Research Interest –
1. Broadcast Encryption
2. Predicate Encryption
3. Private Information Retrieval
List of Publications –
K. Acharya,A.K.Singh and S. Mukhopadhyay, Constructions of broadcast encryption with personalized messages from bilinear map, Computer Communications (2023), https://doi.org/10.1016/j. comcom.2023.06. 023.
A.K.Singh, K. Acharya and S. Mukhopadhay. Post-quantum secure recipient revocable broadcast encryption supporting anonymity Multimed Tools Appl (2023). https://doi.org/10.1007/s11042-023-15435-5.
3. A.K. Singh, K. Acharya and R. Dutta. Cloud Assisted Semi-static Secure Accountable Authority Identity-based Broadcast Encryption Featuring Public Traceability without Random Oracles. Annals of Telecomm- unications (2022). https://doi.org/10.1007/s12243-022-00925-8.
4. K. Acharya and R. Dutta. Constructing Provable Secure Broadcast Encryption Scheme with Dealership. Journal of Information Security and Applications, 58:102736, 2021
5. K. Acharya. (Single author) Secure and Efficient Public Key Multi-Channel Broadcast Encryption Schemes. Journal of Information Security and Applications 51:102436, 2020.
6. K. Acharya and R. Dutta. Ternary subset difference revocation in public key framework supporting outsider anonymity. J Ambient Intell Human Comput (2020). https://doi.org/10.1007/s12652-020-02319-x.
7. K. Acharya and R. Dutta. Secure and Efficient Construction of Broadcast Encryption with Dealership, In: L. Chen, J. Han (eds.) ProvSec 2016 , vol.10005 of Lecture Notes in Computer Science, pages 277-295. Springer, 2016.
8. K. Acharya and R. Dutta. Adaptively secure broadcast encryption with dealership, In: S. Hong, J. H. Park (eds.) ICISC 2016, vol. 10157 of Lecture Notes in Computer Science, pages 161-177. Springer, 2017.
9. K. Acharya and R. Dutta. Provable Secure Constructions for Broadcast Encryption with Personalized Messages. In: T. Okamoto, Y. Yu, M. Au, Y. Li (eds.) ProvSec 2017, vol. 10592 of Lecture Notes in Computer Science, pages 329-348 Springer, 2017.
10.K. Acharya and R. Dutta. Recipient Revocable Broadcast Encryption Schemes without Random Oracles. In: H. Kim, DC. Kim (eds.) Information Security and Cryptology – ICISC 2017. vol. 10779 of Lecture Notes in Computer Science, pp 191-213, Springer, 2018.
11.K. Acharya and R. Dutta. Constructions of Secure Multi-Channel Broadcast Encryption Schemes in Public Key Framework. In: J. Camenisch, P. Papadimitratos (eds) CANS 2018, vol 11124 of Lecture Notes in Computer Science, pages 495-515, Springer, 2018.
12. V. Sreekanth, K. Acharya, RS Chakraborty, I. Chakrabarti: Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints. ICISS 2023: 77-87
13. K. Acharya and R. Bhattacharyya. Public Revocable Predicate Encryption (Communicated).
14. K. Acharya. Subset Predicate Encryption Supporting a Wholesaler (Communicated).