What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ratna Dutta
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/provsec
Quantum Safe Computation-Friendly Identity-Binding Password Authenticated Key Exchange.
Pratima Jana
Ratna Dutta
Cong Zuo
2024
conf/iwsec
Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.
Anushree Belel
Ratna Dutta
2024
conf/cans
Compact Adaptor Signature from Isogenies with Enhanced Security.
Pratima Jana
Surbhi Shaw
Ratna Dutta
2023
journals/istr
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things.
Surbhi Shaw
Ratna Dutta
2023
conf/icisc
Compact Identity-Based Signature and Puncturable Signature from SQISign.
Surbhi Shaw
Ratna Dutta
2023
conf/cans
Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys.
Surbhi Shaw
Ratna Dutta
2022
journals/istr
Post-quantum secure identity-based signature achieving forward secrecy.
Surbhi Shaw
Ratna Dutta
2021
journals/istr
Identity-based outsider anonymous cloud data outsourcing with simultaneous individual transmission for IoT environment.
Mriganka Mandal
Ratna Dutta
2021
journals/istr
Constructing provable secure broadcast encryption scheme with dealership.
Kamalesh Acharya
Ratna Dutta
2021
conf/latincrypt
Attribute-Based Access Control for Inner Product Functional Encryption from LWE.
Tapas Pal
Ratna Dutta
2021
conf/acisp
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF.
Tapas Pal
Ratna Dutta
2021
conf/acisp
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption.
Tapas Pal
Ratna Dutta
2021
conf/provsec
Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies.
Surbhi Shaw
Ratna Dutta
2021
conf/provsec
Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys.
Subhranil Dutta
Tapas Pal
Ratna Dutta
2020
conf/provsec
Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF.
Tapas Pal
Ratna Dutta
2020
conf/africacrypt
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression.
Meenakshi Kansal
Ratna Dutta
2020
conf/cans
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE.
Tapas Pal
Ratna Dutta
2019
journals/istr
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2019
conf/acisp
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model.
Tapas Pal
Ratna Dutta
2019
conf/icisc
Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code.
Jayashree Dey
Ratna Dutta
2018
journals/istr
Functional Signcryption.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2018
conf/cans
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework.
Kamalesh Acharya
Ratna Dutta
2017
conf/icisc
Recipient Revocable Broadcast Encryption Schemes Without Random Oracles.
Kamalesh Acharya
Ratna Dutta
2017
conf/provsec
Provable Secure Constructions for Broadcast Encryption with Personalized Messages.
Kamalesh Acharya
Ratna Dutta
2017
conf/pkc
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2016
conf/icisc
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness.
Sumit Kumar Debnath
Ratna Dutta
2016
conf/icisc
Adaptively Secure Broadcast Encryption with Dealership.
Kamalesh Acharya
Ratna Dutta
2016
conf/provsec
Secure and Efficient Construction of Broadcast Encryption with Dealership.
Kamalesh Acharya
Ratna Dutta
2016
conf/pkc
Functional Encryption for Inner Product with Full Function Privacy.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2016
conf/icics
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity.
Sumit Kumar Debnath
Ratna Dutta
2016
conf/africacrypt
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2015
journals/istr
Fully secure anonymous spatial encryption under affine space delegation functionality revisited.
Y. Sreenivasa Rao
Ratna Dutta
2015
conf/provsec
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries.
Sumit Kumar Debnath
Ratna Dutta
2015
conf/provsec
Functional Signcryption: Notion, Construction, and Applications.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2014
conf/acisp
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model.
Y. Sreenivasa Rao
Ratna Dutta
2014
conf/acisp
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
Pratish Datta
Ratna Dutta
Sourav Mukhopadhyay
2014
conf/icisc
Issuer-Free Adaptive Oblivious Transfer with Access Policy.
Vandana Guleria
Ratna Dutta
2014
conf/icisc
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.
Sumit Kumar Debnath
Ratna Dutta
2014
conf/icics
Attribute Based Key-Insulated Signatures with Message Recovery.
Y. Sreenivasa Rao
Ratna Dutta
2014
conf/icics
Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework.
Vandana Guleria
Ratna Dutta
2014
conf/africacrypt
Expressive Attribute Based Signcryption with Constant-Size Ciphertext.
Y. Sreenivasa Rao
Ratna Dutta
2013
conf/provsec
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.
Y. Sreenivasa Rao
Ratna Dutta
2013
conf/iciss
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption.
Y. Sreenivasa Rao
Ratna Dutta
2013
conf/icics
Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext.
Y. Sreenivasa Rao
Ratna Dutta
2012
conf/iciss
Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks.
Y. Sreenivasa Rao
Ratna Dutta
2007
conf/acns
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains.
Ratna Dutta
Ee-Chien Chang
Sourav Mukhopadhyay
2005
conf/acisp
Dynamic Group Key Agreement in Tree-Based Setting.
Ratna Dutta
Rana Barua
2004
conf/icics
Provably Secure Authenticated Tree Based Group Key Agreement.
Ratna Dutta
Rana Barua
Palash Sarkar
Coauthors
Anushree Belel
(1)
Cong Zuo
(1)
Ee-Chien Chang
(1)
Jayashree Dey
(1)
Kamalesh Acharya
(6)
Meenakshi Kansal
(1)
Mriganka Mandal
(1)
Palash Sarkar
(1)
Pratima Jana
(2)
Pratish Datta
(7)
Rana Barua
(2)
Ratna Dutta
(48)
Sourav Mukhopadhyay
(8)
Subhranil Dutta
(1)
Sumit Kumar Debnath
(4)
Surbhi Shaw
(6)
Tapas Pal
(7)
Vandana Guleria
(2)
Y. Sreenivasa Rao
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to