I am interested in both the theoretical and practical aspects of cryptography and its interplay with theoretical computer science. A typical approach to prove a cryptographic scheme secure consists of two major steps: (i) modeling threats: formalizing the threat model through a realistic framework; (ii) security reduction: proving security of the scheme (within that framework) based on a set of mathematical assumptions.
Currently, I’m actively involved in research on Post-Quantum Cryptography. Constant development in quantum computing technologies poses enormous threats to the security of many highly useful applications (e.g. key-exchange over the internet) relying on public-key cryptography. While the exact timing of availability of a “full-fledged” quantum computer is debatable, we must prepare ourselves for the future and aim to find replacements well ahead of time. Indeed, in the last decade a number of researchers have put significant research effort towards that. As a result many new research areas have emerged. Lattice-based cryptography, code-based cryptography, isogeny-based cryptography, multivariate cryptography and hash-based cryptography are five well-known and commonly cited classes of cryptographic primitives that are believed to remain secure in the presence of a quantum computer. Building on my experience in dealing with lattices, coding theory, isogeny and multivariate system through my works related to fully-homomorphic encryptions, inner product functional encryption, attribute-based encryption, group signature, nominative signature and key encapsulation mechanism, I plan to dive deeper into post-quantum cryptography.
I am also highly interested in constantly exploring new areas with broader long-term objectives in mind which I feel is an absolute necessity to evolve as a successful independent researcher. Although I am open to exploring any new direction matching my research aptitude, currently I specifically plan to explore the following important area: Cryptographic support in blockchains and cryptocurrencies. I have been actively engaged in understanding the Blockchain technology, zero-knowledge proofs and post-quantum migration.
-
Forward secure offline assisted group key exchange from isogeny-based blinded key encapsulation mechanism by Shaw S., Dutta R. IEEE Transactions on Information Theory - (2023)
-
Secure and Efficient Multi-Key FHE Scheme Supporting Multi-bit Messages from LWE Preserving Non-Interactive Decryption by Biswas C., Dutta R. Journal of Ambient Intelligence and Humanized Computing - (2022)
-
Short attribute-based signatures for arbitrary Turing machines from standard assumptions by Datta P., Dutta R. , Mukhopadhyay S. Designs, Codes and Cryptography 91 pages 1845-1872 (2023)
-
Post-quantum Secure Fully-dynamic Logarithmic-size Deniable Group Signature in Code-based Setting, by Dey J., Dutta R. Advances in Mathematics of Communications, - (2022)
-
Systematic Review, Challenges and Research Directions. by Dey J., Dutta R. ACM Computing Surveys, - (2022)
-
Post-quantum Secure Stateful Deterministic Wallet from Code-based Signature featuring Uniquely Rerandomized Keys by Jana P., Dutta R. The Proceeding of the 25th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2023) - (2023)
-
Post-quantum secure Id-based identification and identity-based signature achieving forward secrecy by Shaw S., Dutta R. Journal of Information Security and Applications - (2022)
-
An Efficient Post-Quantum Secure Dynamic EPID Signature Scheme using Lattices by Biswas C., Dutta R. , Sarkar S. Multimedia Tools and Applications - (2023)
-
Cloud Assisted Semi-static Secure Accountable Authority Identity-based Broadcast Encryption Featuring Public Traceability without Random Oracles. by Singh A. K., Acharya K. , Dutta R. Annals of Telecommunications, - (2022)
-
Communication-friendly Threshold Trapdoor Function from Weaker Assumption for Distributed Cryptography. by Belel A., Dutta R. , Mukhopadhyay S. Annals of Telecommunications - (2022)
Principal Investigator
- Construction of Privacy Preserving Cryptographic Protocols for Blockchain-Based Applications in Military and Defence Organizations Directorate of Futuristic Technology Management (DFTM), Defence Research and Development Organisation, Ministry of Defence
- Design and Analysis of post-quantum cryptographic primitives from error correcting codes Science and Engineering Research Board (SERB)
Co-Principal Investigator
- Towards designing cryptographic primitives to support secure decentralized protocols Council of Scientific and Industrial Research, Extramural Research Division
Ph. D. Students
Amit Dhara
Area of Research: Cryptography and Network Security
Amrita Paul
Area of Research: Cryptography and security
M Maria Leslie
Area of Research: Cryptography
Nabanita Chakraborty
Area of Research: Cryptography
Pratima Jana
Area of Research: Cryptography and Network Security
Sanajit Patra
Area of Research: Cryptography
Suprava Roy
Area of Research: Cryptography