top of page
Fully secure systems don't exist today and they won't exist in the future.

-Adi Shamir

Gradient

ABOUT US

Our research interest is cryptography. We are a group of Ph.D. students and Project scholars from the Department of Mathematics, IIT Kharagpur. Our goal is to come out with new ideas with every discussion we make here.

Our Supervisors

Sourav Mukhopadhyay

Professor

Dept. of Mathematics

Indian Institute of Technology Kharagpur

India – 721302

Webpage: http://www.facweb.iitkgp.ac.in/~sourav/

Ratna Dutta

Associate Professor

Dept. of Mathematics

Indian Institute of Technology Kharagpur

India – 721302

Webpage: http://www.facweb.iitkgp.ac.in/~ratna/

About

past TALKs

22nd June, 2020

Towards Quantum Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies

Speaker: Surbhi

Towards Quantum Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies

Authors: David Jao and

Luca De Feo

slides

Speaker: Surbhi
25th June, 2020

On the security of supersingular isogeny cryptosystems

Speaker: Surbhi

On the security of supersingular isogeny cryptosystems

Authors: Steven D. Galbraith, Christophe Petit, Barak Shani and Yan Bo Ti

slides

Speaker: Surbhi
29th June, 2020

Optimal Broadcast Encryption from Pairings and LWE (EUROCRYPT-2020)-Part 1

Speaker: Subhranil

Optimal Broadcast Encryption from Pairings and LWE (EUROCRYPT-2020)-Part 1

Authors: Shweta Agrawal and Shota Yamada

slides

Speaker: Subhranil
30th June, 2020

CSIDH: An efficient post-quantum commutative group action

Speaker: Surbhi

CSIDH: An efficient post-quantum commutative group action

Authors: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny and Joost Renes

slides

Speaker: Surbhi
1st July, 2020

Optimal Broadcast Encryption from Pairings and LWE (EUROCRYPT-2020)-Part 2

Speaker: Subhranil

Optimal Broadcast Encryption from Pairings and LWE (EUROCRYPT-2020)-Part 2

Authors: Shweta Agrawal and Shota Yamada

slides

Speaker: Subhranil
2nd July, 2020

Algorithms for CSIDH, the continuation of the previous presentation

Speaker: Surbhi

Algorithms for CSIDH, the continuation of the previous presentation

Authors: Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny and Joost Renes

slides

Speaker: Surbhi
8th July, 2020

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 2

Speaker: Jayashree

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 2

Authors:Khoa Nguyen, Hanh Tang, Huaxiong Wang, and Neng Zeng

slides

Speaker: Jayashree
7th July, 2020

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 1

Speaker: Jayashree

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 1

Authors: Khoa Nguyen, Hanh Tang, Huaxiong Wang, and Neng Zeng

slides

Speaker: Jayashree
3rd July, 2020

Verifiable Homomorphic Secret Sharing

Speaker: Anushree

Verifiable Homomorphic Secret Sharing

Authors: Georgia Tsaloli, Bei Liang, Aikaterini Mitrokotsa

slides

Speaker: Anushree
9th July, 2020

Threshold Trapdoor function and their applications-Part 1

Speaker: Anushree

Threshold Trapdoor function and their applications-Part 1

Authors: Binbin Tu, Yu Chen, Xueli Wang

slides

Speaker: Anushree
10th July, 2020

SeaSign: Compact isogeny signatures from class group actions-Part 1

Speaker: Surbhi

SeaSign: Compact isogeny signatures from class group actions-Part 1

Authors: Luca De Feo, Steven D. Galbraith

slides

Speaker: Surbhi
12th July, 2020

SeaSign: Compact isogeny signatures from class group actions-Part 2

Speaker: Surbhi

SeaSign: Compact isogeny signatures from class group actions-Part 2

Authors: Luca De Feo, Steven D. Galbraith

slides

Speaker: Surbhi
14th July, 2020
Speaker: Tapas

Authors: Zvika Brakerski, Nico D¨ottling, Sanjam Garg, and Giulio Malavolta

slides

Speaker: Tapas
14th July, 2020
Speaker: Tapas

Authors: Zvika Brakerski, Nico D¨ottling, Sanjam Garg, and Giulio Malavolta

slides

Speaker: Tapas
15th July, 2020

Threshold Trapdoor function and their applications-Part 2

Speaker: Anushree

Threshold Trapdoor function and their applications-Part 2

Authors: Binbin Tu, Yu Chen, Xueli Wang

slides

Speaker: Anushree

Authors: Jintai Ding, Zheng Zhang, Joshua Deaton, Kurt Schmidt, FNU Vishakha

slides

Speaker: Prithwi

Authors: Henry Corrigan-Gibbs and Dmitry Kogan

slides

Speaker: Ramprasad

Authors: Henry Corrigan-Gibbs and Dmitry Kogan

slides

Speaker: Ramprasad
22th July, 2020

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 3

Speaker: Jayashree

New Code-Based Privacy-Preserving Cryptographic Constructions-Part 3

Authors:Khoa Nguyen, Hanh Tang, Huaxiong Wang, and Neng Zeng

slides

Speaker: Jayashree
23rd July, 2020

Towards ABE for RAM from LWE with sub-linear decryption and More (Asiacrypt- 2019)-Part 1

Speaker: Subhranil

Towards ABE for RAM from LWE with sub-linear decryption and More (Asiacrypt- 2019)-Part 1

Authors:Prabhajan Ananth, Xiong Fan, Elaine Shi 

slides

Speaker: Subhranil
24rd July, 2020

Towards ABE for RAM from LWE with sub-linear decryption and More (Asiacrypt- 2019)-Part 2

Speaker: Subhranil

Towards ABE for RAM from LWE with sub-linear decryption and More (Asiacrypt- 2019)-Part 2

Authors:Prabhajan Ananth, Xiong Fan, Elaine Shi 

slides

Speaker: Subhranil

Authors:Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren

slides

Speaker: Surbhi

Authors:Elette Boyle and Niv Gilboa and Yuval Ishai

Speaker: Amit
31st July, 2020
Speaker: Anushree

Authors:Chris Peikert, Brent Waters

slides

Speaker: Anushree
4th August, 2020
Speaker: Surbhi

Authors:Luca De Feo and Michael Meyer

slides

Speaker: Surbhi
14th August, 2020

FE for Inner Products and Its Application to Decentralized ABE (PKC19)-Part 1

Speaker: Subhranil

FE for Inner Products and Its Application to Decentralized ABE (PKC19)-Part 1

Authors:Zhedong Wang, Xiong Fan, and Feng-Hao Liu 

slides

Speaker: Subhranil
16th August, 2020

FE for Inner Products and Its Application to Decentralized ABE (PKC19)-Part 2

Speaker: Subhranil

FE for Inner Products and Its Application to Decentralized ABE (PKC19)-Part 2

Authors:Zhedong Wang, Xiong Fan, and Feng-Hao Liu

slides

Speaker: Subhranil
Contact

Authors: Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He

slides

Speaker: Surbhi
bottom of page