List of Publications

 
Journal/Conferences

All the papers below have appeared in refereed journals or refereed conference proceedings. Lecture Notes in Computer Science (LNCS) is a book series published by Springer-Verlag and IEEE conference proceedings are published by IEEE Computer Society.

 

2021

 

1.     Surbhi Shaw and Ratna Dutta: Key-oblivious encryption from isogenies with application to accountable tracing signature. In the Proceeding of 22nd International Conference on Cryptology in India (Indocrypt 2021), LNCS, Springer-Verlag (to appear).

2.     Surbhi Shaw and Ratna Dutta: Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies. In the Proceedings of the 15th International Conference on Provable and Practical Security (ProvSec 2021), LNCS , Springer-Verlag, Guangzhou, China, 5 - 8 November, 2021 (Accepted).

3.     Subhranil Dutta, Tapas Pal and Ratna Dutta: Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys. In the Proceedings of the 15th International Conference on Provable and Practical Security (ProvSec 2021), LNCS , Springer-Verlag, Guangzhou, China, 5 - 8 November, 2021 (Accepted).

4.     Ratna Dutta, Sumit Kumar Debnath and Chinmoy Biswas: Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. In the Proceeding of the 18th International Conference on Security and Cryptography (SECRYPT 2021), July 6-8, 2021 (Accepted).

5.     Tapas Pal and Ratna Dutta: CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption. In the Proceedings of the 26th Australasian Conference on Information Security and Privacy (ACISP 2021), LNCS , pp. , Springer-Verlag, Perth, Australia, December 1-3, 2021 (Accepted).

6.     Tapas Pal and Ratna Dutta: Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. In the Proceedings of the 26th Australasian Conference on Information Security and Privacy (ACISP 2021), LNCS , pp. , Springer-Verlag, Perth, Australia, December 1-3, 2021 (Accepted).

7.     Amit Kumar Singh, Meenakshi Kansal and Ratna Dutta: Efficient Multi-Signature Scheme using Lattice. The Computer Journal, Oxford Academic, May 2021 (Accepted) Impact factor: 1.077

8.     Tapas Pal and Ratna Dutta: Non-zero Inner Product Encryption: Unrestricted Message Space and Chosen Ciphertext Security. In the Proceeding of the 18th International Conference on Security and Cryptography (SECRYPT 2021), July 6-8, 2021 (Accepted).

9.     Mriganka Mandal and Ratna Dutta: Identity-Based Outsider Anonymous Cloud Data Outsourcing with Simultaneous Individual Transmission for IoT Environment. Journal of Information Security and Applications, ELSEVIER, May 2021 (Accepted). Impact factor: 2.327

10.  Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay: Lattice based Nominative Signature using Pseudorandom Function. IET Information Security,  Wiley, Mar 2021 (Accepted).

11.  Chinmoy Biswas and Ratna Dutta: Dynamic Multi-Key FHE in Symmetric Key Setting from LWE without using Common Reference Matrix.  Journal of Ambient Intelligence and Humanized Computing, Springer, Jan 2021 (Accepted)

2020

 

12.  Tapas Pal and Ratna Dutta: Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE. In the Proceeding of the 19th International Conference on Cryptology and Network Security (CANS 2020), LNCS 12579, pp. 387-408, Vienna, Austria, 2020.

13.  Tapas Pal and Ratna Dutta: Semi-Adaptively Secure Offline Witness Encryption from Puncturable Witness PRF. In the Proceeding of the 14th International Conference on Provable and Practical Security (Provsec 2020, accepted), LNCS 12505, pp. 169-189,  Singapore, 2020.

14.  Meenakshi Kansal and Ratna Dutta: Round Optimal Secure Multisignature Schemes from Lattice with Public Key Aggregation and Signature Compression. In the Proceeding of the 12th International Conference on Cryptology, AFRICACRYPT 2020, LNCS 12174, pp. 281-300,  Springer-Verlag, Cairo, Egypt, 2020.

15.  Kamalesh Acharya and Ratna Dutta: Constructing Provable Secure Broadcast Encryption Scheme with Dealership. Journal of Information Security and Applications, ELSEVIER, Dec 2020 (Accepted).

16.  Kamalesh Acharya and Ratna Dutta: Ternary Subset Difference Revocation in Public Key Framework Supporting Outsider Anonymity. Journal of Ambient Intelligence and Humanized Computing, Springer, doi: 10.1007/s12652-020-02319-x, 2020. Impact factor: 4.594

17.  Chinmoy Biswas and Ratna Dutta: Implementation of Key Predistribution Scheme in WSN based on Binary Goppa Codes and Reed Solomon Codes with Enhanced Connectivity and Resiliency. Journal of Ambient Intelligence and Humanized Computing, Springer, doi: 10.1007/s12652-020-01869-4, 2020. Impact factor: 4.594.

2019

 

18.  Tapas Pal and  Ratna Dutta.: Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model, The 24th Australasian Conference on Information Security and Privacy (ACISP), Christchurch, New Zealand (2019)

19.  Mriganka Mandal and Ratna Dutta: Efficient Identity-based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. In the Proceeding of the 15th International Conference on Information Security and Cryptology (INSCRYPT 2019), LNCS, Springer-Verlag, Nanjing, China, 2019

20.  Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay: Construction for a Nominative Signature Scheme from Lattice with Enhanced Security, International Conference on Codes, Cryptology And Information Security (C2SI 2019), Rabat - Morocco (2019)

21.  Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay: Group Signature from Lattices preserving Forward Security in Dynamic setting.  Advances in Mathematics of Communications (AMC), American Institute of Mathematical Sciences, (accepted) 2019

22.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay: "Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions". Journal of Information Security and Applications, ELSEVIER, Volume 48, October 2019

23.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay: Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation. Algorithmica, Springer, (accepted), 2019

24.  Jayashree Dey and Ratna Dutta: Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava Code. In the Proceeding of the 22th Annual International Conference on Information Security and Cryptology (ICISC 2019), LNCS, Springer-Verlag, Seoul, Korea, 2019

2018

25.  Mriganka Mandal and Ratna Dutta: Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Deja Q Framework. In the Proceeding of the 14th International Conference on Information Security and Cryptology (Inscrypt 2018), LNCS ,pp. 468-489, Springer-Verlag, Fuzhou, China, 2018

26.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay: Functional Signcryption. Journal of Information Security and Applications, Vol. 42, pp. 118-134,  Elsevier, 2018.

27.  Kamalesh Acharya and Ratna Dutta: Secure Constructions of Multi-channel Broadcast Encryption Schemes in Public Key Framework. 17th International Conference on Cryptology And Network Security (CANS 2018),  LNCS, Springer-Verlag, Naples (Italy), 2018.

28.  Mriganka Mandal and Ratna Dutta.: Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors. IACR Cryptology ePrint Archive 2018: 508 (2018), SECRYPT 2018 (accepted), Porto, Portugal, 2018.

2017

29.  Kamalesh Acharya, Ratna Dutta.: Recipient Revocable Broadcast Encryption Schemes Without Random Oracles. In the Proceeding of the 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), LNCS 10779,  pp. 191-213, Springer-Verlag, Seoul, Korea, 2017.

30.  Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Constructions for Broadcast Encryption with Personalized Messages. In the Proceeding of Eleventh International Conference on Provable Security (ProvSec 2017) LNCS, Springer-Verlag.

31.  Y.Sreenivasa Rao and Ratna Dutta.: Computational Friendly Attribute-Based Encryptions with Short Ciphertext. Theoretical Computer Science (TCS) Journal, ELSEVIER, 2017 (Accepted).

32.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. In the Proceeding of 20th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2017), LNCS, Springer-Verlag.

33. Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Strongly Full-Hiding Inner Product Encryption. Theoretical Computer Science (TCS) Journal, ELSEVIER, 2017 (Accepted).

2016

 

34.  Sumit Kumar Debnath and Ratna Dutta.: New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness. In the Proceeding of the 19th Annual International Conference on Information Security and Cryptology (ICISC 2016), LNCS, Springer-Verlag.

35.  Kamalesh Acharya and Ratna Dutta.: Adaptively Secure Broadcast Encryption with Dealership. In the Proceeding of the 19th Annual International Conference on Information Security and Cryptology (ICISC 2016), LNCS, Springer-Verlag.

36.  Sumit Kumar Debnath and Ratna Dutta.: Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter. In the Proceeding of the 12th International Conference on Information Security and Cryptology (Inscrypt 2016), LNCS, Springer-Verlag.

37.  Kamalesh Acharya and Ratna Dutta.: Secure and Efficient Construction of Broadcast Encryption with Dealership. In the Proceeding of Tenth International Conference on Provable Security (ProvSec 2016) LNCS, Springer-Verlag.

38.  Sumit Kumar Debnath and Ratna Dutta.: How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. In the Proceeding of the 18th IEEE International Conference on Information and Communications Security (ICICS 2016), LNCS, Springer-Verlag.

39.  Y.Sreenivasa Rao and Ratna Dutta.: Bandwidth-Efficient Attribute-Based Key-Insulated Signatures with Message Recovery. Information Sciences-Journal, ELSEVIER, 2016 (Accepted).

40.  Vandana Guleria and Ratna Dutta.: Efficient Oblivious Transfer with Adaptive Queries in UC Framework. Journal of Security and Communication Networks, Wiley, 2016 (Accepted).

41.  Sumit Kumar Debnath and Ratna Dutta.: Towards Fair Mutual Private Set Intersection with Linear Complexity. Journal of Security and Communication Networks, Wiley, 2016 (Accepted).

42.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order. In the Proceeding of 8th International Conference on Cryptology, AFRICACRYPT 2016, LNCS, Springer-Verlag.

43.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Functional Encryption for Inner Product with Full Function Privacy. In the Proceeding of 19th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), LNCS, Springer-Verlag.

2015

 

44.  Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure Anonymous Spatial Encryption Under Affine Space Delegation Functionality Revisited. Journal of Information Security and Applications, ELSEVIER, 2015 (Accepted).

45.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: General Circuit Realizing Compact Attribute-Based Encryption and Signcryption from Multilinear Maps. In the Proceeding of 16th International Conference on Cryptology (Indocrypt 2015), LNCS, Springer-Verlag.

46.  Sumit Kumar Debnath and Ratna Dutta.: Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries. In the Proceeding of Ninth International Conference on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.

47.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Functional Signcryption: Notion, Construction, and Applications. In the Proceeding of Ninth International Conference on Provable Security (ProvSec 2015) LNCS, Springer-Verlag.

48.  Y.Sreenivasa Rao and Ratna Dutta.: Fully Secure Bandwidth-Efficient Anonymous Ciphertext-Policy Attribute Based Encryption. Journal of Security and Communication Networks, Wiley, 2015 (Accepted).

49.  Sumit Kumar Debnath and Ratna Dutta.: Secure and Efficient Private Set Intersection Cardinality using Bloom Filter. In the Proceeding of the 18th Information Security Conference (ISC 2015), LNCS, Springer-Verlag.

50.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps. In the Proceeding of the 18th  Information Security Conference (ISC 2015), LNCS, Springer-Verlag.

51.  Vandana Guleria and Ratna Dutta.: Universally Composable Issuer-Free Adaptive Oblivious Transfer with Access Policy. Journal of Security and Communication Networks, Wiley, 2015 (Accepted).

52.  Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute-Based Signature and Signcryption Realizing Expressive Access Structures. International Journal of Information Security, Springer, 2015 (accepted).

53.  Y.Sreenivasa Rao and Ratna Dutta.: Attribute Based Key-Insulated Signature for Boolean Formula. International Journal of Computer Mathematics, Taylor & Francis, 2015 (accepted).

54.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Fully Secure Online/Offline Predicate and Attribute-Based Encryption. In the Proceeding of the 11th Information Security Practice and Experience Conference (ISPEC 2015), LNCS, Springer-Verlag.

2014

 

55.  Vandana Guleria and Ratna Dutta.: Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control. In the Proceeding of the 10th International Conference on Information Security and Cryptology (Inscrypt 2014), LNCS, Springer-Verlag.

56.  Vandana Guleria and Ratna Dutta.: Issuer-Free Adaptive Oblivious Transfer with Access Policy. In the Proceeding of the 17th Annual International Conference on Information Security and Cryptology (ICISC 2014), LNCS, Springer-Verlag.

57.  Sumit Kumar Debnath and Ratna Dutta.: A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-way Oblivious Pseudorandom Function. In the Proceeding of the 17th Annual International Conference on Information Security and Cryptology (ICISC 2014), LNCS, Springer-Verlag.

58.  Vandana Guleria and Ratna Dutta.: Efficient Adaptive Oblivious Transfer without q-type Assumptions in UC Framework. In the Proceeding of the 16th International Conference on Information and Communications Security (ICICS 2014), LNCS, Springer-Verlag.

59.  Y.Sreenivasa Rao and Ratna Dutta.: Attribute Based Key-Insulated Signatures with Message Recovery. In the Proceeding of the 16th International Conference on Information and Communications Security (ICICS 2014), LNCS, Springer-Verlag.

60.  Vandana Guleria and Ratna Dutta.: Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. In the Proceeding of the 11th International Conference on Security and Cryptography (SECRYPT 2014), LNCS, Springer-Verlag.

61.  Vandana Guleria and Ratna Dutta.: Lightweight Universally Composable Adaptive Oblivious Transfer. In the Proceeding of the 8th International Conference on Network and System Security (NSS 2014), LNCS, Springer-Verlag.

62.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. In the Proceeding of Information Security, the Seventeenth International Conference (ISC 2014), LNCS, Springer-Verlag.

63.  Y.Sreenivasa Rao and Ratna Dutta.: Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption. In the Proceeding of 19th Australasian Conference on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.

64.  Pratish Datta, Ratna Dutta and Sourav Mukhopadhyay.: Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. In the Proceeding of 19th Australasian Conference on Information Security and Privacy (ACISP 2014), LNCS, Springer-Verlag.

65.  Y.Sreenivasa Rao and Ratna Dutta.: Expressive Attribute Based Signcryption with Constant-Size Ciphertext. In the Proceeding of 7th International Conference on the Theory and Applications of Cryptology (Africacrypt 2014), LNCS, Springer-Verlag.

66.  Vandana Guleria and Ratna Dutta.: Efficient Adaptive Oblivious Transfer in UC Framework. In the Proceeding of the 10th Information Security Practice and Experience Conference (ISPEC 2014), LNCS, Springer-Verlag.

67.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: A deterministic key pre-distribution scheme for WSN using projective planes and their complements. International Journal of Trust Management in Computing and Communications (IJTMCC), 2014.

68.  Y.Sreenivasa Rao and Ratna Dutta.: Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy. In the Proceeding of 10th International Conference on Distributed Computing and Internet Technology (ICDCIT 2014) LNCS, Springer-Verlag.

2013

 

69.  Y.Sreenivasa Rao and Ratna Dutta.: Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext. In the Proceeding of 15th International Conference on Information and Communications Security (ICICS  2013) LNCS, Springer-Verlag.

70.  Y.Sreenivasa Rao and Ratna Dutta.: Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext. In the Proceeding of Seventh International Conference on Provable Security (ProvSec 2013) LNCS, Springer-Verlag.

71.  Y.Sreenivasa Rao and Ratna Dutta.: Recipient Anonymous Ciphertext-Policy Attribute Based Encryption. In the Proceeding of 9th International Conference on Information Systems Security (ICISS 2013) LNCS, Springer-Verlag.

72.  Y.Sreenivasa Rao and Ratna Dutta.: Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption. In the Proceeding of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2013), LNCS, Springer-Verlag.

73.  Y.Sreenivasa Rao and Ratna Dutta.: Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network, In the Proceeding of 7th International Conference on Network and System Security (NSS 2013), LNCS, Springer-Verlag.

74.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Key Pre-Distribution in a Non-Uniform Rectangular Grid for Wireless Sensor Networks. Journal of Applied Mathematics and Computing, Springer, 2013.

75.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Unconditionally-Secure Key Pre-Distribution for Triangular Grid Based Wireless Sensor Network. Journal of Applied Mathematics and Computing, Springer, 2013.

76.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Unconditionally Secure Fully Connected Key Establishment using Deployment Knowledge, In the Proceeding of AsiaARES 2013, LNCS, Springer-Verlag, 2013.

2012

 

77.  Y.Sreenivasa Rao and Ratna Dutta.: Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks, In the Proceeding of eighth International Conference on Information Systems Security (ICISS 2012), LNCS, Springer-Verlag.

78.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.: Flexible Deterministic Approach to Key Pre-Distribution in Grid Based WSN, In Proceeding of ADHOCNETS 2012, LNICST (Springer Lecture Notes of ICST).

79.  Ratna Dutta.: Anti-Collusive Self-Healing Key Distributions for Wireless Networks, International Journal of Wireless and Mobile Computing  (IJWMC), Editor-in-Chief: Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.

80.  Sarbari Mitra, Sourav Mukhopadhyay and Ratna Dutta.:   A Group-Based Deterministic Key Predistribution Scheme for Wireless Sensor Network, International Journal of Wireless and Mobile Computing  (IJWMC), Editor-in-Chief: Zhihua Cui. Special Issue on u- and e-Service, Science and Technology, 2012.

81.  Ratna Dutta and Sugata Sanyal.: Collusion Resistant Self-Healing Key Distribution in Mobile Wireless Networks, International Journal of Wireless and Mobile Computing  (IJWMC), Editor-in-Chief: Zhihua Cui; Vol.1, Nos. 1/2/3,2012; ISSN (Online): 1741-1092; ISSN (Print): 1741-1084.

2011

 

82.  Ratna Dutta.: Access Polynomial Based Self-Healing Key Distribution with Improved Security and Performance, In Proceeding of InfoSecHiComNet 2011,  LNCS, Springer-Verlag.

83.  Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay.: A Hierarchical Deterministic Key Predistribution for WSN Using Projective Planes, In Proceeding of ADHOCNETS 2011, LNICST (Springer Lecture Notes of ICST).

84.  Ratna Dutta, Sourav Mukhopadhyay and Dheerendra Mishra.: Access Policy Based Key Management in Multi-Level Multi-Distributor DRM Architecture, In Proceeding of InfoSecHiComNet 2011,  LNCS, Springer-Verlag.

85.  Sarbari Mitra, Ratna Dutta and Sourav Mukhopadhyay.: Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane, In Proceeding of SecureComm 2011, LNICST (Springer Lecture Notes of ICST).

86.  Ratna Dutta, Dheerendra Mishra and Sourav Mukhopadhyay.: Vector Space Access Structure and ID based Distributed DRM Key Management, In proceedings of ID 2011, LNCS, Springer-Verlag.

87.  Ratna Dutta and Tom Dowling.: Provably secure hybrid key agreement protocols in cluster-based wireless ad hoc networks, International Journal of Ad Hoc Networks 9(5): 767-787 (2011).

2010-2009

 

88.  Ratna Dutta, Sourav Mukhopadhyay, Martin Collier.: Computationally secure self-healing key distribution with revocation in wireless ad hoc networks. International Journal of Ad Hoc Networks 8(6): 597-613 (2010).

89.  Ratna Dutta, Tom Dowling.: Secure and Efficient Group Key Agreements for Cluster Based Networks. International Journal of Transactions on Computational Science 4: 87-116 (2009).

90.  Ratna Dutta, Sourav Mukhopadhyay, and Tom Dowling.: Key Management in Multi-Distributor based DRM System with Mobile Clients using IBE, IEEE Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009), August 2009.

91.  Ratna Dutta, Sourav Mukhopadhyay, and Tom Dowling. : Trade-Off between Collusion Resistance and User Life Cycle in Self-Healing Key Distributions with t-Revocation, IEEE Conference on the Applications of Digital Information and Web Technologies (ICADIWT 2009), August 2009.

92.  Ratna Dutta, Sourav Mukhopadhyay and Tom Dowling.: Enhanced Access Polynomial Based Self-Healing Key Distribution, ICST International Workshop on Security in Emerging Wireless Communication and Networking Systems (SEWCN09). LNICST (Springer Lecture Notes of ICST), September 2009.

93.  Ratna Dutta , Sourav Mukhopadhyay and Tom Dowling.: Generalized Self-Healing Key Distribution in Wireless Ad hoc Networks with Trade-Offs in User’s Pre-Arranged Life Cycle and Collusion Resistance, 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), ACM Press, October 2009. 

2008-2007

 

94.  Ratna Dutta and Rana Barua.: Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting, International Journal of IEEE Transactions on Information Theory (IEEE-IT), Vol. 54, No. 5, pp. 2007-2025, May 2008.

95.  Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das and Sabu Emmanuel.: Generalized Self-Healing Key Distribution using Vector Space Access Structure. In proceedings of IFIP Networking 2008, LNCS 4982, pp. 612-623, Springer-Verlag 2008.

96.  Ratna Dutta, Sourav Mukhopadhyay and Sabu Emmanuel.: Low Bandwidth Self-Healing Key Distribution in Wireless Ad Hoc Network. In proceeding of the IEEE Asia International Conference on Modelling and Simulation (AMS 2008), pp. 867-872, IEEE Computer Society Press, 2008.

97.  Ratna Dutta,: Converting Group Key Agreement Protocol into Password-Based Setting – Case Study. Journal of Computers, ISSN 1796-203X, Vol. 12, No. 2, pp. 26-33, Academy Publisher, October 2007.

98.  Ratna Dutta, Chang Ee-Chien and Sourav Mukhopadhyay.: Efficient Self-Healing Key Distributions with Revocation for Wireless Sensor Network using One Way Key Chains. In proceedings of ACNS 2007, LNCS 4521, pp. 385-400, Springer-Verlag, 2007.

99.  Ratna Dutta and Sourav Mukhopadhyay.: Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network. In proceeding of the IEEE Wireless Communications and Networking Conference (WCNC 2007) - Networking, IEEE Communications Society Press, 2007.

100.               Ratna Dutta and Sourav Mukhopadhyay.: Designing Scalable Self-Healing Key Distribution Schemes with Revocation Capability. In proceedings of ISPA’07, LNCS 4742, pp. 419-430, Springer-Verlag, 2007.

101.               Ratna Dutta.: Multi-Party Key Agreement in Password-Based Setting. In proceeding of the IEEE Asia International Conference on Modelling and Simulation (AMS 2007), pp. 133-138, IEEE Computer Society Press, 2007.

102.               Ratna Dutta: Overcome Weakness of a Password-Based Group Key Agreement Protocol. In proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), pp. 469-474, IEEE Computer Society and Communications Society Press, 2007.

103.               Ratna Dutta and Sourav Mukhopadhyay.: Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. In proceeding of the IEEE International Conference on Communications (ICC 2007), IEEE Communications Society Press, 2007.

2006 and before

 

104.               Ratna Dutta and Rana Barua.: Password-Based Encrypted Group Key Agreement. In the International Journal of Network Security (IJNS), Vol.3, No.1, pp. 23-34, July 2006.

105.               Ratna Dutta and Rana Barua,: Dynamic Group Key Agreement in Tree-Based Setting. In proceedings of ACISP 2005, LNCS 3574, pp. 101-112, Springer-Verlag, 2005.

106.               Ratna Dutta and Rana Barua.: Constant Round Dynamic Group Key Agreement. In proceedings of ISC 2005, LNCS 3650, pp. 74-88, Springer-Verlag, 2005.

107.               Ratna Dutta, Rana Barua and Palash Sarkar.: Provably Secure Authenticated Tree Based Group Key Agreement. In proceedings of ICICS 2004, LNCS 3269, pp. 92-104, Springer-Verlag 2004.

108.               Rana Barua, Ratna Dutta, Palash Sarkar.: Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). In proceedings of INDOCRYPT 2003, LNCS 2904, pp. 205-217, Springer-Verlag 2003.