, 25 - 27
September, 2024 (Accepted).
4. Anushree Belel
and Ratna Dutta: Attribute-Based Inner Product Functional Encryption in Key-Policy
Setting from Pairing. In the proceeding of the 19th International Workshop on
Security (IWSEC 2024), Springer-Verlag, LNCS, Kyoto,
Japan, September 17 - 19, 2024.
5. Pratima Jana, Surbhi
Shaw and Ratna Dutta: Compact Adaptor Signature from Isogenies with Enhanced Security. In
the Proceeding of the 23th International Conference on Cryptology and Network Security
(CANS 2024), LNCS, 24 - 27 September, 2024, in University of Cambridge, UK.
6. Subhranil Dutta, Tapas Pal
and Ratna Dutta: Reinforcing Privacy in Cloud Computing via Adaptively Secure Non-zero Inner Product Encryption and Anonymous Identity-based
Revocation in Unbounded Setting. Theoretical Computer Science (TCS) Journal,
ELSEVIER, 2024 (Accepted).
7. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Key-homomorphic and
Revocable Ciphertext-Policy Attribute Based Key
Encapsulation Mechanism for Multimedia Applications, Multimedia Tools and
Applications, Springer, 2024 (Accepted).
2023
8. Surbhi Shaw and Ratna Dutta: Compact Identity-based
Signature and Puncturable Signature from SQISign. In the Proceeding of the 26th Annual International
Conference on Information Security and Cryptology (ICISC 2023), LNCS, Springer-Verlag, Seoul, Korea, 2023
9. Surbhi Shaw and Ratna Dutta: Forward secure offline
assisted group key exchange from isogeny-based blinded key encapsulation
mechanism, IEEE Transactions on Information Theory, 2023. (Accepted)
10. Surbhi Shaw and Ratna Dutta: Quantum Resistant Multi-user
Signcryption scheme featuring Key Invisibility for
Internet of Things, Journal of Information Security and Applications, Elsevier,
2023 (Accepted)
11. Surbhi Shaw and Ratna Dutta: Compact Stateful Deterministic Wallet from Isogeny-based Signature
featuring Uniquely Rerandomizable Public Keys. In the
Proceeding of the 22nd International Conference on Cryptology and Network Security
(CANS 2023), LNCS, October 31st to November 2nd, 2023, in Augusta, Georgia,
USA.
12. Pratima Jana and Ratna Dutta: Post-quantum Secure Stateful Deterministic Wallet from Code-based Signature
featuring Uniquely Rerandomized Keys, In the
Proceeding of the 25th International Symposium on Stabilization, Safety, and
Security of Distributed Systems (SSS 2023), LNCS, Springer-Verlag,
2-4 October 2023, New Jersey, USA.
13. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Hierarchical Identity-Based
Inner Product Functional Encryption for Unbounded Hierarchical Depth, In the
Proceeding of the 25th International Symposium on Stabilization, Safety, and
Security of Distributed Systems (SSS 2023), LNCS, Springer-Verlag,
2-4 October 2023, New Jersey, USA.
14. Chinmoy Biswas, Ratna Dutta and Sumanta Sarkar: An Efficient Post-Quantum Secure Dynamic EPID
Signature Scheme using Lattices, Multimedia Tools and Applications, Springer,
2023 (Accepted).
15. Pratish Datta,
Ratna Dutta and Sourav Mukhopadhyay: Short attribute-based
signatures for arbitrary Turing machines from standard assumptions. Designs,
Codes and Cryptography, Springer 2023. (Accepted)
2022
16. Jayashree Dey
and Ratna Dutta: Progress in Multivariate Cryptography: Systematic Review, Challenges and
Research Directions, ACM Computing Surveys, 2022 (Accepted)
17. Jayashree Dey
and Ratna Dutta: Post-quantum Secure Fully-dynamic Logarithmic-size Deniable Group
Signature in Code-based Setting, Advances in Mathematics of Communications,
American Institute of Mathematical Sciences, 2022 (Accepted)
18. Surbhi Shaw and Ratna Dutta: Post-quantum secure
Id-based identification and identity-based signature achieving forward secrecy.
Journal of Information Security and Applications, Elsevier, July 2022
(Accepted)
19. Amit Kumar Singh, Kamalesh Acharya and Ratna Dutta: Cloud Assisted Semi-static
Secure Accountable Authority Identity-based Broadcast Encryption Featuring
Public Traceability without Random Oracles. Annals of Telecommunications,
Springer, 2022 (Accepted)
20. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Communication-friendly
Threshold Trapdoor Function from Weaker Assumption for Distributed
Cryptography. Annals of Telecommunications, Springer 2022 (Accepted)
21. Chinmoy Biswas and Ratna Dutta: Secure and Efficient
Multi-Key FHE Scheme Supporting Multi-bit Messages
from LWE Preserving Non-Interactive Decryption. Journal of Ambient Intelligence
and Humanized Computing, Springer, April 2022 (Accepted)
22. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Hierarchical Identity
Based Inner Product Functional Encryption for Privacy Preserving Statistical
Analysis without q-type assumption, in the proceeding of the Third
International Conference on Emerging Information Security and Applications
(EISA 2022), Wuhan, China, Springer, October 29-30, 2022.
23. Subhranil Dutta, Ratna
Dutta and Sourav Mukhopadhyay: Constructing Pairing Free Unbounded Inner Product
Functional Encryption Schemes with Unbounded Inner Product Policy. In the
Proceeding of the 15th International Conference on Security for Information
Technology and Communications (SECITC 2022), LNCS, Springer-Verlag,
8-9 December, 2022 (Accepted).
24. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Trapdoor Function from
Weaker Assumption in the Standard Model for Decentralized Network, in the
proceeding of the 8th International Cryptology and Information Security
Conference 2022 (CRYPTOLOGY2022), Port Dickson, Malaysia, July 26-28, 2022.
25. Jayashree Dey
and Ratna Dutta: Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret key. In the Proceeding of the 19th
International Conference on Security and Cryptography (SECRYPT 2022), July
11-13, 2022 (Accepted).
26. Anushree Belel
and Ratna Dutta and Sourav Mukhopadhyay: Key Encapsulation
Mechanism in Ciphertext-Policy Attribute Based
Setting Featuring Revocation and Key-homomorphic Property. In the Proceeding of
the 19th International Conference on Security and Cryptography (SECRYPT 2022),
July 11-13, 2022 (Accepted).
2021
27. Surbhi Shaw and Ratna Dutta: Key-oblivious encryption
from isogenies with application to accountable tracing signature. In the
Proceeding of 22nd International Conference on Cryptology in India (Indocrypt 2021), LNCS, Springer-Verlag
(to appear).
28. Surbhi Shaw and Ratna Dutta: Identification Scheme and
Forward-Secure Signature in Identity-Based Setting from Isogenies. In the
Proceedings of the 15th International Conference on Provable and Practical
Security (ProvSec 2021), LNCS ,
Springer-Verlag, Guangzhou, China, 5 - 8 November,
2021 (Accepted).
29. Subhranil Dutta, Tapas Pal and Ratna Dutta: Fully Secure Unbounded Zero
Inner Product Encryption with Short Ciphertexts and
Keys. In the Proceedings of the 15th International Conference on Provable and
Practical Security (ProvSec 2021), LNCS
, Springer-Verlag, Guangzhou, China, 5 - 8
November, 2021 (Accepted).
30. Ratna Dutta, Sumit
Kumar Debnath and Chinmoy
Biswas: Storage Friendly Provably Secure
Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem.
In the Proceeding of the 18th International Conference on Security and
Cryptography (SECRYPT 2021), July 6-8, 2021 (Accepted).
31. Tapas Pal and Ratna Dutta: Attribute-Based Access
Control for Inner Product Functional Encryption from LWE. In the Proceedings of
the 7th International Conference on Cryptology and Information Security in
Latin America (Latincrypt 2021), LNCS 12912,
pp.127-148, Springer-Verlag, Bogota, October 6-8,
2021.
32. Tapas Pal and Ratna Dutta: CCA Secure Attribute-Hiding
Inner Product Encryption from Minimal Assumption. In the Proceedings of the
26th Australasian Conference on Information Security and Privacy (ACISP 2021), LNCS , pp. , Springer-Verlag,
Perth, Australia, December 1-3, 2021 (Accepted).
33. Tapas Pal and Ratna Dutta: Chosen Ciphertext
Secure Functional Encryption from Constrained Witness PRF. In the Proceedings
of the 26th Australasian Conference on Information Security and Privacy (ACISP
2021), LNCS , pp. , Springer-Verlag,
Perth, Australia, December 1-3, 2021 (Accepted).
34. Amit Kumar Singh, Meenakshi Kansal and Ratna Dutta: Efficient Multi-Signature
Scheme using Lattice. The Computer Journal, Oxford Academic, May 2021
(Accepted) Impact factor: 1.077
35. Mriganka Mandal and Ratna Dutta: Identity-Based Outsider
Anonymous Cloud Data Outsourcing with Simultaneous Individual Transmission for IoT Environment. Journal of Information Security and
Applications, ELSEVIER, May 2021 (Accepted). Impact factor: 2.327
36. Meenakshi Kansal,
Ratna Dutta and Sourav Mukhopadhyay: Lattice based Nominative
Signature using Pseudorandom Function. IET Information Security, Wiley, Mar
2021 (Accepted).
37. Chinmoy Biswas and Ratna Dutta: Dynamic Multi-Key FHE in
Symmetric Key Setting from LWE without using Common Reference Matrix. Journal
of Ambient Intelligence and Humanized Computing, Springer, Jan 2021 (Accepted)
2020
38. Tapas Pal and Ratna Dutta: Chosen-Ciphertext
Secure Multi-Identity and Multi-Attribute Pure FHE. In the Proceeding of the
19th International Conference on Cryptology and Network Security (CANS 2020), LNCS
12579, pp. 387-408, Vienna, Austria, 2020.
39. Tapas Pal and Ratna Dutta: Semi-Adaptively Secure
Offline Witness Encryption from Puncturable Witness
PRF. In the Proceeding of the 14th International Conference on Provable and
Practical Security (Provsec 2020, accepted), LNCS
12505, pp. 169-189, Singapore, 2020.
40. Meenakshi Kansal
and Ratna Dutta: Round Optimal Secure Multisignature Schemes
from Lattice with Public Key Aggregation and Signature Compression. In the
Proceeding of the 12th International Conference on Cryptology, AFRICACRYPT 2020,
LNCS 12174, pp. 281-300, Springer-Verlag, Cairo,
Egypt, 2020.
41. Kamalesh Acharya and Ratna Dutta: Constructing Provable
Secure Broadcast Encryption Scheme with Dealership. Journal of Information
Security and Applications, ELSEVIER, Dec 2020 (Accepted).
42. Kamalesh Acharya and Ratna Dutta: Ternary Subset Difference
Revocation in Public Key Framework Supporting Outsider Anonymity. Journal of
Ambient Intelligence and Humanized Computing, Springer, doi:
10.1007/s12652-020-02319-x, 2020. Impact factor: 4.594
43. Chinmoy Biswas and Ratna Dutta: Implementation of Key Predistribution Scheme in WSN based on Binary Goppa Codes and Reed Solomon Codes with Enhanced
Connectivity and Resiliency. Journal of Ambient Intelligence and Humanized Computing,
Springer, doi: 10.1007/s12652-020-01869-4, 2020.
Impact factor: 4.594.
2019
44. Tapas Pal and Ratna Dutta.: Offline Witness Encryption
from Witness PRF and Randomized Encoding in CRS model, The 24th Australasian
Conference on Information Security and Privacy (ACISP), Christchurch, New
Zealand (2019)
45. Mriganka Mandal and Ratna Dutta: Efficient Identity-based
Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. In the Proceeding of
the 15th International Conference on Information Security and Cryptology
(INSCRYPT 2019), LNCS, Springer-Verlag, Nanjing,
China, 2019
46. Meenakshi Kansal,
Ratna Dutta and Sourav Mukhopadhyay: Construction for a
Nominative Signature Scheme from Lattice with Enhanced Security, International
Conference on Codes, Cryptology And Information
Security (C2SI 2019), Rabat - Morocco (2019)
47. Meenakshi Kansal,
Ratna Dutta and Sourav Mukhopadhyay: Group Signature from
Lattices preserving Forward Security in Dynamic setting. Advances
in Mathematics of Communications (AMC), American Institute of Mathematical
Sciences, (accepted) 2019
48. Pratish Datta,
Ratna Dutta and Sourav Mukhopadhyay: "Succinct Predicate
and Online-Offline Multi-Input Inner Product Encryptions under Standard Static
Assumptions". Journal of Information Security and Applications, ELSEVIER, Volume
48, October 2019
49. Pratish Datta,
Ratna Dutta and Sourav Mukhopadhyay: Constrained Pseudorandom
Functions for Turing Machines Revisited: How to Achieve Verifiability and Key
Delegation. Algorithmica, Springer, (accepted), 2019
50. Jayashree Dey
and Ratna Dutta: Secure Key Encapsulation Mechanism with Compact Ciphertext
and Public Key from Generalized Srivastava Code. In the Proceeding of the 22th
Annual International Conference on Information Security and Cryptology (ICISC
2019), LNCS, Springer-Verlag, Seoul, Korea, 2019
2018
51. Mriganka Mandal and Ratna Dutta: Efficient Adaptively
Secure Public-Key Trace and Revoke from Subset Cover Using Deja Q Framework. In
the Proceeding of the 14th International Conference on Information Security and
Cryptology (Inscrypt 2018), LNCS ,pp.
468-489, Springer-Verlag, Fuzhou, China, 2018
52. Pratish Datta,
Ratna Dutta and Sourav Mukhopadhyay: Functional Signcryption. Journal of Information Security and
Applications, Vol. 42, pp. 118-134, Elsevier, 2018.
53. Kamalesh Acharya and Ratna Dutta: Secure Constructions of
Multi-channel Broadcast Encryption Schemes in Public
Key Framework. 17th
International Conference on Cryptology and Network Security (CANS 2018), LNCS,
Springer-Verlag, Naples (Italy), 2018.
54. Mriganka Mandal and Ratna Dutta.: Cost-Effective Private
Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear
Maps and Tracing Traitors. IACR Cryptology ePrint Archive 2018: 508
(2018), SECRYPT 2018 (accepted), Porto, Portugal, 2018.
2017
55. Kamalesh Acharya, Ratna Dutta.: Recipient Revocable
Broadcast Encryption Schemes Without Random Oracles. In the Proceeding of the 20th
Annual International Conference on Information Security and Cryptology (ICISC
2017), LNCS 10779, pp. 191-213, Springer-Verlag,
Seoul, Korea, 2017.
56. Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Constructions for Broadcast
Encryption with Personalized Messages. In the Proceeding of Eleventh International
Conference on Provable Security (ProvSec 2017) LNCS,
Springer-Verlag.
57. Y.Sreenivasa Rao and Ratna Dutta.: Computational Friendly Attribute-Based Encryptions
with Short Ciphertext. Theoretical Computer Science (TCS)
Journal,
ELSEVIER, 2017
(Accepted).
58. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Constrained Pseudorandom
Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key
Delegation. In the
Proceeding of 20th International Conference on the Theory and Practice of
Public-Key Cryptography (PKC 2017), LNCS, Springer-Verlag.
59. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Strongly Full-Hiding Inner
Product Encryption. Theoretical
Computer Science (TCS) Journal, ELSEVIER, 2017 (Accepted).
2016
60. Sumit Kumar Debnath and Ratna
Dutta.: New Realizations of Efficient and
Secure Private Set Intersection Protocols Preserving Fairness. In the Proceeding of the 19th Annual International Conference
on Information Security and Cryptology (ICISC 2016), LNCS,
Springer-Verlag.
61. Kamalesh Acharya and Ratna Dutta.: Adaptively Secure Broadcast Encryption with
Dealership. In the Proceeding of the 19th
Annual International Conference on Information Security and Cryptology (ICISC
2016), LNCS, Springer-Verlag.
62. Sumit Kumar Debnath and Ratna
Dutta.: Provably Secure Fair Mutual
Private Set Intersection Cardinality Utilizing Bloom Filter. In the Proceeding of the 12th International Conference on
Information Security and Cryptology (Inscrypt 2016), LNCS, Springer-Verlag.
63. Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Construction of Broadcast
Encryption with Dealership. In the Proceeding of Tenth International Conference
on Provable Security (ProvSec 2016) LNCS, Springer-Verlag.
64. Sumit Kumar Debnath and Ratna
Dutta.: How to Meet Big Data When Private
Set Intersection Realizes Constant Communication Complexity. In the Proceeding of the 18th IEEE International Conference on
Information and Communications Security (ICICS 2016), LNCS,
Springer-Verlag.
65. Y.Sreenivasa Rao and Ratna Dutta.: Bandwidth-Efficient Attribute-Based
Key-Insulated Signatures with Message Recovery.
Information
Sciences-Journal, ELSEVIER, 2016
(Accepted).
66.
Vandana Guleria and Ratna
Dutta.: Efficient
Oblivious Transfer with Adaptive Queries in UC Framework. Journal of Security and Communication Networks, Wiley, 2016
(Accepted).
67.
Sumit Kumar Debnath and Ratna
Dutta.: Towards Fair Mutual Private Set
Intersection with Linear Complexity. Journal of Security and
Communication Networks, Wiley, 2016 (Accepted).
68. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Adaptively Secure
Unrestricted Attribute-Based Encryption with Subset Difference Revocation in
Bilinear Groups of Prime Order. In the Proceeding of 8th International Conference on
Cryptology, AFRICACRYPT
2016, LNCS, Springer-Verlag.
69. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Functional Encryption for
Inner Product with Full Function Privacy. In the Proceeding of 19th International Conference
on the Theory and Practice of Public-Key Cryptography (PKC 2016), LNCS, Springer-Verlag.
2015
70.
Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure Anonymous
Spatial Encryption Under Affine Space Delegation Functionality Revisited. Journal of Information Security and Applications, ELSEVIER, 2015 (Accepted).
71.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: General Circuit Realizing Compact Attribute-Based
Encryption and Signcryption from Multilinear Maps. In the Proceeding of 16th International Conference
on Cryptology (Indocrypt 2015), LNCS, Springer-Verlag.
72. Sumit Kumar Debnath and Ratna
Dutta.: Efficient Private Set
Intersection Cardinality in the Presence of Malicious Adversaries. In the Proceeding of Ninth International Conference
on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.
73. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Functional Signcryption: Notion, Construction, and Applications. In the Proceeding of Ninth International Conference
on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.
74.
Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure
Bandwidth-Efficient Anonymous Ciphertext-Policy
Attribute Based Encryption. Journal of Security and
Communication Networks, Wiley, 2015 (Accepted).
75.
Sumit Kumar Debnath and Ratna
Dutta.: Secure and Efficient Private Set
Intersection Cardinality using Bloom Filter. In the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag.
76.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: General Circuit Realizing
Compact Revocable Attribute-Based Encryption from Multilinear Maps. In the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag.
77.
Vandana Guleria and Ratna
Dutta.: Universally
Composable Issuer-Free Adaptive Oblivious Transfer
with Access Policy. Journal of Security and
Communication Networks, Wiley, 2015 (Accepted).
78.
Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute-Based Signature and Signcryption Realizing Expressive Access Structures. International Journal of Information
Security, Springer, 2015 (accepted).
79.
Y.Sreenivasa Rao and Ratna Dutta.: Attribute Based Key-Insulated Signature for Boolean
Formula. International
Journal of Computer Mathematics, Taylor & Francis, 2015 (accepted).
80. Pratish Datta,
Ratna Dutta and Sourav Mukhopadhyay.: Fully Secure Online/Offline Predicate
and Attribute-Based Encryption. In
the Proceeding of the 11th Information Security Practice and
Experience Conference (ISPEC 2015), LNCS,
Springer-Verlag.
2014
81.
Vandana Guleria and Ratna
Dutta.: Universally Composable Identity Based Adaptive Oblivious Transfer with
Access Control. In the Proceeding of the 10th
International Conference on Information Security and Cryptology (Inscrypt 2014), LNCS,
Springer-Verlag.
82.
Vandana Guleria and Ratna
Dutta.: Issuer-Free Adaptive Oblivious
Transfer with Access Policy. In the Proceeding of the 17th
Annual International Conference on Information Security and Cryptology (ICISC 2014), LNCS,
Springer-Verlag.
83.
Sumit Kumar Debnath and Ratna
Dutta.: A Fair and Efficient
Mutual Private Set Intersection Protocol from a Two-way Oblivious Pseudorandom
Function. In the Proceeding of the 17th
Annual International Conference on Information Security and Cryptology (ICISC 2014), LNCS,
Springer-Verlag.
84.
Vandana Guleria and Ratna
Dutta.: Efficient Adaptive
Oblivious Transfer without q-type Assumptions in UC Framework. In the Proceeding of the 16th International Conference on
Information and Communications Security (ICICS 2014), LNCS, Springer-Verlag.
85.
Y.Sreenivasa Rao and Ratna Dutta.: Attribute
Based Key-Insulated Signatures with Message Recovery. In the Proceeding of the 16th International Conference on
Information and Communications Security (ICICS 2014), LNCS, Springer-Verlag.
86.
Vandana Guleria and Ratna
Dutta.: Adaptive Oblivious
Transfer with Hidden Access Policy Realizing Disjunction. In the Proceeding of the 11th International Conference on Security and
Cryptography (SECRYPT 2014), LNCS,
Springer-Verlag.
87.
Vandana Guleria and Ratna
Dutta.: Lightweight Universally
Composable Adaptive Oblivious Transfer. In
the Proceeding of the 8th International
Conference on Network and System Security (NSS 2014), LNCS, Springer-Verlag.
88.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Universally Composable
Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. In the Proceeding of Information
Security, the Seventeenth International Conference (ISC 2014), LNCS, Springer-Verlag.
89.
Y.Sreenivasa Rao and Ratna Dutta.: Expressive Bandwidth-Efficient Attribute Based
Signature and Signcryption. In the Proceeding of 19th Australasian Conference
on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.
90.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Universally Composable
Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. In the Proceeding of 19th Australasian Conference
on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.
91.
Y.Sreenivasa Rao and Ratna Dutta.: Expressive
Attribute Based Signcryption with Constant-Size Ciphertext. In the Proceeding of 7th International Conference on
the Theory and Applications of Cryptology (Africacrypt
2014), LNCS, Springer-Verlag.
92.
Vandana Guleria and Ratna
Dutta.: Efficient Adaptive
Oblivious Transfer in UC Framework. In the Proceeding of the
10th Information Security Practice and Experience Conference (ISPEC 2014), LNCS, Springer-Verlag.
93. Sarbari Mitra,
Sourav Mukhopadhyay and Ratna Dutta.: A deterministic key
pre-distribution scheme for WSN using projective planes and their complements. International
Journal of Trust Management in Computing and
Communications (IJTMCC), 2014.
94. Y.Sreenivasa Rao and Ratna Dutta.: Dynamic
Ciphertext-Policy Attribute-Based Encryption for
Expressive Access Policy. In
the Proceeding of 10th International Conference on Distributed Computing and
Internet Technology (ICDCIT 2014) LNCS, Springer-Verlag.
2013
95.
Y.Sreenivasa Rao and Ratna Dutta.:
Computationally Efficient Expressive Key-Policy Attribute Based Encryption
Schemes with Constant-Size Ciphertext. In the Proceeding of 15th
International Conference on Information and Communications Security (ICICS 2013) LNCS,
Springer-Verlag.
96.
Y.Sreenivasa Rao and Ratna Dutta.: Computationally
Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
In the
Proceeding of Seventh International Conference on Provable Security (ProvSec 2013) LNCS, Springer-Verlag.
97.
Y.Sreenivasa Rao and Ratna Dutta.: Recipient
Anonymous Ciphertext-Policy Attribute Based
Encryption. In
the Proceeding of 9th International Conference on Information Systems Security
(ICISS 2013) LNCS, Springer-Verlag.
98.
Y.Sreenivasa Rao and Ratna Dutta.: Decentralized
Ciphertext-Policy Attribute-Based Encryption Scheme
with Fast Decryption. In
the Proceeding of the 14th Joint IFIP TC6 and TC11
Conference on Communications and Multimedia Security (CMS 2013), LNCS,
Springer-Verlag.
99.
Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute Based Access Control Mechanism
for Vehicular Ad Hoc Network, In the Proceeding of 7th International
Conference on Network and System Security (NSS 2013), LNCS, Springer-Verlag.
100.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Key Pre-Distribution in a
Non-Uniform Rectangular Grid for Wireless Sensor Networks. Journal
of Applied Mathematics and Computing, Springer, 2013.
101.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Unconditionally-Secure Key
Pre-Distribution for Triangular Grid Based Wireless Sensor Network. Journal
of Applied Mathematics and Computing, Springer, 2013.
102.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Unconditionally Secure Fully Connected Key
Establishment using Deployment Knowledge, In
the Proceeding of AsiaARES 2013, LNCS, Springer-Verlag, 2013.
2012
103.
Y.Sreenivasa Rao and Ratna Dutta.: Computationally
Efficient Secure Access Control for Vehicular Ad Hoc Networks, In the Proceeding of
eighth International Conference on Information Systems Security (ICISS 2012), LNCS, Springer-Verlag.
104.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Flexible
Deterministic Approach to Key Pre-Distribution in Grid Based WSN, In Proceeding of ADHOCNETS 2012, LNICST (Springer Lecture Notes of ICST).
105.
Ratna Dutta.: Anti-Collusive Self-Healing Key Distributions for Wireless Networks, International Journal of Wireless
and Mobile Computing (IJWMC), Editor-in-Chief:
Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.
106.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: A Group-Based Deterministic Key Predistribution
Scheme for Wireless Sensor Network, International
Journal of Wireless and Mobile Computing (IJWMC), Editor-in-Chief:
Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.
107.
Ratna Dutta and Sugata Sanyal.: Collusion Resistant Self-Healing Key Distribution
in Mobile Wireless Networks, International Journal of Wireless
and Mobile Computing (IJWMC), Editor-in-Chief: Zhihua
Cui; Vol.1, Nos. 1/2/3,2012; ISSN (Online): 1741-1092; ISSN (Print): 1741-1084.
2011
108.
Ratna Dutta.: Access Polynomial Based
Self-Healing Key Distribution with Improved Security and Performance, In Proceeding of InfoSecHiComNet 2011, LNCS,
Springer-Verlag.
109.
Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay.: A
Hierarchical Deterministic Key Predistribution for
WSN Using Projective Planes, In Proceeding of ADHOCNETS 2011, LNICST
(Springer Lecture Notes of ICST).
110.
Ratna Dutta, Sourav
Mukhopadhyay and Dheerendra
Mishra.: Access Policy Based Key
Management in Multi-Level Multi-Distributor DRM Architecture, In Proceeding of InfoSecHiComNet 2011, LNCS,
Springer-Verlag.
111.
Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay.: Towards
a Deterministic Hierarchical Key Predistribution for
WSN Using Complementary Fano Plane, In Proceeding of SecureComm 2011, LNICST
(Springer Lecture Notes of ICST).
112.
Ratna Dutta, Dheerendra
Mishra and Sourav Mukhopadhyay.: Vector Space Access Structure and ID based
Distributed DRM Key Management, In proceedings of ID 2011, LNCS,
Springer-Verlag.
113.
Ratna Dutta and Tom Dowling.: Provably secure hybrid key agreement protocols in
cluster-based wireless ad hoc networks, International Journal of Ad Hoc Networks 9(5): 767-787 (2011).
2010-2009
114.
Ratna Dutta, Sourav Mukhopadhyay,
Martin Collier.: Computationally secure
self-healing key distribution with revocation in wireless ad hoc networks. International Journal of Ad Hoc Networks 8(6): 597-613 (2010).
115.
Ratna Dutta, Tom Dowling.: Secure and Efficient Group
Key Agreements for Cluster Based Networks. International Journal of Transactions on Computational Science 4: 87-116 (2009).
116.
Ratna Dutta, Sourav
Mukhopadhyay, and Tom Dowling.: Key Management in Multi-Distributor based DRM
System with Mobile Clients using IBE, IEEE Conference on the Applications of Digital Information and Web
Technologies (ICADIWT 2009), August 2009.
117.
Ratna Dutta, Sourav
Mukhopadhyay, and Tom Dowling. :
Trade-Off between Collusion
Resistance and User Life Cycle in Self-Healing Key Distributions with
t-Revocation, IEEE
Conference on the Applications of Digital Information and Web Technologies
(ICADIWT 2009), August 2009.
118.
Ratna Dutta, Sourav
Mukhopadhyay and Tom Dowling.: Enhanced Access Polynomial Based Self-Healing Key
Distribution, ICST
International Workshop on Security in Emerging Wireless Communication and
Networking Systems (SEWCN09). LNICST (Springer Lecture Notes of
ICST), September 2009.
119.
Ratna Dutta, Sourav
Mukhopadhyay and Tom Dowling.: Generalized Self-Healing Key Distribution in
Wireless Ad hoc Networks with Trade-Offs in Users Pre-Arranged Life Cycle and
Collusion Resistance, 5th ACM International Symposium on QoS and
Security for Wireless and Mobile Networks (Q2SWinet 2009), ACM Press, October
2009.
2008-2007
120.
Ratna Dutta and Rana Barua.: Provably Secure Constant
Round Contributory Group Key Agreement in Dynamic Setting, International Journal of IEEE Transactions on Information Theory (IEEE-IT), Vol. 54, No. 5, pp.
2007-2025, May 2008.
121.
Ratna Dutta, Sourav
Mukhopadhyay, Amitabha Das
and Sabu Emmanuel.: Generalized Self-Healing Key Distribution using Vector Space Access
Structure. In
proceedings of IFIP Networking 2008, LNCS 4982, pp. 612-623, Springer-Verlag 2008.
122.
Ratna Dutta, Sourav
Mukhopadhyay and Sabu
Emmanuel.: Low Bandwidth Self-Healing Key
Distribution in Wireless Ad Hoc Network. In proceeding of the IEEE Asia International
Conference on Modelling and Simulation (AMS 2008), pp. 867-872, IEEE Computer
Society Press, 2008.
123.
Ratna Dutta,:
Converting Group Key Agreement
Protocol into Password-Based Setting - Case Study. Journal
of Computers, ISSN
1796-203X, Vol. 12, No. 2, pp. 26-33, Academy Publisher, October 2007.
124.
Ratna Dutta, Chang Ee-Chien and Sourav Mukhopadhyay.: Efficient Self-Healing Key
Distributions with Revocation for Wireless Sensor Network using One Way Key
Chains. In
proceedings of ACNS 2007, LNCS 4521, pp. 385-400, Springer-Verlag, 2007.
125.
Ratna Dutta and Sourav Mukhopadhyay.: Improved Self-Healing Key Distribution with
Revocation in Wireless Sensor Network. In proceeding of the IEEE Wireless Communications and Networking
Conference (WCNC 2007) - Networking, IEEE Communications Society Press, 2007.
126.
Ratna Dutta and Sourav Mukhopadhyay.: Designing Scalable Self-Healing Key Distribution
Schemes with Revocation Capability. In proceedings of ISPA 2007, LNCS 4742, pp. 419-430, Springer-Verlag, 2007.
127.
Ratna Dutta.: Multi-Party Key Agreement in Password-Based
Setting. In
proceeding of the IEEE Asia International Conference on Modelling and
Simulation (AMS 2007), pp. 133-138, IEEE Computer Society Press, 2007.
128.
Ratna Dutta: Overcome Weakness of a Password-Based Group Key
Agreement Protocol. In
proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC
2007), pp. 469-474, IEEE Computer Society and Communications Society Press,
2007.
129.
Ratna Dutta and Sourav Mukhopadhyay.: Constant Storage Self-Healing Key Distribution with
Revocation in Wireless Sensor Network. In proceeding of the IEEE International Conference on Communications
(ICC 2007), IEEE Communications Society Press, 2007.
2006 and before
130.
Ratna Dutta and Rana Barua.: Password-Based Encrypted
Group Key Agreement. In the International Journal of Network Security (IJNS), Vol.3, No.1, pp. 23-34,
July 2006.
131.
Ratna Dutta and Rana Barua,: Dynamic Group Key Agreement in Tree-Based Setting. In proceedings of ACISP
2005, LNCS 3574, pp. 101-112, Springer-Verlag, 2005.
132.
Ratna Dutta and Rana Barua.: Constant Round Dynamic Group
Key Agreement. In
proceedings of ISC 2005, LNCS 3650, pp. 74-88, Springer-Verlag, 2005.
133.
Ratna Dutta, Rana Barua and Palash Sarkar.: Provably Secure Authenticated Tree Based Group Key
Agreement. In
proceedings of ICICS 2004, LNCS 3269, pp. 92-104, Springer-Verlag 2004.
134.
Rana Barua, Ratna
Dutta, Palash Sarkar.: Extending Joux's Protocol to Multi Party Key
Agreement (Extended Abstract). In proceedings of INDOCRYPT 2003, LNCS 2904, pp. 205-217,
Springer-Verlag 2003.