Follow
Sumit Kumar Debnath
Sumit Kumar Debnath
Verified email at nitjsr.ac.in
Title
Cited by
Cited by
Year
Secure and efficient private set intersection cardinality using bloom filter
SK Debnath, R Dutta
International Conference on Information Security, 209-226, 2015
872015
Secure and efficient multiparty private set intersection cardinality
SK Debnath, P Stănică, N Kundu, T Choudhury
AMC, 2021
232021
Efficient private set intersection cardinality in the presence of malicious adversaries
SK Debnath, R Dutta
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
192015
Post-quantum digital signature scheme based on multivariate cubic problem
N Kundu, SK Debnath, D Mishra, T Choudhury
Journal of Information Security and Applications 53, 102512, 2020
152020
A secure and efficient group signature scheme based on multivariate public key cryptography
N Kundu, SK Debnath, D Mishra
Journal of Information Security and Applications 58, 102776, 2021
142021
Towards fair mutual private set intersection with linear complexity
SK Debnath, R Dutta
Security and Communication Networks 9 (11), 1589-1612, 2016
122016
Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment
V Srivastava, SK Debnath, B Bera, AK Das, Y Park, P Lorenz
IEEE Transactions on Vehicular Technology 71 (9), 9853-9867, 2022
112022
Feasible private set intersection in quantum domain
SK Debnath, K Dey, N Kundu, T Choudhury
Quantum Information Processing 20 (1), 41, 2021
102021
New realizations of efficient and secure private set intersection protocols preserving fairness
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 254-284, 2016
102016
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
82023
Post-quantum secure multi-party private set-intersection in star network topology
SK Debnath, T Choudhury, N Kundu, K Dey
Journal of Information Security and Applications 58, 102731, 2021
82021
Provably secure fair mutual private set intersection cardinality utilizing bloom filter
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 505-525, 2016
82016
A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 343-359, 2014
82014
A post-quantum signcryption scheme using isogeny based cryptography
K Dey, SK Debnath, P Stănică, V Srivastava
Journal of Information Security and Applications 69, 103280, 2022
72022
A multivariate identity-based broadcast encryption with applications to the internet of things
V Srivastava, SK Debnath, P Stanica, SK Pal
Advances in Mathematics of Communications, 2021
62021
Secure outsourced private set intersection with linear complexity
SK Debnath, K Sakurai, K Dey, N Kundu
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
52021
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography
N Kundu, SK Debnath, D Mishra
Sādhanā 45 (1), 209, 2020
52020
How to meet big data when private set intersection realizes constant communication complexity
SK Debnath, R Dutta
Information and Communications Security: 18th International Conference …, 2016
52016
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme
V Srivastava, SK Debnath
International Conference on Provable Security, 296-308, 2021
42021
Post-quantum secure inner product functional encryption using multivariate public key cryptography
SK Debnath, S Mesnager, K Dey, N Kundu
Mediterranean Journal of Mathematics 18 (5), 204, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20