


default search action
Sumit Kumar Debnath
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Paresh Baidya, Rourab Paul, Swagata Mandal
, Sumit Kumar Debnath
:
Efficient Implementation of Knuth Yao Sampler on Reconfigurable Hardware. IEEE Comput. Archit. Lett. 23(2): 195-198 (2024) - [j25]Y. Sreenivasa Rao, Vikas Srivastava
, Tapaswini Mohanty, Sumit Kumar Debnath:
Designing quantum-secure attribute-based encryption. Clust. Comput. 27(9): 13075-13091 (2024) - [j24]Sushmita Sarkar, Vikas Srivastava
, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An efficient quantum oblivious transfer protocol. Clust. Comput. 27(10): 14037-14048 (2024) - [j23]Tapaswini Mohanty, Vikas Srivastava
, Sumit Kumar Debnath
, Ashok Kumar Das
, Biplab Sikdar
:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application. IEEE Internet Things J. 11(1): 1761-1772 (2024) - [j22]Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath:
Cryptanalysis of a quantum identity-based signature and its improvement. Quantum Inf. Process. 23(9): 318 (2024) - [j21]Sushmita Sarkar, Tapaswini Mohanty, Vikas Srivastava
, Sumit Kumar Debnath
, Ashok Kumar Das
, Youngho Park
:
Quantum Secure Disease Surveillance Through Private Set Intersection. IEEE Trans. Consumer Electron. 70(3): 5585-5596 (2024) - [i11]Tapaswini Mohanty, Vikas Srivastava
, Sumit Kumar Debnath, Debasish Roy, Kouichi Sakurai, Sourav Mukhopadhyay:
An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication. CoRR abs/2403.18247 (2024) - [i10]Kunal Dey, Somnath Kumar, Vikas Srivastava, Sumit Kumar Debnath:
A new approach to delegate signing rights to proxy signers using isogeny-based cryptography. CoRR abs/2407.13318 (2024) - [i9]Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Sumit Kumar Debnath:
An Efficient and Secure Boolean Function Evaluation Protocol. IACR Cryptol. ePrint Arch. 2024: 1787 (2024) - 2023
- [j20]Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stanica, Kunal Dey, Nibedita Kundu:
Delegating signing rights in a multivariate proxy signature scheme. Adv. Math. Commun. 17(3): 681-696 (2023) - [j19]Vikas Srivastava
, Sumit Kumar Debnath, Pantelimon Stanica, Saibal Kumar Pal:
A multivariate identity-based broadcast encryption with applications to the internet of things. Adv. Math. Commun. 17(6): 1302-1313 (2023) - [j18]Vikas Srivastava
, Sumit Kumar Debnath:
A Multivariate-Based Provably Secure Certificateless Signature Scheme With Applications To The Internet Of Medical Things. Comput. J. 66(10): 2499-2516 (2023) - [j17]Vikas Srivastava
, Sumit Kumar Debnath
, Sharwan K. Tiwari
, Harshdeep Singh
:
On the security of multivariate-based ring signature and other related primitives. J. Inf. Secur. Appl. 74: 103474 (2023) - [j16]Tapaswini Mohanty, Vikas Srivastava
, Sihem Mesnager, Sumit Kumar Debnath
:
A constant round quantum secure protocol for oblivious polynomial evaluation. J. Inf. Secur. Appl. 77: 103560 (2023) - [j15]Tapaswini Mohanty, Sumit Kumar Debnath
:
An information-theoretically secure quantum multiparty private set intersection. J. Inf. Secur. Appl. 78: 103623 (2023) - [j14]Sumit Kumar Debnath, Sihem Mesnager
, Vikas Srivastava
, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture. J. Cryptogr. Eng. 13(2): 187-199 (2023) - [j13]Sumit Kumar Debnath
, Puja Khatri:
Study of mediating effect of interpersonal relationship and emotional coping ability in the relationship between emotional intelligence and wellness of nursing professionals. Int. J. Syst. Assur. Eng. Manag. 14(4): 1340-1353 (2023) - [i8]Tapaswini Mohanty, Vikas Srivastava
, Sumit Kumar Debnath, Pantelimon Stanica:
Quantum Secure Protocols for Multiparty Computations. CoRR abs/2312.16318 (2023) - [i7]Vikas Srivastava
, Paresh Baidya, Sumit Kumar Debnath, Sihem Mesnager:
Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management. CoRR abs/2312.16322 (2023) - [i6]Vikas Srivastava, Anubhab Baksi, Sumit Kumar Debnath:
An Overview of Hash Based Signatures. IACR Cryptol. ePrint Arch. 2023: 411 (2023) - [i5]Vikas Srivastava, Sumit Kumar Debnath:
A Multivariate Based Provably Secure Certificateless Signature Scheme with Applications to the Internet of Medical Things. IACR Cryptol. ePrint Arch. 2023: 1153 (2023) - [i4]Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Ashok Kumar Das, Biplab Sikdar:
Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy Preserving Ride-Sharing Application. IACR Cryptol. ePrint Arch. 2023: 1154 (2023) - 2022
- [j12]Sumit Kumar Debnath, Nibedita Kundu, Tanmay Choudhury:
Efficient post-quantum private set-intersection protocol. Int. J. Inf. Comput. Secur. 17(3/4): 405-423 (2022) - [j11]Sumit Kumar Debnath, Vikas Srivastava
, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum secure privacy preserving technique to obtain the intersection of two datasets for contact tracing. J. Inf. Secur. Appl. 66: 103127 (2022) - [j10]Kunal Dey, Sumit Kumar Debnath
, Pantelimon Stanica, Vikas Srivastava
:
A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69: 103280 (2022) - [j9]Vikas Srivastava
, Sumit Kumar Debnath
, Basudeb Bera
, Ashok Kumar Das, Youngho Park
, Pascal Lorenz
:
Blockchain-Envisioned Provably Secure Multivariate Identity-Based Multi-Signature Scheme for Internet of Vehicles Environment. IEEE Trans. Veh. Technol. 71(9): 9853-9867 (2022) - [i3]Sumit Kumar Debnath, Sihem Mesnager, Vikas Srivastava, Saibal Kumar Pal, Nibedita Kundu:
Mul-IBS: A Multivariate Identity-Based Signature Scheme Compatible with IoT-based NDN Architecture. IACR Cryptol. ePrint Arch. 2022: 1091 (2022) - 2021
- [j8]Sumit Kumar Debnath, Pantelimon Stanica, Nibedita Kundu, Tanmay Choudhury:
Secure and efficient multiparty private set intersection cardinality. Adv. Math. Commun. 15(2): 365-386 (2021) - [j7]Sumit Kumar Debnath, Tanmay Choudhury, Nibedita Kundu, Kunal Dey:
Post-quantum secure multi-party private set-intersection in star network topology. J. Inf. Secur. Appl. 58: 102731 (2021) - [j6]Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra:
A secure and efficient group signature scheme based on multivariate public key cryptography. J. Inf. Secur. Appl. 58: 102776 (2021) - [j5]Sumit Kumar Debnath
, Kunal Dey, Nibedita Kundu, Tanmay Choudhury:
Feasible private set intersection in quantum domain. Quantum Inf. Process. 20(1): 41 (2021) - [c9]Sumit Kumar Debnath, Kouichi Sakurai, Kunal Dey, Nibedita Kundu:
Secure Outsourced Private Set Intersection with Linear Complexity. DSC 2021: 1-8 - [c8]Vikas Srivastava
, Sumit Kumar Debnath:
Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme. ProvSec 2021: 296-308 - [c7]Ratna Dutta, Sumit Kumar Debnath, Chinmoy Biswas
:
Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem. SECRYPT 2021: 595-602 - [i2]Sumit Kumar Debnath, Vikas Srivastava, Tapaswini Mohanty, Nibedita Kundu, Kouichi Sakurai:
Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing. IACR Cryptol. ePrint Arch. 2021: 618 (2021) - 2020
- [j4]Sumit Kumar Debnath
, Pantelimon Stanica, Tanmay Choudhury, Nibedita Kundu:
Post-quantum protocol for computing set intersection cardinality with linear complexity. IET Inf. Secur. 14(6): 661-669 (2020) - [j3]Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra
, Tanmay Choudhury:
Post-quantum digital signature scheme based on multivariate cubic problem. J. Inf. Secur. Appl. 53: 102512 (2020)
2010 – 2019
- 2019
- [j2]Sumit Kumar Debnath:
Provably Secure Private Set Intersection With Constant Communication Complexity. Int. J. Cyber Warf. Terror. 9(2): 39-64 (2019) - 2016
- [j1]Sumit Kumar Debnath, Ratna Dutta:
Towards fair mutual private set intersection with linear complexity. Secur. Commun. Networks 9(11): 1589-1612 (2016) - [c6]Sumit Kumar Debnath, Ratna Dutta:
Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter. Inscrypt 2016: 505-525 - [c5]Sumit Kumar Debnath, Ratna Dutta:
How to Meet Big Data When Private Set Intersection Realizes Constant Communication Complexity. ICICS 2016: 445-454 - [c4]Sumit Kumar Debnath, Ratna Dutta:
New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness. ICISC 2016: 254-284 - [i1]Sumit Kumar Debnath, Ratna Dutta:
Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary. IACR Cryptol. ePrint Arch. 2016: 216 (2016) - 2015
- [c3]Sumit Kumar Debnath, Ratna Dutta:
Secure and Efficient Private Set Intersection Cardinality Using Bloom Filter. ISC 2015: 209-226 - [c2]Sumit Kumar Debnath, Ratna Dutta:
Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries. ProvSec 2015: 326-339 - 2014
- [c1]Sumit Kumar Debnath, Ratna Dutta:
A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function. ICISC 2014: 343-359
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-18 02:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint