Follow
Sumit Kumar Debnath
Sumit Kumar Debnath
Verified email at nitjsr.ac.in
Title
Cited by
Cited by
Year
Secure and efficient private set intersection cardinality using bloom filter
SK Debnath, R Dutta
International Conference on Information Security, 209-226, 2015
1012015
Secure and efficient multiparty private set intersection cardinality.
SK Debnath, P Stǎnicǎ, N Kundu, T Choudhury
Advances in Mathematics of Communications 15 (2), 2021
282021
Efficient private set intersection cardinality in the presence of malicious adversaries
SK Debnath, R Dutta
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
222015
Blockchain-envisioned provably secure multivariate identity-based multi-signature scheme for Internet of Vehicles environment
V Srivastava, SK Debnath, B Bera, AK Das, Y Park, P Lorenz
IEEE Transactions on Vehicular Technology 71 (9), 9853-9867, 2022
192022
A secure and efficient group signature scheme based on multivariate public key cryptography
N Kundu, SK Debnath, D Mishra
Journal of Information Security and Applications 58, 102776, 2021
192021
An overview of hash based signatures
V Srivastava, A Baksi, SK Debnath
Cryptology ePrint Archive, 2023
182023
Post-quantum digital signature scheme based on multivariate cubic problem
N Kundu, SK Debnath, D Mishra, T Choudhury
Journal of Information Security and Applications 53, 102512, 2020
182020
Feasible private set intersection in quantum domain
SK Debnath, K Dey, N Kundu, T Choudhury
Quantum Information Processing 20 (1), 41, 2021
172021
Towards fair mutual private set intersection with linear complexity
SK Debnath, R Dutta
Security and Communication Networks 9 (11), 1589-1612, 2016
142016
New realizations of efficient and secure private set intersection protocols preserving fairness
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 254-284, 2016
112016
A post-quantum signcryption scheme using isogeny based cryptography
K Dey, SK Debnath, P Stănică, V Srivastava
Journal of Information Security and Applications 69, 103280, 2022
102022
Provably secure fair mutual private set intersection cardinality utilizing bloom filter
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 505-525, 2016
102016
Post-quantum secure multi-party private set-intersection in star network topology
SK Debnath, T Choudhury, N Kundu, K Dey
Journal of Information Security and Applications 58, 102731, 2021
92021
Quantum secure threshold private set intersection protocol for IoT-Enabled privacy preserving ride-sharing application
T Mohanty, V Srivastava, SK Debnath, AK Das, B Sikdar
IEEE Internet of Things Journal, 2023
82023
A fair and efficient mutual private set intersection protocol from a two-way oblivious pseudorandom function
SK Debnath, R Dutta
International Conference on Information Security and Cryptology, 343-359, 2014
82014
Secure outsourced private set intersection with linear complexity
SK Debnath, K Sakurai, K Dey, N Kundu
2021 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2021
72021
A multivariate identity-based broadcast encryption with applications to the internet of things.
V Srivastava, SK Debnath, P Stanica, SK Pal
Adv. Math. Commun. 17 (6), 1302-1313, 2023
62023
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing
SK Debnath, V Srivastava, T Mohanty, N Kundu, K Sakurai
Journal of Information Security and Applications 66, 103127, 2022
62022
1-out-of-2: post-quantum oblivious transfer protocols based on multivariate public key cryptography
N Kundu, SK Debnath, D Mishra
Sādhanā 45 (1), 209, 2020
62020
Post-quantum secure inner product functional encryption using multivariate public key cryptography
SK Debnath, S Mesnager, K Dey, N Kundu
Mediterranean Journal of Mathematics 18 (5), 204, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20