IITKGP
IIT KGP MATHS CRYPTO GROUP: https://mathkgpcrypto.wixsite.com/mysite | Program Co-Chairs: Indocrypt 2025, the 26th International Conference on Cryptology in India, Bhubaneswar, Orissa, India, December 14 - 17, 2025. https://www.indocrypt2025.in/ |

Research Areas

  • Quantum and Post-quantum Cryptography
  • Functional Encryption & cloud computing
  • Elliptic curves & isogeny-based crypto
  • Zero-knowledge proofs
  • Financial Crypto and Blockchain
I am interested in both the theoretical and practical aspects of cryptography and its interplay with theoretical computer science. A typical approach to prove a cryptographic scheme secure consists of two major steps: (i) modeling threats: formalizing the threat model through a realistic framework; (ii) security reduction: proving security of the scheme (within that framework) based on a set of mathematical assumptions.

Currently, I’m actively involved in research on Post-Quantum Cryptography. Constant development in quantum computing technologies poses enormous threats to the security of many highly useful applications (e.g. key-exchange over the internet) relying on public-key cryptography. While the exact timing of availability of a “full-fledged” quantum computer is debatable, we must prepare ourselves for the future and aim to find replacements well ahead of time. Indeed, in the last decade a number of researchers have put significant research effort towards that. As a result many new research areas have emerged. Lattice-based cryptography, code-based cryptography, isogeny-based cryptography, multivariate cryptography and hash-based cryptography are five well-known and commonly cited classes of cryptographic primitives that are believed to remain secure in the presence of a quantum computer. Building on my experience in dealing with lattices, coding theory, isogeny and multivariate system through my works related to fully-homomorphic encryptions, inner product functional encryption, attribute-based encryption, group signature, nominative signature and key encapsulation mechanism, I plan to dive deeper into post-quantum cryptography.

I am also highly interested in constantly exploring new areas with broader long-term objectives in mind which I feel is an absolute necessity to evolve as a successful independent researcher. Although I am open to exploring any new direction matching my research aptitude, currently I specifically plan to explore the following important area: Cryptographic support in blockchains and cryptocurrencies. I have been actively engaged in understanding the Blockchain technology, zero-knowledge proofs and post-quantum migration.
  • Forward secure offline assisted group key exchange from isogeny-based blinded key encapsulation mechanism by Shaw S., Dutta R. IEEE Transactions on Information Theory - (2023)
  • Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption by Biswas C., Dutta R. Journal of Ambient Intelligence and Humanized Computing - (2022)
  • Short attribute-based signatures for arbitrary Turing machines from standard assumptions by Datta P., Dutta R. , Mukhopadhyay S. Designs, Codes and Cryptography 91 pages 1845-1872 (2023)
  • Post-quantum Secure Fully-dynamic Logarithmic-size Deniable Group Signature in Code-based Setting, by Dey J., Dutta R. Advances in Mathematics of Communications, - (2022)
  • Systematic Review, Challenges and Research Directions. by Dey J., Dutta R. ACM Computing Surveys, - (2022)
  • Post-quantum Secure Stateful Deterministic Wallet from Code-based Signature featuring Uniquely Rerandomized Keys by Jana P., Dutta R. The Proceeding of the 25th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2023) - (2023)
  • Post-quantum secure Id-based identification and identity-based signature achieving forward secrecy by Shaw S., Dutta R. Journal of Information Security and Applications - (2022)
  • An Efficient Post-Quantum Secure Dynamic EPID Signature Scheme using Lattices by Biswas C., Dutta R. , Sarkar S. Multimedia Tools and Applications - (2023)
  • Cloud Assisted Semi-static Secure Accountable Authority Identity-based Broadcast Encryption Featuring Public Traceability without Random Oracles. by Singh A. K., Acharya K. , Dutta R. Annals of Telecommunications, - (2022)
  • Communication-friendly Threshold Trapdoor Function from Weaker Assumption for Distributed Cryptography. by Belel A., Dutta R. , Mukhopadhyay S. Annals of Telecommunications - (2022)

Principal Investigator

  • Construction of Privacy Preserving Cryptographic Protocols for Blockchain-Based Applications in Military and Defence Organizations Directorate of Futuristic Technology Management (DFTM), Defence Research and Development Organisation, Ministry of Defence
  • Design and Analysis of post-quantum cryptographic primitives from error correcting codes Science and Engineering Research Board (SERB)

Co-Principal Investigator

  • Towards designing cryptographic primitives to support secure decentralized protocols Council of Scientific and Industrial Research, Extramural Research Division

Ph. D. Students

Amit Dhara

Area of Research: Cryptography and Network Security

Amrita Paul

Area of Research: Cryptography and security

M Maria Leslie

Area of Research: Cryptography

Nabanita Chakraborty

Area of Research: Cryptography

Pratima Jana

Area of Research: Cryptography and Network Security

Sanajit Patra

Area of Research: Cryptography

Suprava Roy

Area of Research: Cryptography