Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Ratna Dutta - MaRDI portal

Ratna Dutta

From MaRDI portal
Person:511915

Available identifiers

zbMath Open dutta.ratnaWikidataQ102344357 ScholiaQ102344357MaRDI QIDQ511915

List of research outcomes

PublicationDate of PublicationType
Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting2024-03-28Paper
Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework2023-06-28Paper
Key-oblivious encryption from isogenies with application to accountable tracing signatures2023-05-12Paper
Short attribute-based signatures for arbitrary Turing machines from standard assumptions2023-04-28Paper
Fully secure unbounded zero inner product encryption with short ciphertexts and keys2023-04-13Paper
Identification scheme and forward-secure signature in identity-based setting from isogenies2023-04-13Paper
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF2023-04-13Paper
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption2023-04-13Paper
Chosen-Ciphertext Secure Multi-identity and Multi-attribute Pure FHE2023-03-22Paper
Semi-adaptively secure offline witness encryption from puncturable witness PRF2023-03-21Paper
Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression2022-11-09Paper
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption2022-10-14Paper
Attribute-based access control for inner product functional encryption from LWE2022-06-15Paper
Group signature from lattices preserving forward security in dynamic setting2020-11-07Paper
Secure key encapsulation mechanism with compact ciphertext and public key from generalized Srivastava code2020-07-08Paper
Offline witness encryption from witness PRF and randomized encoding in CRS model2020-05-27Paper
Bandwidth-efficient attribute-based key-insulated signatures with message recovery2020-01-06Paper
Efficient adaptively secure Public-Key Trace and revoke from subset cover using Déjà Q framework2019-10-31Paper
Construction for a nominative signature scheme from lattice with enhanced security2019-10-14Paper
Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation2019-08-20Paper
Fully secure online/offline predicate and attribute-based encryption2018-12-07Paper
Provable secure constructions for broadcast encryption with personalized messages2018-11-07Paper
How to meet big data when private set intersection realizes constant communication complexity2018-10-26Paper
Secure and efficient private set intersection cardinality using Bloom filter2018-10-18Paper
General circuit realizing compact revocable attribute-based encryption from multilinear maps2018-10-18Paper
Recipient revocable broadcast encryption schemes without random oracles2018-06-15Paper
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation2017-06-13Paper
Adaptively Secure Broadcast Encryption with Dealership2017-05-19Paper
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness2017-05-19Paper
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter2017-05-05Paper
Computational friendly attribute-based encryptions with short ciphertext2017-02-27Paper
Strongly full-hiding inner product encryption2017-02-22Paper
Secure and Efficient Construction of Broadcast Encryption with Dealership2017-01-06Paper
Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework2016-12-19Paper
Attribute Based Key-Insulated Signatures with Message Recovery2016-12-19Paper
Attribute-based key-insulated signature for boolean formula2016-07-19Paper
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order2016-06-22Paper
Functional Encryption for Inner Product with Full Function Privacy2016-04-13Paper
Functional Signcryption: Notion, Construction, and Applications2016-01-27Paper
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries2016-01-27Paper
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps2016-01-12Paper
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control2015-11-25Paper
Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups2015-11-03Paper
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function2015-09-11Paper
Issuer-Free Adaptive Oblivious Transfer with Access Policy2015-09-11Paper
Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext2014-09-29Paper
Unconditionally-secure key pre-distribution for triangular grid based wireless sensor network2014-08-05Paper
Key pre-distribution in a non-uniform rectangular grid for wireless sensor networks2014-08-05Paper
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption2014-07-24Paper
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model2014-07-24Paper
Expressive Attribute Based Signcryption with Constant-Size Ciphertext2014-06-24Paper
Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network2014-03-11Paper
Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext2013-10-23Paper
Secure and Efficient Group Key Agreements for Cluster Based Networks2009-05-12Paper
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains2009-03-10Paper
Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting2009-02-24Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Information Security2006-10-20Paper
Information Security and Privacy2006-06-22Paper
Information and Communications Security2005-08-19Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ratna Dutta