Vikas Srivastava

ORCID: 0000-0002-9743-6104
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Coding theory and cryptography
  • Polynomial and algebraic computation
  • Cryptography and Residue Arithmetic
  • Chaos-based Image/Signal Encryption
  • Advanced Authentication Protocols Security
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Benford’s Law and Fraud Detection
  • Power Line Communications and Noise
  • Cloud Data Security Solutions
  • Opportunistic and Delay-Tolerant Networks
  • Privacy-Preserving Technologies in Data
  • Distributed systems and fault tolerance
  • Artificial Intelligence in Law
  • Magnesium Oxide Properties and Applications
  • graph theory and CDMA systems
  • Wireless Communication Security Techniques
  • Quantum-Dot Cellular Automata
  • Recycling and utilization of industrial and municipal waste in materials production
  • Quantum optics and atomic interactions
  • Quantum Mechanics and Applications

National Institute of Technology Jamshedpur
2021-2024

The deployed vehicles in an Internet of Vehicles (IoV) can take intelligent decisions by means exchanging the real-time traffic-related information between and IoV infrastructures. This further reduces probability traffic jams accidents. However, insecure (public) communication among various entities makes security threats attacks that be launched passive/active adversaries present network. In view this context, there is a need efficient cryptographic primitive which produce single compact...

10.1109/tvt.2022.3176755 article EN IEEE Transactions on Vehicular Technology 2022-05-23

The Internet of Things (IoT)-enabled ride sharing is one the most transforming and innovative technologies in transportation industry. It has myriads advantages, but with increasing demands there are security concerns as well. Traditionally, cryptographic methods used to address privacy a system. Unfortunately, due emergence quantum algorithms, these protocols may not remain secure. Hence, necessity for privacy-preserving which can resist various attacks against computers. In domain sharing,...

10.1109/jiot.2023.3291132 article EN IEEE Internet of Things Journal 2023-06-30

<p style='text-indent:20px;'>When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part human lives just two decades. In short, Internet Things (IoT), is a catch-all terminology used to describe devices connected internet. These can share and receive data as well provide instructions over network. By design itself, IoT system requires multicasting information set designated devices, securely. Taking everything...

10.3934/amc.2021050 article EN Advances in Mathematics of Communications 2021-11-10

Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed first Identity-based signature (IBS) to simplify public key infrastructure circumvent need for certificates. It makes process uncomplicated by enabling users verify digital using only identifiers signers, email, phone number, etc. Nearly all existing IBS protocols rely on several theoretical...

10.48550/arxiv.2403.18247 preprint EN arXiv (Cornell University) 2024-03-27

Concrete is used as a construction material using all over the world, contributing most important role to infrastructure development. However, it has long been recognized for its environmental footprints. This research paper will provide study where ultrafine fly ash and GGBS are maximize cement replacement in concrete without compromising mechanical properties achieving more sustainable concrete, comprehensive review of impacts included production, empirical data, statistical analyses,...

10.13074/jent.2024.06.242660 article EN Journal of Environmental Nanotechnology 2024-07-01

E-governance is a two-way protocol through which one can use government services, share data and request information. It refers to the of communication information technologies provide services public in an efficient fast manner. In addition, any document submitted e-Government system must be authenticated by officer using digital signature scheme. context signatures, proxy important cryptographic primitive that allows original signer delegate signing authority another (proxy signer). The...

10.48550/arxiv.2407.13318 preprint EN arXiv (Cornell University) 2024-07-18

The construction industry is one of the major contributors to environmental degradation. Hence, it requires eco-friendly practices make concrete more sustainable. This can be achieved by addition mineral admixtures as a cement replacement. process helps environment in two ways: reducing carbon dioxide emission through replacement and utilizing such fly ash, Ground Granulated Blast Furnace Slag (GGBS), metakaolin, rice husk ash silica fume, which are all industrial wastes or by-products. this...

10.13074/jent.2024.09.242659 article EN Journal of Environmental Nanotechnology 2024-09-30

Abstract Over the last few years, Internet of Medical Things (IoMT) has completely transformed healthcare industry. It is bringing out most notable, and unprecedented impacts on human health, totally changed way we look at The sector all around globe are leapfrogging, adopting technology, helping in transforming drastically a very short span time. However, as more number medical devices being connected to IoMT, security issues like ensuring authenticity integrity transmitted data also rise....

10.1093/comjnl/bxac100 article EN The Computer Journal 2022-07-26

Audit logs are one of the most important tools for transparently tracking system events and maintaining continuous oversight in corporate organizations enterprise business systems. There many cases where audit contain sensitive data, or enormous. In these situations, dealing with a subset data is more practical than entire set. To provide secure solution to handle issues, sanitizable signature scheme (SSS) viable cryptographic primitive. Herein, we first present post-quantum...

10.48550/arxiv.2312.16322 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Secure multiparty computation (MPC) schemes allow two or more parties to conjointly compute a function on their private input sets while revealing nothing but the output. Existing state-of-the-art number-theoretic-based designs face threat of attacks through quantum algorithms. In this context, we present secure MPC protocols that can withstand attacks. We first design and analysis an information-theoretic oblivious linear evaluation (OLE), namely ${\sf qOLE}$ in domain, show our is safe...

10.48550/arxiv.2312.16318 preprint EN cc-by arXiv (Cornell University) 2023-01-01
Coming Soon ...