Publish or ....
Research Interest
My primary research interest lies in applied cryptography and information security with a special emphasis on practice-oriented provable security. I feel fascinated by the the interplay of functionality, security and efficiency of cryptographic protocols. My interest includes (but is not limited to):- Public Key Cryptography
- Identity-Based Cryptography
- Security Protocols for Cloud
- Pairing-Based Cryptography
- Quantum Safe Cryptography
Publications
Book
-
Identity-Based Encryption
(with Palash Sarkar), Springer, 2011.
Edited Volume
-
Progress in Cryptology - INDOCRYPT 2011
(with Daniel J Bernstein), Lecture Notes in Computer Science, 7107, 2011.
Book Chapter
-
Identity-based encryption and hierarchical identity-based encryption (with Palash Sarkar),
Identity-Based Cryptography, Cryptology and Information Security Series, IOS Press, Marc Joye and Gregory Neven, eds., 45-64,
2009.
Research Papers (Cryptolgy)
- Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of DéjàQ and Dual-Form Signature, (with R. Kabaleeshwaran), ProvSec 2018, To appear.
- Converting Pairing-Based Cryptosystems from Composite to Prime Order Setting - A Comparative Analysis, (with M. Prem Laxman Das and R. Kabaleeshwaran), Journal of Mathematical Cryptology, 2018.
- Private Set-Intersection with Common Set-up, (with Chethan Kamath and Vikas Kumar), Advances in Mathametics of Communication, 2018.
- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient (with S. Mukherjee and T. Pandit) Indocrypt, 2017.
- On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One (with Alfred Menezes and Francisco Rodriguez-Henriquez), IEEE Transaction on Computers, 66(6), 1061-1070, 2017.
- Another Look at Tightness II: Practical Issues in Cryptography, (with Neal Koblitz, Alfred Menezes and Palash Sarkar), International Conference on Cryptology & Malicious Security: MYCRYPT 2016.
- A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound, (with Chethan Kamath) Algorithmica, 74(4), 1321-1362, 2016.
- Fault attacks on pairing-based protocols revisited, (with Koray Karabina and Alfred Menezes), IEEE Transaction on Computers, 64(6), 1707-1714, 2015.
- Type 2 Structure-Preserving Signature Schemes Revisited, (with Alfred Menezes) ASIACRYPT 2015, Lecture Notes in Computer Science, 9452 (286-310), 2015.
- Property Preserving Symmetric Encryption Revisited, (with M. Prem Laxman Das) ASIACRYPT 2015, Lecture Notes in Computer Science, 9453 (658-682), 2015.
- Efficient Protocol for Authenticated Email Search, (with Sayantan Mukherjee and Govind Patidar), 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015), Lecture Notes in Computer Science, 9534 (2015), 1-20.
- Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data, (with Sayantan Mukherjee) Proceedings of International Workshop on Security, (IWSEC 2014) Lecture Notes in Computer Science, 8639 (2014), 276-285.
- Practical Hybrid (Hierarchical) Identity-Based Encryption Schemes Based on the Decisional Bilinear Diffie-Hellman Assumption, (with Palash Sarkar), International Journal of Applied Cryptography 3(1): 47-83, 2013.
- From Selective-ID to Full-ID IBS without Random Oracles, (with Chethan Kamath), 3rd International Conference on Security, Privacy and Applied Cryptography Engineering (SPACE 2013), Lecture Notes in Computer Science, 8204 (2013), 172-190
- Galindo-Garcia identity-based signature revisited, (with Chethan Kamath and Vikas Kumar), Proceedings of ICISC 2012, Lecture Notes in Computer Science, 7839 (2013), 456-471.
- Variants of Waters' dual-system primitives using asymmetric pairings, (with Somindu C. Ramanna and Palash Sarkar), Proceedings of PKC 2012, Lecture Notes in Computer Science, 7293 (2012), 298-312.
- Another look at tightness (With Alfred Menezes and Palash Sarkar), Proceedings of SAC 2011, Lecture Notes in Computer Science, 7118 (2012), 293-319.
- A generic variant of NIST's KAS2 key agreement protocol (with Alfred Menezes and Berkant Ustaoglu), ACISP 2011, Lecture Notes in Computer Science, 6812, 353-370, 2011.
- On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited (with Alfred Menezes), Discrete Applied Mathematics, 159 (13), 1311-1322, 2011.
- Combined security analysis of the one- and three-pass unified model key agreement protocols (with Alfred Menezes and Berkant Ustaoglu), Indocrypt 2010, Lecture Notes in Computer Science, 6498, 49-68, 2010.
- On the efficiency and security of pairing-based protocols in the Type 1 and Type 4 settings (with Alfred Menezes and Darrel Hankerson), WAIFI 2010, Lecture Notes in Computer Science, 6087, 114-134, 2010.
- Comparing two pairing-based aggregate signature schemes (with Alfred Menezes, Darrel Hankerson and Edward Knapp), Design, Codes and Cryptography, 55 (2-3), 141-167, 2010.
- Reusing static keys in key agreement protocols (with Alfred Menezes,and Berkant Ustaoglu), Indocrypt 2009, Lecture Notes in Computer Science, 5922, 39-56, 2009.
- A new protocol for the nearby friend problem (with Alfred Menezes and Koray Karabina), Cryptography and Coding: 12th IMA International Conference, Lecture Notes in Computer Science, 5921 (2009), 236-251.
- Constant size ciphertext HIBE in the augmented selective-ID model and its extensions (with Palash Sarkar), Journal of Universal Computer Science, 13 (10), 1367-1395, 2007.
- Construction of a hybrid HIBE protocol secure against adaptive attacks (without random oracle) (with Palash Sarkar), ProvSec 2007, Lecture Notes in Computer Science, 4784, 51-67, 2007.
- Multi-receiver identity-based key encapsulation with shortened ciphertext (with Palash Sarkar), Indocrypt 2006, Lecture Notes in Computer Science, 4329, 394-408, 2006.
- HIBE with short public parameters without random oracle (with Palash Sarkar), Asiacrypt 2006, Lecture Notes in Computer Science, 4284 (2006), 145-160.
- New constructions of constant size ciphertext HIBE without random oracle (with Palash Sarkar), Information Security and Cryptology: ICISC 2006, Lecture Notes in Computer Science, 4296 (2006), 310-327.
- Generalization of the selective-ID security model for HIBE protocols (with Palash Sarkar) Public Key Cryptography: PKC 2006, Lecture Notes in Computer Science, 3958, 241-256, 2006.
- Trading time for space: towards an efficient IBE scheme with short(er) public parameters in the standard model (with Palash Sarkar), Information Security and Cryptology: ICISC 2005, Lecture Notes in Computer Science, 3935, 424-440, 2005.
- Efficient computation of Tate pairing in projective coordinate over general characteristic fields (with Palash Sarkar and Rana Barua), Information Security and Cryptology: ICISC 2004, Lecture Notes in Computer Science, 3506, 168-181, 2004.