Pratish Datta

Orcid: 0000-0002-3938-7594

According to our database1, Pratish Datta authored at least 39 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fully Adaptive Decentralized MA-ABE: Simplified, Optimized, ASP Supported.
IACR Cryptol. ePrint Arch., 2025

(Multi-Input) FE for Randomized Functionalities, Revisited.
IACR Cryptol. ePrint Arch., 2025

Incrementally Verifiable Computation for NP from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Adaptively Secure Streaming Functional Encryption.
IACR Cryptol. ePrint Arch., 2024

Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Short attribute-based signatures for arbitrary Turing machines from standard assumptions.
Des. Codes Cryptogr., May, 2023

Decentralized Multi-authority ABE for sfNC<sup>1</sup> from BDH.
J. Cryptol., April, 2023

Registration-Based Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

Decentralized Multi-Authority Attribute-Based Inner-Product FE: Large Universe and Unbounded.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Fully Adaptive Decentralized Multi-Authority ABE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH.
IACR Cryptol. ePrint Arch., 2021

Decentralized Multi-authority ABE for DNFs from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Constrained pseudorandom functions from functional encryption.
Theor. Comput. Sci., 2020

2019
Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions.
J. Inf. Secur. Appl., 2019

Constrained Pseudorandom Functions for Turing Machines Revisited: How to Achieve Verifiability and Key Delegation.
Algorithmica, 2019

Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

2018
Functional Signcryption.
J. Inf. Secur. Appl., 2018

Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Constrained (Verifiable) Pseudorandom Function from Functional Encryption.
Proceedings of the Information Security Practice and Experience, 2018

Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Strongly full-hiding inner product encryption.
Theor. Comput. Sci., 2017

Attribute-Based Signatures for Turing Machines.
IACR Cryptol. ePrint Arch., 2017

Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

2016
Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs.
IACR Cryptol. ePrint Arch., 2016

Functional Encryption for Inner Product with Full Function Privacy.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method.
IACR Cryptol. ePrint Arch., 2015

Functional Signcryption: Notion, Construction, and Applications.
Proceedings of the Provable Security, 2015

General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps.
Proceedings of the Information Security - 18th International Conference, 2015

Fully Secure Online/Offline Predicate and Attribute-Based Encryption.
Proceedings of the Information Security Practice and Experience, 2015

Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher.
IACR Cryptol. ePrint Arch., 2014

A New Variant of Algebraic Attack.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

A Probabilistic Algebraic Attack on the Grain Family of Stream Ciphers.
Proceedings of the Network and System Security - 8th International Conference, 2014

Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups.
Proceedings of the Information Security - 17th International Conference, 2014

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014


  Loading...