Assistant Professor

Dr Sabyasachi Dutta

Department of Computer Science and Engineering

Interests

  • Leakage resilient cryptography
  • Password protected authentication mechanisms
  • Privacy preserving machine learning

Education

2005

University of Calcutta
India

B Sc

2008

University of Calcutta
India

M Sc

2016

University of Calcutta
India

PhD

Experience

  • June 2017 to June 2018 - Visiting Scientist - R.C. Bose Centre for Cryptology and Security, Indian Statistical Institute, Kolkata, India.
  • July 2018 to June 2018 - Guest Researcher - Kyushu University, Fukuoka, Japan.
  • October 2019 to May 2023 - Postdoctoral Associate - University of Calgary, Canada.
  • June 2023 to August 2023 - Visiting Scientist - TCG CREST, Kolkata, India.
  • Research Interest

  • Leakage-resilient cryptography: It provides security against adversaries who have access to the implementation of cryptographic systems and have access to partially leaked secret states and/or local computations.
  • Password-based authentication mechanisms: Password protected systems require users to submit their username and password which are then compared against the stored credentials in the system's database. Due to the low entropy of password distribution, password based authentication systems are vulnerable to offline dictionary attacks. The goal is to design protocols which resist such attacks.
  • Privacy preserving machine learning: It employs techniques to allow multiple data sources to collaboratively train machine learning models without revealing private or sensitive data.
  • Awards & Fellowships

  • 2006 - NBHM (M.Sc.) scholarship - National Board of Higher Mathematics, DAE, Govt. of India.
  • 2008 – Junior Research Fellowship – Council of Scientific and Industrial Research (CSIR).
  • 2018 – International Invitation Program grant for postdoctoral research – National Institute of Information and Communications Technology (NICT), Japan.
  • 2021 – MITACS Accelerate Award for Post-quantum secure cryptography for blockchain technology – MITACS, Canada.
  • Publications

    Journals

  • Learning asymmetric encryption using adversarial neural networks – I. Meraouche, Sabyasachi Dutta, H. Tan, K. Sakurai, Engineering Applications of Artificial Intelligence 123, pp. 106220, Elsevier (2023).
  • Quantum multi-secret sharing via trap codes and discrete quantum walks– S. S. Chaudhury, Sabyasachi Dutta Quantum Information Processing 21(11), pp. 1-27, Springer US (2022).
  • Learning multi-party adversarial encryption and its application to secret sharing – I. Meraouche, Sabyasachi Dutta, S. K. Mohanty, I. Agudo, K. Sakurai IEEE Access 10, pp. 121329-121339 (2022).
  • Practical Attacks on a Class of Secret Image Sharing Schemes based on Chinese Remainder Theorem – S. K. Sahoo, A. Adhikari, Sabyasachi Dutta Computers and Electrical Engineering 100, pp. 107924, Elsevier (2022).
  • Neural Networks Based Cryptography: A Survey – I. Meraouche, Sabyasachi Dutta, H. Tan, K. Sakurai IEEE Access 9 : pp. 124727-124740, IEEE (2021).
  • Maximal Contrast Color Visual Secret Sharing Schemes – Sabyasachi Dutta, A. Adhikari, S. Ruj Des. Codes Cryptogr. 87(7), pp. 1699-1711, Springer (2019).
  • Constructions and Analysis of some Efficient t-(k; n)*-Visual Cryptographic Schemes Using Linear Algebraic Techniques – Sabyasachi Dutta, R. S. Rohit, A. Adhikari Des. Codes Cryptography 80(1), pp. 165-196, Springer (2016).
  • Conferences

  • Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing - Sabyasachi Dutta, Shaoqian Jiang, & Reihaneh Safavi-Naini, to appear at the proceedings of CANS (2023).
  • A Systematic Study of Bulletin Board and Its Application – M. -H Suwito, B. -A Tama, B. Santoso, S. Dutta, H. Tan, Y. Ueshige, K. Sakurai. 17th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2022 ), 1213-1215, ACM (2022).
  • Leakage Resilient Cheating Detectable Secret Sharing Schemes – Sabyasachi Dutta, Reihaneh Safavi-Naini. Proc. of The 26th Australasian Conference on Information Security and Privacy (ACISP 2021 ), pp. 3-23, LNCS 13083, Springer (2021).
  • Password Protected Secret Sharing from Lattices – P. S. Roy, Sabyasachi Dutta, W. Susilo, R. Safavi-Naini. Proc. of The 14th International Conference on Network and System Security (ACNS (1) 2021 ), pp. 442-459, LNCS 12726, Springer (2021).
  • A Distributed Ledger Management Mechanism for Storing and Selling Private Data – Sabyasachi Dutta, A. Paul, R. H. Ozaki, C. Pandu Rangan, K. Sakurai. Proc. of The IEEE Conference on Dependable and Secure Computing, (DSC 2021 ), pp. 1-8, IEEE (2021).
  • Perpetual Secret Sharing from Dynamic Data Structures – S. S. Chaudhury, Sabyasachi Dutta, K. Sakurai. Proc. of The IEEE Conference on Dependable and Secure Computing, (DSC 2021 ), pp. 1-8, IEEE (2021).
  • AC^0 constructions of secret sharing schemes: Accommodating new parties – S. S. Chaudhury, Sabyasachi Dutta , K. Sakurai. Proc. of The 14th International Conference on Network and System Security (NSS 2020 ), LNCS 12570, pp. 292-308, Springer (2020).
  • Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency – J. Pramanik, S. Dutta, P. S. Roy, A. Adhikari. Proc. of The 16th International Conference on Information Systems Security (ICISS 2020 ), LNCS 12553, pp. 169-184, Springer (2020).
  • Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings – S. Dutta, K. Sardar, A. Adhikari, S. Ruj, K. Sakurai. Proc. of The 16th International Conference on Information Systems Security (ICISS 2020 ), LNCS 12553, pp. 198-217, Springer (2020).
  • 3-Party Adversarial Steganography – I. Meraouche, Sabyasachi Dutta , K. Sakurai. Proc. of The 21st International Conference on Information Security Applications ( WISA 2020 ), LNCS 12583, pp. 89-100, Springer (2020).
  • 3-Party Adversarial Cryptography – Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai. Proc. of The 8th International Conference on Emerging Internet, Data & Web Technologies (EIDWT-2020), LNDECT 47, pp. 247-258, Springer (2020).
  • Verifiable E-Voting with Resistance against Physical Forced Abstention Attack – M. H. Suwito, Sabyasachi Dutta. Proc. of The International Workshop on Big Data and Information Security (IWBIS 2019 ), pp. 85-90, IEEE (2019).
  • Secret Sharing on Evolving Multi-level Access Structure – Sabyasachi Dutta, P. S. Roy, K. Fukushima, S. Kiyomoto, K. Sakurai. Proc. of The 20th International Conference on Information Security Applications (WISA 2019 ), LNCS 11897, pp. 180-191, Springer (2020).
  • Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing – Y. Desmedt, Sabyasachi Dutta , Kirill Morozov. Proc. of The 18th International Conference on Cryptology and Network Security (CANS 2019 ), LNCS 11829, pp. 291-307, Springer (2019).
  • Deniable Secret Handshake Protocol - Revisited – Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai. Proc. of The 33rd International Conference on Advanced Information Networking and Applications (AINA 2019 ), AISC 926 , pp. 1266-1278, Springer (2019).
  • Visual Secret Sharing Scheme with Distributed levels of Importance of Shadows – S. Dutta, T. Bhore, Md K. Sardar, A. Adhikari, K. Sakurai. Proc. of the 5th International Conference on Mathematics and Computing (ICMC 2019), AISC 1170, Springer (2020).
  • Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited – Sabyasachi Dutta. Kouichi Sakurai. Proc. of the 5th International Conference on Mathematics and Computing (ICMC2019), AISC 1170, pp. 97-109, Springer (2020).
  • Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters – J. Pramanik, P. S. Roy, S. Dutta, A. Adhikari, K. Sakurai. Proc. of The 14th International Conference on Information Systems Security (ICISS 2018 ), LNCS 11281, pp. 171-188, Springer (2018).
  • Hierarchical Secret Sharing Schemes Secure against Rushing Adversary: Cheater Identification and Robustness – P. S. Roy, S. Dutta, K. Morozov, A. Adhikari, K. Fukushima, S. Kiyomoto, K. Sakurai. Proc. of The 14th International Conference on Information Security Practice and Experience (ISPEC 2018 ), LNCS 11125, pp. 578-594, Springer (2018).
  • Secure Computation of Inner Product of Vectors with Distributed Entries and its Applications to SVM – S. Dutta, N. Nikam, S. Ruj. Proc. of The 14th International Conference on Information Security Practice and Experience (ISPEC 2018 ), LNCS 11125, pp. 533-543, Springer (2018).
  • Contrast Optimal XOR Based Visual Cryptographic Schemes – Sabyasachi Dutta, Avishek Adhikari. Proc. of The 10th International Conference on Information Theoretic Security (ICITS 2017), LNCS 10681, pp. 58-72, Springer (2017).
  • On the Robustness of Visual Cryptographic Schemes – S. Dutta, P. S. Roy, A. Adhikari, K. Sakurai. Proc. of The 15th International Workshop on Digital-forensics and Watermarking, IWDW 2016, LNCS 10082, pp. 251-262, Springer (2017).
  • XOR Based Non-monotone t-(k; n)*-Visual Cryptographic Schemes Using Linear Algebra – Sabyasachi Dutta, Avishek Adhikari. Proc. of The 16th International Conference on Information and Communications Security, ICICS 2014, LNCS 8958, pp. 230-242, Springer (2015).
  • Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture – A. Das, S. Dutta, A. Adhikari. Proc. of The 7th International Conference on Provable Security, ProvSec 2013, LNCS 8209, pp. 104-120, Springer (2013).
  • Contact Details

    • E-mail id:sabyasachi.d@srmap.edu.in
    TOP