- Cryptography and Data Security
- Complexity and Algorithms in Graphs
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Biometric Identification and Security
- Quantum Computing Algorithms and Architecture
- IoT and Edge/Fog Computing
- Security in Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- User Authentication and Security Systems
- Heat Transfer and Optimization
- Face recognition and analysis
- Internet Traffic Analysis and Secure E-voting
- Nanofluid Flow and Heat Transfer
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Residue Arithmetic
- Quantum Information and Cryptography
- Forensic Fingerprint Detection Methods
- Traffic Prediction and Management Techniques
- Cryptographic Implementations and Security
- Access Control and Trust
- Heat Transfer Mechanisms
- Nanocluster Synthesis and Applications
National Institute of Technology Warangal
2020-2024
Indian Institute of Information Technology Allahabad
2018
Indian Institute of Information Technology Design and Manufacturing, Kurnool
2018
Indian Institute of Technology Kharagpur
2012-2016
Storing and sharing confidential data in a public cloud storage system always raises privacy security issues. When is outsourced to server, the basic demands are secure authenticated storage, fine-grained access control, search for data, results verification. Attribute-Based Signcryption (ABSC) promising public-key cryptosystem accomplishing confidentiality authenticity together. However, incorporating verifiable Boolean formula based keyword unsigncryption mechanisms into an ABSC quite...
Internet-of-Drones (IoD) is an emerging network connecting various physical devices, namely drones, flying area station servers (FASs), controlling authority and cloud, through the Internet to capture share data with intended users. Outsourcing collected by drones a cloud raises confidentiality security issues. The privacy of drone can be realized keeping it encrypted form, but affects flexibility usability in terms searching retrieving data. Hence, facilitate difficulty working on protect...
In order to minimize the impact of secret signing key exposure in attribute-based signature scenario, we construct an key-insulated (ABKIS) scheme for expressive monotone boolean function access structures utilizing only four pairing operations verification process and making length constant, that is, number pairings required size are independent attribute set participated respective process. The (strong) selective security our ABKIS is reduced computational Diffie–Hellman Exponent problem...
Attribute-based signature (ABS) schemes play a vital role to accomplish authentication and signer privacy simultaneously. In recent years, cryptographic primitives are deployed on insecure devices such as mobile devices; thereby, secret key exposure seems inevitable. To alleviate the impact of in ABS scenarios, authors apply method insulation construct first signature-policy attribute-based key-insulated (ABKIS) scheme. The proposed construction supports expressive monotone Boolean functions...