Journal/Conferences
All the papers
below have appeared in refereed journals or refereed conference proceedings. Lecture
Notes in Computer Science (LNCS) is a book series published by Springer-Verlag
and IEEE conference proceedings are published by IEEE Computer Society.
2026
1. Pratima
Jana, Surbhi Shaw and Ratna Dutta: Cryptographic group action-based compact adaptor
signature with full extractability, unlinkability and
witness hiding. Advances in Mathematics of Communications (AMC) 2026
(Accepted).
2. Nabanita
Chakraborty and Ratna Dutta: Bandwidth-Efficient Anamorphic Extension with Provable Security from
Blum-Goldwasser Cryptosystem. ACM AsiaPKC 2026
(Accepted).
3. Maria
Leslie, Ratna Dutta: A traceable threshold Asmuth-Bloom secret
sharing scheme. Journal of Information Security and Applications, 2026.
4. Ratna
Dutta, Luca De Feo, Sugata Gangopadhyay: Progress in Cryptology - INDOCRYPT 2025 - 26th
International Conference on Cryptology in India, Bhubaneshwar, India, December
14-17, 2025, Proceedings. Lecture Notes in Computer Science 16372, Springer
2026.
2025
5. Surbhi Shaw and Ratna Dutta: Post-quantum secure
compact deterministic wallets from isogeny-based signatures with rerandomized
keys. Theoretical Computer Science (TCS) Journal, ELSEVIER, 2025 (Accepted).
6. Subhranil Dutta, Ratna
Dutta and Sourav Mukhopadhyay: Securing Data in the Cloud
Using Pairing-free Inner Product Functional Encryption with Unbounded Vector
Size. Theoretical Computer Science (TCS) Journal, ELSEVIER, 2025 (Accepted).
2024
7. Jayashree Dey and Ratna Dutta: Privacy Enhanced Secure
Compact Attribute-Based Signature from MQ Problem for Monotone Span Program.
Theoretical Computer Science (TCS) Journal, ELSEVIER, 2024 (Accepted).
8. Pratima Jana and Ratna Dutta: CPAKE :
An Identity-binding Password Authenticated Key Exchange from Quasi-Cyclic
Codes. In the Proceedings of the 25th International Conference on Cryptology in
India (Indocrypt 2024), LNCS ,
Springer-Verlag, Chennai, India, 18 - 21 December, 2024 (Accepted).
9. Pratima Jana and Ratna Dutta: Quantum Safe
Computation-friendly Identity-binding Password Authenticated Key Exchanges. In
the Proceedings of the 18th International Conference on Provable and Practical
Security (ProvSec 2024), LNCS ,
Springer-Verlag, Gold Coast, Australia, 25 - 27 September, 2024 (Accepted).
10. Anushree Belel
and Ratna Dutta: Attribute-Based Inner Product Functional Encryption in Key-Policy
Setting from Pairing. In the proceeding of the 19th International Workshop on
Security (IWSEC 2024), Springer-Verlag, LNCS, Kyoto, Japan, September 17 - 19,
2024.
11. Pratima Jana, Surbhi Shaw
and Ratna Dutta: Compact Adaptor Signature from Isogenies with Enhanced Security. In
the Proceeding of the 23th International Conference on Cryptology and Network
Security (CANS 2024), LNCS, 24 - 27 September, 2024, in University of
Cambridge, UK.
12. Subhranil Dutta, Tapas Pal and Ratna Dutta: Reinforcing Privacy in
Cloud Computing via Adaptively Secure Non-zero Inner
Product Encryption and Anonymous Identity-based Revocation in Unbounded
Setting. Theoretical Computer Science (TCS) Journal, ELSEVIER, 2024 (Accepted).
13. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Key-homomorphic and Revocable Ciphertext-Policy
Attribute Based Key Encapsulation Mechanism for Multimedia Applications,
Multimedia Tools and Applications, Springer, 2024 (Accepted).
2023
14. Surbhi Shaw and Ratna Dutta: Compact Identity-based
Signature and Puncturable Signature from SQISign. In
the Proceeding of the 26th Annual International Conference on Information
Security and Cryptology (ICISC 2023), LNCS, Springer-Verlag, Seoul, Korea, 2023
15. Surbhi Shaw and Ratna Dutta: Forward secure offline
assisted group key exchange from isogeny-based blinded key encapsulation
mechanism, IEEE Transactions on Information Theory, 2023. (Accepted)
16. Surbhi Shaw and Ratna Dutta: Quantum Resistant Multi-user
Signcryption scheme featuring Key Invisibility for
Internet of Things, Journal of Information Security and Applications, Elsevier,
2023 (Accepted)
17. Surbhi Shaw and Ratna Dutta: Compact Stateful
Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys. In the Proceeding of the 22nd
International Conference on Cryptology and Network Security (CANS 2023), LNCS,
October 31st to November 2nd, 2023, in Augusta, Georgia, USA.
18. Pratima Jana and Ratna Dutta: Post-quantum Secure
Stateful Deterministic Wallet from Code-based Signature featuring Uniquely
Rerandomized Keys, In the Proceeding of the 25th International Symposium on
Stabilization, Safety, and Security of Distributed Systems (SSS 2023), LNCS,
Springer-Verlag, 2-4 October 2023, New Jersey, USA.
19. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Hierarchical Identity-Based Inner Product
Functional Encryption for Unbounded Hierarchical Depth, In the Proceeding of
the 25th International Symposium on Stabilization, Safety, and Security of
Distributed Systems (SSS 2023), LNCS, Springer-Verlag, 2-4 October 2023, New
Jersey, USA.
20. Chinmoy Biswas, Ratna Dutta and Sumanta Sarkar: An Efficient Post-Quantum Secure Dynamic EPID
Signature Scheme using Lattices, Multimedia Tools and Applications, Springer,
2023 (Accepted).
21. Pratish Datta, Ratna
Dutta and Sourav Mukhopadhyay: Short attribute-based
signatures for arbitrary Turing machines from standard assumptions. Designs,
Codes and Cryptography, Springer 2023. (Accepted)
2022
22. Jayashree Dey and Ratna Dutta: Progress in Multivariate
Cryptography: Systematic Review, Challenges and Research Directions, ACM
Computing Surveys, 2022 (Accepted)
23. Jayashree Dey and Ratna Dutta: Post-quantum Secure
Fully-dynamic Logarithmic-size Deniable Group Signature in Code-based Setting,
Advances in Mathematics of Communications, American Institute of Mathematical
Sciences, 2022 (Accepted)
24. Surbhi Shaw and Ratna Dutta: Post-quantum secure
Id-based identification and identity-based signature achieving forward secrecy.
Journal of Information Security and Applications, Elsevier, July 2022
(Accepted)
25. Amit Kumar Singh, Kamalesh Acharya and Ratna Dutta: Cloud Assisted Semi-static
Secure Accountable Authority Identity-based Broadcast Encryption Featuring
Public Traceability without Random Oracles. Annals of Telecommunications,
Springer, 2022 (Accepted)
26. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Communication-friendly Threshold Trapdoor
Function from Weaker Assumption for Distributed Cryptography. Annals of Telecommunications,
Springer 2022 (Accepted)
27. Chinmoy Biswas and Ratna Dutta: Secure and Efficient
Multi-Key FHE Scheme Supporting Multi-bit Messages
from LWE Preserving Non-Interactive Decryption. Journal of Ambient Intelligence
and Humanized Computing, Springer, April 2022 (Accepted)
28. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Hierarchical Identity Based Inner Product
Functional Encryption for Privacy Preserving Statistical Analysis without
q-type assumption, in the proceeding of the Third International Conference on
Emerging Information Security and Applications (EISA 2022), Wuhan, China,
Springer, October 29-30, 2022.
29. Subhranil Dutta, Ratna
Dutta and Sourav Mukhopadhyay: Constructing Pairing Free
Unbounded Inner Product Functional Encryption Schemes with Unbounded Inner
Product Policy. In the Proceeding of the 15th International Conference on
Security for Information Technology and Communications (SECITC 2022), LNCS,
Springer-Verlag, 8-9 December, 2022 (Accepted).
30. Anushree Belel,
Ratna Dutta and Sourav Mukhopadhyay: Trapdoor Function from Weaker Assumption in the
Standard Model for Decentralized Network, in the proceeding of the 8th
International Cryptology and Information Security Conference 2022
(CRYPTOLOGY2022), Port Dickson, Malaysia, July 26-28, 2022.
31. Jayashree Dey and Ratna Dutta: Code-based Key
Encapsulation Mechanism Preserving Short Ciphertext and Secret key. In the
Proceeding of the 19th International Conference on Security and Cryptography
(SECRYPT 2022), July 11-13, 2022 (Accepted).
32. Anushree Belel
and Ratna Dutta and Sourav Mukhopadhyay: Key Encapsulation Mechanism in Ciphertext-Policy
Attribute Based Setting Featuring Revocation and Key-homomorphic Property. In
the Proceeding of the 19th International Conference on Security and Cryptography
(SECRYPT 2022), July 11-13, 2022 (Accepted).
2021
33. Surbhi Shaw and Ratna Dutta: Key-oblivious encryption
from isogenies with application to accountable tracing signature. In the
Proceeding of 22nd International Conference on Cryptology in India (Indocrypt 2021), LNCS, Springer-Verlag (to appear).
34. Surbhi Shaw and Ratna Dutta: Identification Scheme and
Forward-Secure Signature in Identity-Based Setting from Isogenies. In the
Proceedings of the 15th International Conference on Provable and Practical
Security (ProvSec 2021), LNCS ,
Springer-Verlag, Guangzhou, China, 5 - 8 November, 2021 (Accepted).
35. Subhranil Dutta, Tapas Pal and Ratna Dutta: Fully Secure Unbounded Zero
Inner Product Encryption with Short Ciphertexts and Keys. In the Proceedings of
the 15th International Conference on Provable and Practical Security (ProvSec 2021), LNCS ,
Springer-Verlag, Guangzhou, China, 5 - 8 November, 2021 (Accepted).
36. Ratna Dutta, Sumit
Kumar Debnath and Chinmoy Biswas: Storage Friendly Provably Secure Multivariate
Identity-Based Signature from Isomorphism of Polynomials Problem. In the
Proceeding of the 18th International Conference on Security and Cryptography
(SECRYPT 2021), July 6-8, 2021 (Accepted).
37. Tapas Pal and Ratna Dutta: Attribute-Based Access
Control for Inner Product Functional Encryption from LWE. In the Proceedings of
the 7th International Conference on Cryptology and Information Security in
Latin America (Latincrypt 2021), LNCS 12912,
pp.127-148, Springer-Verlag, Bogota, October 6-8, 2021.
38. Tapas Pal and Ratna Dutta: CCA Secure Attribute-Hiding
Inner Product Encryption from Minimal Assumption. In the Proceedings of the
26th Australasian Conference on Information Security and Privacy (ACISP 2021), LNCS , pp. , Springer-Verlag, Perth, Australia, December
1-3, 2021 (Accepted).
39. Tapas Pal and Ratna Dutta: Chosen Ciphertext Secure
Functional Encryption from Constrained Witness PRF. In the Proceedings of the
26th Australasian Conference on Information Security and Privacy (ACISP 2021), LNCS , pp. , Springer-Verlag, Perth, Australia, December
1-3, 2021 (Accepted).
40. Amit Kumar Singh, Meenakshi
Kansal and Ratna Dutta: Efficient Multi-Signature Scheme using Lattice.
The Computer Journal, Oxford Academic, May 2021 (Accepted) Impact factor: 1.077
41. Mriganka Mandal and Ratna Dutta: Identity-Based Outsider
Anonymous Cloud Data Outsourcing with Simultaneous Individual Transmission for
IoT Environment. Journal of Information Security and Applications, ELSEVIER,
May 2021 (Accepted). Impact factor: 2.327
42. Meenakshi Kansal, Ratna Dutta and Sourav
Mukhopadhyay: Lattice based Nominative
Signature using Pseudorandom Function. IET Information Security, Wiley, Mar
2021 (Accepted).
43. Chinmoy Biswas and Ratna Dutta: Dynamic Multi-Key FHE in
Symmetric Key Setting from LWE without using Common Reference Matrix. Journal
of Ambient Intelligence and Humanized Computing, Springer, Jan 2021 (Accepted)
2020
44. Tapas Pal and Ratna Dutta: Chosen-Ciphertext Secure
Multi-Identity and Multi-Attribute Pure FHE. In the Proceeding of the 19th
International Conference on Cryptology and Network Security (CANS 2020), LNCS
12579, pp. 387-408, Vienna, Austria, 2020.
45. Tapas Pal and Ratna Dutta: Semi-Adaptively Secure
Offline Witness Encryption from Puncturable Witness PRF. In the Proceeding of
the 14th International Conference on Provable and Practical Security (Provsec 2020, accepted), LNCS 12505, pp. 169-189,
Singapore, 2020.
46. Meenakshi Kansal and Ratna Dutta: Round Optimal Secure Multisignature
Schemes from Lattice with Public Key Aggregation and Signature Compression. In
the Proceeding of the 12th International Conference on Cryptology, AFRICACRYPT
2020, LNCS 12174, pp. 281-300, Springer-Verlag, Cairo, Egypt, 2020.
47. Kamalesh Acharya and Ratna Dutta: Constructing Provable
Secure Broadcast Encryption Scheme with Dealership. Journal of Information
Security and Applications, ELSEVIER, Dec 2020 (Accepted).
48. Kamalesh Acharya and Ratna Dutta: Ternary Subset Difference
Revocation in Public Key Framework Supporting Outsider Anonymity. Journal of
Ambient Intelligence and Humanized Computing, Springer, doi:
10.1007/s12652-020-02319-x, 2020. Impact factor: 4.594
49. Chinmoy Biswas and Ratna Dutta: Implementation of Key Predistribution Scheme in WSN based on Binary Goppa Codes and Reed Solomon Codes with Enhanced
Connectivity and Resiliency. Journal of Ambient Intelligence and Humanized
Computing, Springer, doi: 10.1007/s12652-020-01869-4,
2020. Impact factor: 4.594.
2019
50. Tapas Pal and Ratna Dutta.: Offline Witness Encryption
from Witness PRF and Randomized Encoding in CRS model, The 24th Australasian
Conference on Information Security and Privacy (ACISP), Christchurch, New
Zealand (2019)
51. Mriganka Mandal and Ratna Dutta: Efficient Identity-based
Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size
and Fast Decryption. In the Proceeding of the 15th International Conference on
Information Security and Cryptology (INSCRYPT 2019), LNCS, Springer-Verlag,
Nanjing, China, 2019
52. Meenakshi Kansal, Ratna Dutta and Sourav
Mukhopadhyay: Construction for a Nominative
Signature Scheme from Lattice with Enhanced Security, International Conference
on Codes, Cryptology And Information Security (C2SI
2019), Rabat - Morocco (2019)
53. Meenakshi Kansal, Ratna Dutta and Sourav
Mukhopadhyay: Group Signature from Lattices
preserving Forward Security in Dynamic setting. Advances in Mathematics of
Communications (AMC), American Institute of Mathematical Sciences, (accepted)
2019
54. Pratish Datta, Ratna
Dutta and Sourav Mukhopadhyay: "Succinct Predicate
and Online-Offline Multi-Input Inner Product Encryptions under Standard Static
Assumptions". Journal of Information Security and Applications, ELSEVIER,
Volume 48, October 2019
55. Pratish Datta, Ratna
Dutta and Sourav Mukhopadhyay: Constrained Pseudorandom
Functions for Turing Machines Revisited: How to Achieve Verifiability and Key
Delegation. Algorithmica, Springer, (accepted), 2019
56. Jayashree Dey and Ratna Dutta: Secure Key Encapsulation
Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava
Code. In the Proceeding of the 22th Annual International Conference on
Information Security and Cryptology (ICISC 2019), LNCS, Springer-Verlag, Seoul,
Korea, 2019
2018
57. Mriganka Mandal and Ratna Dutta: Efficient Adaptively
Secure Public-Key Trace and Revoke from Subset Cover Using Deja Q Framework. In
the Proceeding of the 14th International Conference on Information Security and
Cryptology (Inscrypt 2018), LNCS ,pp.
468-489, Springer-Verlag, Fuzhou, China, 2018
58. Pratish Datta, Ratna
Dutta and Sourav Mukhopadhyay: Functional Signcryption. Journal of Information Security and
Applications, Vol. 42, pp. 118-134, Elsevier, 2018.
59. Kamalesh Acharya and Ratna Dutta: Secure Constructions of
Multi-channel Broadcast Encryption Schemes in Public Key Framework. 17th International
Conference on Cryptology and Network Security (CANS 2018), LNCS,
Springer-Verlag, Naples (Italy), 2018.
60. Mriganka Mandal and Ratna Dutta.: Cost-Effective Private
Linear Key Agreement With Adaptive CCA Security from Prime
Order Multilinear Maps and Tracing Traitors. IACR Cryptology ePrint Archive 2018: 508 (2018), SECRYPT 2018 (accepted),
Porto, Portugal, 2018.
2017
61. Kamalesh Acharya, Ratna Dutta.: Recipient Revocable Broadcast
Encryption Schemes Without Random Oracles. In the Proceeding of the 20th
Annual International Conference on Information Security and Cryptology (ICISC
2017), LNCS 10779, pp. 191-213, Springer-Verlag, Seoul, Korea, 2017.
62. Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Constructions for Broadcast
Encryption with Personalized Messages. In the Proceeding of Eleventh International
Conference on Provable Security (ProvSec 2017) LNCS,
Springer-Verlag.
63. Y.Sreenivasa Rao and Ratna Dutta.: Computational Friendly Attribute-Based Encryptions
with Short Ciphertext. Theoretical
Computer Science (TCS) Journal, ELSEVIER, 2017 (Accepted).
64. Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Constrained Pseudorandom
Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key
Delegation. In the
Proceeding of 20th International Conference on the Theory and Practice of
Public-Key Cryptography (PKC 2017), LNCS,
Springer-Verlag.
65. Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Strongly Full-Hiding Inner
Product Encryption. Theoretical
Computer Science (TCS) Journal, ELSEVIER, 2017 (Accepted).
2016
66. Sumit Kumar Debnath and Ratna
Dutta.: New Realizations of Efficient and
Secure Private Set Intersection Protocols Preserving Fairness. In the Proceeding of the 19th Annual International Conference
on Information Security and Cryptology (ICISC 2016), LNCS,
Springer-Verlag.
67. Kamalesh Acharya and Ratna Dutta.: Adaptively Secure Broadcast Encryption with
Dealership. In the Proceeding of the 19th
Annual International Conference on Information Security and Cryptology (ICISC
2016), LNCS, Springer-Verlag.
68. Sumit Kumar Debnath and Ratna
Dutta.: Provably Secure Fair Mutual
Private Set Intersection Cardinality Utilizing Bloom Filter. In the Proceeding of the 12th International Conference on
Information Security and Cryptology (Inscrypt 2016), LNCS, Springer-Verlag.
69. Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Construction of Broadcast
Encryption with Dealership. In the Proceeding of Tenth International Conference
on Provable Security (ProvSec 2016) LNCS, Springer-Verlag.
70. Sumit Kumar Debnath and Ratna
Dutta.: How to Meet Big Data When Private
Set Intersection Realizes Constant Communication Complexity. In the Proceeding of the 18th IEEE International Conference on
Information and Communications Security (ICICS 2016), LNCS,
Springer-Verlag.
71. Y.Sreenivasa Rao and Ratna Dutta.: Bandwidth-Efficient
Attribute-Based Key-Insulated Signatures with Message Recovery. Information Sciences-Journal, ELSEVIER, 2016 (Accepted).
72.
Vandana
Guleria and Ratna Dutta.: Efficient Oblivious Transfer
with Adaptive Queries in UC Framework. Journal of Security and
Communication Networks, Wiley, 2016 (Accepted).
73.
Sumit Kumar Debnath and Ratna Dutta.: Towards Fair Mutual Private Set Intersection with
Linear Complexity. Journal
of Security and Communication Networks, Wiley, 2016
(Accepted).
74. Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Adaptively Secure
Unrestricted Attribute-Based Encryption with Subset Difference Revocation in
Bilinear Groups of Prime Order. In the Proceeding of 8th International Conference on
Cryptology, AFRICACRYPT
2016, LNCS, Springer-Verlag.
75. Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Functional Encryption for
Inner Product with Full Function Privacy. In the Proceeding of 19th International Conference
on the Theory and Practice of Public-Key Cryptography (PKC 2016), LNCS, Springer-Verlag.
2015
76.
Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure Anonymous
Spatial Encryption Under Affine Space Delegation Functionality Revisited. Journal of Information Security and Applications, ELSEVIER, 2015 (Accepted).
77.
Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: General Circuit Realizing Compact Attribute-Based
Encryption and Signcryption from Multilinear Maps. In the Proceeding of 16th International Conference
on Cryptology (Indocrypt 2015), LNCS, Springer-Verlag.
78. Sumit Kumar Debnath and Ratna
Dutta.: Efficient Private Set
Intersection Cardinality in the Presence of Malicious Adversaries. In the Proceeding of Ninth International Conference
on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.
79. Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Functional Signcryption: Notion, Construction, and Applications. In the Proceeding of Ninth International Conference
on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.
80.
Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure
Bandwidth-Efficient Anonymous Ciphertext-Policy Attribute Based Encryption. Journal of Security and Communication Networks, Wiley, 2015
(Accepted).
81.
Sumit Kumar Debnath and Ratna Dutta.: Secure and Efficient Private Set Intersection
Cardinality using Bloom Filter. In
the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag.
82.
Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: General Circuit Realizing Compact
Revocable Attribute-Based Encryption from Multilinear Maps. In the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag.
83.
Vandana
Guleria and Ratna Dutta.: Universally Composable Issuer-Free
Adaptive Oblivious Transfer with Access Policy.
Journal of Security and Communication Networks, Wiley, 2015 (Accepted).
84.
Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute-Based Signature and Signcryption Realizing Expressive Access Structures. International Journal of Information
Security, Springer, 2015 (accepted).
85.
Y.Sreenivasa Rao and Ratna Dutta.: Attribute Based Key-Insulated Signature for Boolean
Formula. International
Journal of Computer Mathematics, Taylor & Francis, 2015 (accepted).
86. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Fully Secure Online/Offline Predicate and
Attribute-Based Encryption. In
the Proceeding of the 11th Information Security Practice and
Experience Conference (ISPEC 2015), LNCS,
Springer-Verlag.
2014
87.
Vandana
Guleria and Ratna Dutta.: Universally Composable Identity Based Adaptive
Oblivious Transfer with Access Control. In
the Proceeding of the 10th International Conference on Information
Security and Cryptology (Inscrypt 2014), LNCS, Springer-Verlag.
88.
Vandana
Guleria and Ratna Dutta.: Issuer-Free Adaptive Oblivious Transfer with Access
Policy. In the Proceeding of the 17th Annual International
Conference on Information Security and Cryptology (ICISC 2014), LNCS,
Springer-Verlag.
89.
Sumit Kumar Debnath and Ratna Dutta.: A Fair and Efficient Mutual Private Set
Intersection Protocol from a Two-way Oblivious Pseudorandom Function. In the Proceeding of the 17th Annual International Conference on
Information Security and Cryptology (ICISC 2014), LNCS, Springer-Verlag.
90.
Vandana
Guleria and Ratna Dutta.: Efficient Adaptive Oblivious Transfer without
q-type Assumptions in UC Framework. In the Proceeding of the
16th International Conference on Information and Communications Security (ICICS 2014), LNCS,
Springer-Verlag.
91.
Y.Sreenivasa Rao and Ratna Dutta.: Attribute
Based Key-Insulated Signatures with Message Recovery. In the Proceeding of the 16th International Conference on
Information and Communications Security (ICICS 2014), LNCS, Springer-Verlag.
92.
Vandana
Guleria and Ratna Dutta.: Adaptive Oblivious Transfer with Hidden Access
Policy Realizing Disjunction. In the Proceeding of the
11th International Conference on Security and Cryptography (SECRYPT
2014), LNCS, Springer-Verlag.
93.
Vandana
Guleria and Ratna Dutta.: Lightweight Universally Composable Adaptive
Oblivious Transfer. In the Proceeding of the 8th International Conference
on Network and System Security (NSS 2014), LNCS,
Springer-Verlag.
94.
Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Universally Composable Efficient Priced Oblivious Transfer from a
Flexible Membership Encryption. In the Proceeding of Information
Security, the Seventeenth International Conference (ISC 2014), LNCS, Springer-Verlag.
95.
Y.Sreenivasa Rao and Ratna Dutta.: Expressive Bandwidth-Efficient Attribute Based
Signature and Signcryption. In the Proceeding of 19th Australasian Conference
on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.
96.
Pratish Datta, Ratna Dutta and
Sourav Mukhopadhyay.: Universally Composable Efficient Priced Oblivious Transfer from a
Flexible Membership Encryption. In the Proceeding of 19th Australasian Conference
on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.
97.
Y.Sreenivasa Rao and Ratna Dutta.: Expressive
Attribute Based Signcryption with Constant-Size
Ciphertext. In the Proceeding of 7th
International
Conference on the Theory and Applications of Cryptology (Africacrypt
2014), LNCS, Springer-Verlag.
98.
Vandana
Guleria and Ratna Dutta.: Efficient Adaptive Oblivious Transfer in UC
Framework. In the Proceeding of the 10th
Information Security Practice and Experience Conference (ISPEC
2014), LNCS, Springer-Verlag.
99. Sarbari Mitra, Sourav
Mukhopadhyay and Ratna Dutta.: A deterministic key pre-distribution scheme for WSN
using projective planes and their complements. International
Journal of Trust Management in Computing and
Communications (IJTMCC), 2014.
100.
Y.Sreenivasa Rao and Ratna Dutta.: Dynamic Ciphertext-Policy
Attribute-Based Encryption for Expressive Access Policy. In the Proceeding of 10th International
Conference on Distributed Computing and Internet Technology (ICDCIT 2014) LNCS, Springer-Verlag.
2013
101.
Y.Sreenivasa Rao and Ratna Dutta.:
Computationally Efficient Expressive Key-Policy Attribute Based Encryption
Schemes with Constant-Size Ciphertext. In the Proceeding of 15th International
Conference on Information and Communications Security (ICICS 2013) LNCS,
Springer-Verlag.
102.
Y.Sreenivasa Rao and Ratna Dutta.: Computationally
Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. In the Proceeding of
Seventh International Conference on Provable Security (ProvSec
2013) LNCS, Springer-Verlag.
103.
Y.Sreenivasa Rao and Ratna Dutta.: Recipient
Anonymous Ciphertext-Policy Attribute Based Encryption. In the Proceeding of 9th
International Conference on Information Systems Security (ICISS 2013) LNCS,
Springer-Verlag.
104.
Y.Sreenivasa Rao and Ratna Dutta.: Decentralized
Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. In the Proceeding of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia
Security (CMS 2013), LNCS, Springer-Verlag.
105.
Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute Based Access Control Mechanism
for Vehicular Ad Hoc Network, In the Proceeding of 7th International
Conference on Network and System Security (NSS 2013), LNCS, Springer-Verlag.
106.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna
Dutta.: Key Pre-Distribution in a Non-Uniform
Rectangular Grid for Wireless Sensor Networks. Journal
of Applied Mathematics and Computing, Springer, 2013.
107.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna
Dutta.: Unconditionally-Secure Key
Pre-Distribution for Triangular Grid Based Wireless Sensor Network. Journal
of Applied Mathematics and Computing, Springer, 2013.
108.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna
Dutta.: Unconditionally
Secure Fully Connected Key Establishment using Deployment Knowledge, In the Proceeding of AsiaARES
2013, LNCS, Springer-Verlag, 2013.
2012
109.
Y.Sreenivasa Rao and Ratna Dutta.: Computationally
Efficient Secure Access Control for Vehicular Ad Hoc Networks, In the Proceeding of
eighth International Conference on Information Systems Security (ICISS 2012), LNCS, Springer-Verlag.
110.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna
Dutta.: Flexible Deterministic Approach
to Key Pre-Distribution in Grid Based WSN, In Proceeding of ADHOCNETS
2012, LNICST (Springer Lecture Notes of ICST).
111.
Ratna Dutta.: Anti-Collusive Self-Healing Key Distributions for Wireless Networks, International Journal of Wireless
and Mobile Computing (IJWMC), Editor-in-Chief:
Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.
112.
Sarbari Mitra, Sourav Mukhopadhyay and Ratna
Dutta.: A Group-Based Deterministic Key Predistribution
Scheme for Wireless Sensor Network, International
Journal of Wireless and Mobile Computing (IJWMC), Editor-in-Chief:
Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.
113.
Ratna Dutta and Sugata Sanyal.: Collusion Resistant Self-Healing Key Distribution
in Mobile Wireless Networks, International Journal of Wireless
and Mobile Computing (IJWMC), Editor-in-Chief: Zhihua
Cui; Vol.1, Nos. 1/2/3,2012; ISSN (Online): 1741-1092; ISSN (Print): 1741-1084.
2011
114.
Ratna Dutta.: Access Polynomial Based Self-Healing Key
Distribution with Improved Security and Performance, In Proceeding of InfoSecHiComNet 2011, LNCS, Springer-Verlag.
115.
Sarbari Mitra, Ratna Dutta and
Sourav Mukhopadhyay.: A Hierarchical Deterministic
Key Predistribution for WSN Using Projective Planes, In Proceeding of ADHOCNETS 2011, LNICST (Springer Lecture Notes of ICST).
116.
Ratna Dutta, Sourav Mukhopadhyay
and Dheerendra Mishra.: Access Policy Based Key Management in Multi-Level Multi-Distributor DRM
Architecture, In
Proceeding of InfoSecHiComNet
2011, LNCS, Springer-Verlag.
117.
Sarbari Mitra, Ratna Dutta and
Sourav Mukhopadhyay.: Towards a Deterministic
Hierarchical Key Predistribution for WSN Using
Complementary Fano Plane, In Proceeding of SecureComm
2011, LNICST (Springer Lecture Notes of ICST).
118.
Ratna Dutta, Dheerendra
Mishra and Sourav Mukhopadhyay.: Vector Space Access
Structure and ID based Distributed DRM Key Management, In proceedings of ID 2011, LNCS,
Springer-Verlag.
119.
Ratna Dutta and Tom Dowling.: Provably secure hybrid key agreement protocols in
cluster-based wireless ad hoc networks, International Journal of Ad Hoc Networks 9(5): 767-787 (2011).
2010-2009
120.
Ratna Dutta, Sourav Mukhopadhyay,
Martin Collier.: Computationally secure
self-healing key distribution with revocation in wireless ad hoc networks. International Journal of Ad Hoc Networks 8(6): 597-613 (2010).
121.
Ratna Dutta, Tom Dowling.: Secure and Efficient Group Key Agreements for
Cluster Based Networks. International
Journal of Transactions on Computational Science 4: 87-116 (2009).
122.
Ratna Dutta, Sourav
Mukhopadhyay, and Tom Dowling.: Key Management in
Multi-Distributor based DRM System with Mobile Clients using IBE, IEEE Conference on the
Applications of Digital Information and Web Technologies (ICADIWT 2009), August
2009.
123.
Ratna Dutta, Sourav
Mukhopadhyay, and Tom Dowling. : Trade-Off between Collusion Resistance and User
Life Cycle in Self-Healing Key Distributions with t-Revocation, IEEE Conference on the
Applications of Digital Information and Web Technologies (ICADIWT 2009), August
2009.
124.
Ratna Dutta, Sourav Mukhopadhyay
and Tom Dowling.: Enhanced Access Polynomial Based
Self-Healing Key Distribution, ICST International Workshop on Security in Emerging Wireless
Communication and Networking Systems (SEWCN09). LNICST (Springer Lecture Notes of
ICST), September 2009.
125.
Ratna Dutta, Sourav Mukhopadhyay
and Tom Dowling.: Generalized Self-Healing Key
Distribution in Wireless Ad hoc Networks with Trade-Offs in Users Pre-Arranged
Life Cycle and Collusion Resistance, 5th ACM International Symposium on QoS and Security for Wireless and
Mobile Networks (Q2SWinet 2009), ACM Press, October 2009.
2008-2007
126.
Ratna Dutta and Rana Barua.: Provably Secure Constant Round Contributory Group
Key Agreement in Dynamic Setting, International
Journal of IEEE Transactions on Information Theory (IEEE-IT), Vol. 54, No. 5, pp.
2007-2025, May 2008.
127.
Ratna Dutta, Sourav
Mukhopadhyay, Amitabha Das and Sabu Emmanuel.: Generalized Self-Healing Key Distribution using Vector Space Access
Structure. In
proceedings of IFIP Networking 2008, LNCS 4982, pp. 612-623,
Springer-Verlag 2008.
128.
Ratna Dutta, Sourav Mukhopadhyay
and Sabu Emmanuel.: Low Bandwidth Self-Healing
Key Distribution in Wireless Ad Hoc Network. In proceeding of the IEEE Asia
International Conference on Modelling and Simulation (AMS 2008), pp. 867-872,
IEEE Computer Society Press, 2008.
129.
Ratna Dutta,:
Converting Group Key Agreement
Protocol into Password-Based Setting - Case Study. Journal
of Computers, ISSN
1796-203X, Vol. 12, No. 2, pp. 26-33, Academy Publisher, October 2007.
130.
Ratna Dutta, Chang Ee-Chien and Sourav Mukhopadhyay.: Efficient Self-Healing Key Distributions with Revocation for Wireless
Sensor Network using One Way Key Chains. In proceedings of ACNS 2007, LNCS 4521,
pp. 385-400, Springer-Verlag, 2007.
131.
Ratna Dutta and Sourav
Mukhopadhyay.: Improved Self-Healing Key
Distribution with Revocation in Wireless Sensor Network. In proceeding of the IEEE
Wireless Communications and Networking Conference (WCNC 2007) - Networking,
IEEE Communications Society Press, 2007.
132.
Ratna Dutta and Sourav
Mukhopadhyay.: Designing Scalable Self-Healing
Key Distribution Schemes with Revocation Capability. In proceedings of ISPA 2007, LNCS 4742, pp.
419-430, Springer-Verlag, 2007.
133.
Ratna Dutta.: Multi-Party Key Agreement in Password-Based
Setting. In
proceeding of the IEEE Asia International Conference on Modelling and
Simulation (AMS 2007), pp. 133-138, IEEE Computer Society Press, 2007.
134.
Ratna Dutta: Overcome Weakness of a Password-Based Group Key
Agreement Protocol. In
proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC
2007), pp. 469-474, IEEE Computer Society and Communications Society Press,
2007.
135.
Ratna Dutta and Sourav
Mukhopadhyay.: Constant Storage Self-Healing Key
Distribution with Revocation in Wireless Sensor Network. In proceeding of the IEEE
International Conference on Communications (ICC 2007), IEEE Communications
Society Press, 2007.
2006 and before
136.
Ratna Dutta and Rana Barua.: Password-Based Encrypted Group Key Agreement. In the International Journal of Network Security (IJNS), Vol.3, No.1, pp. 23-34, July
2006.
137.
Ratna Dutta and Rana Barua,: Dynamic Group Key Agreement
in Tree-Based Setting. In proceedings of ACISP 2005, LNCS 3574, pp. 101-112,
Springer-Verlag, 2005.
138.
Ratna Dutta and Rana Barua.: Constant Round Dynamic Group Key Agreement. In proceedings of ISC
2005, LNCS 3650, pp. 74-88, Springer-Verlag, 2005.
139.
Ratna Dutta, Rana Barua and
Palash Sarkar.: Provably Secure Authenticated
Tree Based Group Key Agreement. In proceedings of ICICS 2004, LNCS 3269, pp. 92-104, Springer-Verlag
2004.
140.
Rana Barua, Ratna Dutta, Palash Sarkar.: Extending Joux's Protocol
to Multi Party Key Agreement (Extended Abstract). In proceedings of INDOCRYPT
2003, LNCS 2904, pp. 205-217, Springer-Verlag 2003.