top of page

Research Topic

Design and Analysis of Isogeny-based Protocols
 

Many classical cryptosystems today rely on the computational hardness of mathematical problems like integer factorization or discrete log problem to ensure their security. The recent advancement of quantum computing has challenged the security of these cryptosystems. This has renewed interest in designing cryptosystems that can withstand quantum attacks and remain secure in the post-quantum world. 

​

My research primarily focuses on isogeny-based cryptography, a fairly young and promising post-quantum cryptography with sophisticated algebraic structures and unique security properties. Isogeny-based protocols are particularly appealing for very small keys compared to other post-quantum cryptography candidates, saving on bandwidth and storage. I aim at making a significant advancement to the field of isogeny-based cryptography by developing novel protocols and analyzing the security of our scheme in the post-quantum era. I have already designed protocols like key-oblivious encryption, signcryption, identity-based signatures, deterministic wallets, puncturable signatures and group key exchange protocols based on isogenies.  I am hoping to explore the other primitives in the isogeny world in the near future.

Publication

Conferences

  1. Compact Adaptor Signature from Isogenies with Enhanced Security      Pratima Jana, Surbhi Shaw and Ratna Dutta                                             In Proceedings of CANS 2024

  2. Compact Identity-based Signature and Puncturable Signature from SQISign  Surbhi Shaw and Ratna Dutta                                                                           In Proceedings of ICISC 2023

  3. Compact Stateful Deterministic Wallet from Isogeny-Based Signature Featuring Uniquely Rerandomizable Public Keys                                    Surbhi Shaw and Ratna Dutta                                                                         In Proceedings of CANS 2023

  4. Key-Oblivious Encryption from Isogenies with application to Accountable Tracing Signatures                                                     Surbhi Shaw and Ratna Dutta                                                                   In Proceedings of Indocrypt 2021

  5. Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies                                                                   Surbhi Shaw and Ratna Dutta                                                                    In Proceedings of ProvSec 2021

​​​​

​​

​​

​​

​

​​

Journals

  

  1. Forward secure offline assisted group key exchange from isogeny-based blinded key encapsulation mechanism                                               Surbhi Shaw and Ratna Dutta                                                                       IEEE transactions on Information Theory 2023

  2. A Quantum Resistant Multi-user Signcryption scheme featuring Key Invisibility for Internet of Things                                                        Surbhi Shaw and Ratna Dutta                                                                        Journal of Information Security and Application (JISA) 2023   

  3. Post-quantum secure identity-based signature achieving forward secrecy                                                                                                 Surbhi Shaw and Ratna Dutta                                                                        Journal of Information Security and Application (JISA) 2022          

Internship/ Project Work

2022

Completed Internship at NTT Research, Sunnyvale, USA under Dr. Pratish Dutta from Feb-Oct 2022.

2019

Application of Linear Algebra in Page Rank

Supervisor   : Prof. Avishek Adhikari
Description : In this project, we have came up with different Page Rank algorithms from linear algebra point of view and also from dynamical and probabilistic point of view.

2018

p-adic Analysis Compared with Real

Supervisor    : Prof. Avishek Adhikari
Description : In this project, we confined our considerations into the description of p-adic norm and the field of p-adic numbers. We mentioned some of its beautiful features and some of its warts, the sole
sole purpose of such discussion is to compare the topology of field of p-adic numbers with topology of reals.

bottom of page