Y. Sreenivasa Rao

ORCID: 0000-0001-8701-0209
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Complexity and Algorithms in Graphs
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • Cloud Data Security Solutions
  • Biometric Identification and Security
  • Quantum Computing Algorithms and Architecture
  • IoT and Edge/Fog Computing
  • Security in Wireless Sensor Networks
  • Chaos-based Image/Signal Encryption
  • User Authentication and Security Systems
  • Heat Transfer and Optimization
  • Face recognition and analysis
  • Internet Traffic Analysis and Secure E-voting
  • Nanofluid Flow and Heat Transfer
  • Blockchain Technology Applications and Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Residue Arithmetic
  • Quantum Information and Cryptography
  • Forensic Fingerprint Detection Methods
  • Traffic Prediction and Management Techniques
  • Cryptographic Implementations and Security
  • Access Control and Trust
  • Heat Transfer Mechanisms
  • Nanocluster Synthesis and Applications

National Institute of Technology Warangal
2020-2024

Indian Institute of Information Technology Allahabad
2018

Indian Institute of Information Technology Design and Manufacturing, Kurnool
2018

Indian Institute of Technology Kharagpur
2012-2016

Storing and sharing confidential data in a public cloud storage system always raises privacy security issues. When is outsourced to server, the basic demands are secure authenticated storage, fine-grained access control, search for data, results verification. Attribute-Based Signcryption (ABSC) promising public-key cryptosystem accomplishing confidentiality authenticity together. However, incorporating verifiable Boolean formula based keyword unsigncryption mechanisms into an ABSC quite...

10.1109/tsc.2023.3327816 article EN IEEE Transactions on Services Computing 2023-10-26

Internet-of-Drones (IoD) is an emerging network connecting various physical devices, namely drones, flying area station servers (FASs), controlling authority and cloud, through the Internet to capture share data with intended users. Outsourcing collected by drones a cloud raises confidentiality security issues. The privacy of drone can be realized keeping it encrypted form, but affects flexibility usability in terms searching retrieving data. Hence, facilitate difficulty working on protect...

10.1109/jiot.2023.3337265 article EN IEEE Internet of Things Journal 2023-11-30

In order to minimize the impact of secret signing key exposure in attribute-based signature scenario, we construct an key-insulated (ABKIS) scheme for expressive monotone boolean function access structures utilizing only four pairing operations verification process and making length constant, that is, number pairings required size are independent attribute set participated respective process. The (strong) selective security our ABKIS is reduced computational Diffie–Hellman Exponent problem...

10.1080/00207160.2015.1037838 article EN International Journal of Computer Mathematics 2015-04-07

Attribute-based signature (ABS) schemes play a vital role to accomplish authentication and signer privacy simultaneously. In recent years, cryptographic primitives are deployed on insecure devices such as mobile devices; thereby, secret key exposure seems inevitable. To alleviate the impact of in ABS scenarios, authors apply method insulation construct first signature-policy attribute-based key-insulated (ABKIS) scheme. The proposed construction supports expressive monotone Boolean functions...

10.1049/iet-ifs.2015.0355 article EN IET Information Security 2016-07-15
Coming Soon ...