Associate Professor, Department of Computer Science and Engineering
Research Area : Information Security, Cryptography, Cloud Security, Key Management, Security Analytics
Email:puru@nitgoa.ac.in
Name: Dr. Purushothama B.R
Gender: Male
Birth Date-:
Designation: Associate Professor
Department: Department of Computer Science and Engineering
URL
Date of Joining: 01/07/2013
Research/Teaching Experience: 14 years of Teaching Experience/8 years of Research Experience
Address: Dr. Purushothama B R, Associate Professor, Department of Computer
Science and Engineering, NIT Goa, Kottamoll Plateau,
Cuncolim Municipal Area,
Salcete Taluka,
South Goa District, Goa - 403703
Email Address: puru@nitgoa.ac.in
Phone [Residence]-
Phone [Mobile]-
Office Extension:
Information Security
Cryptography
Cloud Security
Key Management
Security Analytics
Design and Analysis of Algorithms
Applied Algorithms
Theory of Computation
Number Theory and Cryptography
Discrete Mathematics
Data Structures
Advanced Data Structures
Computational Complexity
UNIX System Programming
Distributed Computing and Operating Systems
Cloud Computing
Advanced Operating Systems
Web Development Using LAMP
Object Oriented Programming (C++ and Java)
Advanced Algorithms and Analysis
Foundations of Cryptography
Design of Secure Protocols
Degree/Diploma |
Institute / University |
Year |
Subject |
---|---|---|---|
M.Tech |
National Institute of Technology Karnataka Surathkal |
2009 |
Computer Science and Engineering |
Ph.D. |
National Institute of Technology Warangal |
2014 |
Computer Science and Engineering |
Publication Type: Journal
Publication Category: Internationa Payal Sharma and Purushothama B R, "Cryptanalysis of a secure and efficient Diffie–Hellman based key agreement scheme.", International Journal of Information Technology. [Available online,Scopus indexed] JAN 2023
Publication Category: International Payal Sharma, B. R. Purushothama: BP-MGKM: An efficient multi-group key management scheme based on bivariate polynomial. Comput. Networks 216: 109244 (2022)[SCIE indexed] SEPT 2022
Publication Category: International Payal Sharma and Purushothama B R, "Securing polynomial based group key management scheme against strong active adversary model.", International Journal of Information Technology. Vol 14, pp.2329–2334 , Springer. [Scopus indexed] JUN 2022
Publication Category: International Shravani Mahesh Patil, Purushothama B R, "QC-PRE: Quorum Controlled Proxy Re-encryption Scheme for Access Control Enforcement Delegation of Outsourced Data", International Journal of Information and Computer Security, Vol.18 No.1/2, pp.165 - 192 MAY 2022
Publication Category: International Gaurav Pareek and Purushothama B R, “TP-PRE: Threshold Progressive Proxy Re-Encryption, Its Definitions, Construction and Applications”, Journal of Ambient Intelligence and Humanized Computing, Vol. 12, No. 4, 2021, pp. 1943-1965, Springer, DOI: 10.1007/s12652-020-02285-4. [SCIE indexed, IF = 7.104] JULY 2021
Publication Category: International Shilpee Prasad and Purushothama B R, “CCA Secure and Efficient Proxy Re-Encryption Scheme Without Bilinear Pairing”, Journal of Information Security and Applications, Vol. 58, 2021, pp. 102703, Elsevier, DOI: 10.1016/j.jisa.2020.102703. [SCIE indexed, IF = 3.872] MAY 2021
Publication Category: International Gaurav Pareek and Purushothama B R, “Secure and Efficient Revocable Key-Aggregate Cryptosystem for Multiple Non-Predefined Non-Disjoint Aggregate Sets”, Journal of Information Security and Applications, Vol. 58, 2021, pp. 102799, Elsevier, DOI: 10.1016/j.jisa.2021.102799. [SCIE indexed, IF = 3.872] MAY 2021
Publication Category: International Payal Sharma, Purushothama B R. Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game. SN Computer Science, Vol. 2, No, 4, pp. 261, 2021.[Scopus indexed] MAY 2021
Publication Category: International Shravani Mahesh Patil, Purushothama B R, “Pixel Co-Ordinate-Based Secret Image Sharing Scheme with Constant Size Shadow Images”, Computers and Electrical Engineering, Vol. 89, pp. 106937, 2021, Elsevier, DOI: 10.1016/j.compeleceng.2020.106937. [SCIE indexed, IF = 4.152] JAN 2021
Publication Category: International Gaurav Pareek and Purushothama B R. "Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance". Journal of Information Security and Applications, Elsevier. Vol. 54 pp. 102543 [SCIE indexed] JUN 2020
Publication Category: International Shravani Mahesh Patil, Purushothama BR. DR-PRE: dual receiver proxy re-encryption scheme. Information Security Journal: A Global Perspective, Volume 29 Issue 2 Pages 62-72 Taylor & Francis. MAR 2020
Publication Category: International Shravani Mahesh Patil, BR Purushothama. Non-transitive and collusion resistant quorum controlled proxy re-encryption scheme for resource constrained networks. Journal of Information Security and Applications, Elsevier, Volume 50. FEB 2020
Publication Category: International Gaurav Pareek and Purushothama B R. "Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies". Sadhana - Academy Proceedings in Engineering Sciences, Springer. Vol. 44 Issue 12. pp. 235:1-235:17 DEC 2019
Publication Category: International Gaurav Pareek and Purushothama B R. “Blockchain-Based Decentralized Access Control Scheme for Dynamic Hierarchies”. International Journal of Information and Computer Security. (Accepted for publication, in Press). JAN 2019
Publication Category: International Shravani M. Patil and B. R. Purushothama, On the Security of Combinatorial Design Based Group Key Management Scheme, Journal of Information System Security. Vol. 15 Issue 2, pp. 101-116. [Scopus indexed] 2019
Publication Category: International Gaurav Pareek and B R Purushothama. Proxy Re-encryption based Provably Secure Group Key Management Scheme with Constant Public Bulletin Size and Key Derivation Time. Sadhana, Springer. Vol 43, Issue 9, 2018. pp. 137-149. JULY 2018
Publication Category: International Gaurav Pareek, Purushothama B R, "Provably secure group key management scheme based on proxy re-encryption with constant public bulletin size and key derivation time", Sadhana – Academy Proceedings in Engineering Sciences, Vol 43, No. 9, 2018, pp. 137:1-137:13, Springer, DOI: 10.1007/s12046-018-0917-8. [SCIE indexed, IF = 1.188] JULY 2018
Publication Category: International B R Purushothama and B B Amberker. Access Control Mechanisms for Outsourced Data in Public Cloud Using Polynomial Interpolation and Multilinear Map. International Journal of Cloud Computing. Vol 6, Issue 1, 2017. pp. 1-31 2017
Publication Category: International Nishat Koti and B R Purushothama. Group Oriented Encryption with Constant Rekeying Cost. Security and Communication Networks, Vol 9. Issue 17, 2016, pp. 4120-4137. 2016
Publication Category: International Purushothama, B. R., and B. B. Amberker. "Provably secure public key cryptosystem with limited number of encryptions for authorised sharing of outsourced data." International Journal of Cloud Computing (IJCC), Vol. 4, No. 4, 2015: 317-334. JUN 2015
Publication Category: International Purushothama B R, B B Amberker, Secure group and multi-layer group communication schemes based on polynomial interpolation, Security and Communication Networks, Vol. 6, No. 6, pp. 735-756, June 2013.[SCIE indexed] JUN 2013
Publication Category: International Purushothama B R,Shrinath B, B B Amberker, Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud, International Journal of Information and Communication Technology vol.5, No.2, pp. 167-186, 2013 [Scopus indexed] JUN 2013
Publication Category: International Purushothama B R, B B Amberker Secure group key management scheme for simultaneous multiple groups with overlapped memberships using binomial key tree with new approach to key distribution and key computation, International Journal of Trust Management in Computing and Communications Vol.1, No.2, pp. 175-198,2013 JUN 2013
Publication Category: International Purushothama B R, B B Amberker, Duplication with Trapdoor Sensitive Attribute Values: A New Approach for Privacy Preserving Data Publishing, Elsevier Procedia Technology, Vol.6 NIT Rourkela, pp. 970-977, 2012 OCT 2012
Publication Category: International Shilpee Prasad and Purushothama B R, “Secure and Verifiable Outsourcing of Euclidean Distance and Closest Pair of Points with Single Untrusted Cloud Server”, International Journal of Internet Protocol Technology. Accepted for publication, currently in press, Inderscience Publishers. [Scopus indexed, Accepted]
Publication Category: International Payal Sharma and Purushothama B R, "User Driven General Framework to Cap the Joins in Secure Group Communication.", International Journal of Information and Computer Security. (Accepted for publication, in Press). [Scopus indexed]
Publication Type: Proceedings
Publication Category: International Payal Sharma, BR Purushothama. Analysis of Traditional Secure Group Key Management Schemes in Secure Multi-group Communication. 2020 International Conference on Communication and Signal Processing (ICCSP) Pages 195-199 IEEE JULY 2020
Publication Category: International Gaurav Pareek and Purshothama B R. "Flexible cryptographic access control through proxy re-encryption between groups." In Proceedings of the 20th International Conference on Distributed Computing and Networking (ICDCN’19), pp. 507-507. ACM, 2019. JAN 2019
Publication Category: International Shravani Mahesh Patil and Purshothama B R. "RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication." In Proceedings of the 15th International Conference on Distributed Computing and Internet Technology (ICDCIT’19), pp. 349-363. Springer LNCS, 2019. JAN 2019
Publication Category: International Gaurav Pareek, and Purushothama B R. "Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud." In Proceedings of the 14th International Conference on Information Systems Security (ICISS’18), pp. 251-271. Springer (LNCS), 2018. JAN 2019
Publication Category: International Gaurav Pareek, and Purushothama B R. "A Provably Secure Re-encryption-Based Access Control in Hierarchy." In Proceedings of the 5th International Conference on Advanced Computing, Networking, and Informatics (ICACNI’17), pp. 97-104. 2018. JUN 2018
Publication Category: International Sagar, P. R., Chakra, J. P. S., and Purushothama, B. R. "Pixel Position Based Efficient Image Secret Sharing Scheme." In Proceedings of the 5th International Conference on Advanced Computing, Networking, and Informatics (ICACNI’17), pp. 527-533. 2018. JUN 2018
Publication Category: International Gaurav Pareek and Purshothama B R. "Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost." In Proceedings of the 11th International Conference on Security of Information and Networks (SIN’18), pp. 10:1-10:7. ACM, 2018. 2018
Publication Category: International Sarvesh Sawant, Gaurav Pareek and B R Purushothama, Group Key Management Schemes under Strong Active Adversary Model: A Security Analysis, In Proceedings of 6th International Symposium on Security in Computing and Communication (SSCC’18) 19-22 September, 2018. (Accepted for publication) 2018
Publication Category: International Gaurav Pareek and B R Purushothama, A Proxy Visible Re-encryption Scheme with Application to Email Forwarding, In Proceedings of 10th International Conference on Security of Information and Networks, 2017 (SIN 2017), Manipal University Jaipur and MNIT Jaipur, October 13-15, 2017, pp. 212-217. [Adjudged BEST PAPER of the conference] OCT 2017
Publication Category: International B R Purushothama, Arun Prakash Verma, and Abhilash Kumar. Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem under Strong Active Outsider Adversary Model. In Proceedings of 5th International Symposium on Security in Computing and Communication (SSCC’17), Manipal, Karnataka, India, September 13-16, 2017, pp. 215-225. SEPT 2017
Publication Category: International Sarvesh Sawant, Gaurav Pareek and B R Purushothama. A Ringer-based Throttling Approach to Mitigate DDoS Attacks. In Proceedings of 5th International Symposium on Security in Computing and Communication (SSCC’17), Manipal, Karnataka, India, September 13-16, 2017, pp. 95-108. SEPT 2017
Publication Category: International Ashwini Choudhari, Gaurav Pareek and B R Purushothama, Security Analysis of Centralized Group Key Management Schemes for Wireless Sensor Networks under Strong Active Outsider Adversary Model. In Proceedings of 7th International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, Manipal Karnataka, India, September 13-16, 2017, pp. 1576-1581 SEPT 2017
Publication Category: International B R Purushothama and Arun Prakash Verma, Security Analysis of Group Key Management Schemes of Wireless Sensor Network under Active Outsider Adversary Model. In Proceedings of 7th International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017, Manipal Karnataka, India, September 13-16, 2017, pp. 988 - 994. SEPT 2017
Publication Category: International Gaurav Pareek and B R Purushothama, On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes, In Proceedings of 14th International conference on Security and Cryptography (SECRYPT’17), Madrid, Spain, July 24-26, 2017, pp. 519-524 JULY 2017
Publication Category: International Chandrasekhar Kuruba, Kethzi Gilbert, Prabhav Sidhaye, Gaurav Pareek, B R Purushothama, Outsource-Secured Calculation of Closest Pair of Points, In Proceedings of 4th International Symposium on Security in Computing and Communications, Springer, September 21-24, 2016, pp. 377-389. SEPT 2016
Publication Category: International Nishat Koti and B R Purushothama, Dynamic Access control in a hierarchy with constant key derivation cost, In Proceedings of Advanced Computing, Networking, and Informatics (ICACNI - 2016 ), Springer, NIT Rourkela, September 21-24, 2016, pp. 161-169. SEPT 2016
Publication Category: International Purushothama B R and B B Amberker, Polynomial Construction and Non-Tree Based Efficient Secure Group Key Management Scheme, Third International Symposium on Security in Computing and Communications (SSCC), Springer, pp 122-133, 2015. AUG 2015
Publication Category: International Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama, Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing, Third International Symposium on Security in Computing and Communications (SSCC-2015) - SSCC'15 Special Session on Cloud Security and Cryptography, 2015. AUG 2015
Publication Category: International Nishat Koti, Esha Keni, Krithika, Purushothama B R,Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost, ACM Third International Symposium on Women in Computing and Informatics (WCI-2015), pp. 564-572, 2015. AUG 2015
Publication Category: International Purushothama B R, Nishat Koti, Security Analysis of Tree and Non-tree Based Group Key Management Schemes Under Strong Active Outsider Attack Model, Fourth International Conference on Advances in Computing, Communications and Informatics (ICACCI) , pp 1825-1829, 1025. AUG 2015
Publication Category: International Purushothama B R, B B Amberker, On the Security of Group-based Proxy Re-encryption Scheme Cryptology ePrint Archive Report 2013/456, 2013 NOV 2013
Publication Category: International Purushothama B R, B B Amberker, Efficient Hierarchical Key Management Scheme Based on Polynomial Construction, International Symposium on Security in Computing and Communications (SSCC-13), pp 191-202, August 22-24, 2013. Mysore, August 2013 AUG 2013
Publication Category: International Purushothama B R, B B Amberker, Provable Data Possession Scheme with Constant Proof Size for Outsourced Data in Public Cloud, Second International Workshop on Cloud Computing & Identity Management (CloudID 2013), Mysore, 1662 - 1667,August 2013, AUG 2013
Publication Category: International Purushothama B R, B B Amberker, Secure Group Key Management Scheme Based on Dual Receiver Encryption System, 2013 ACM Asia Public-Key Cryptography in conjunction with 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 45-50, Hangzhou, China, May 2013 MAY 2013
Publication Category: International Purushothama B R, B B Amberker, Efficient Query Processing on Outsourced Encrypted Data in Cloud with Privacy Preservation, International Symposium on Cloud and Services Computing (ISCOS), NIT, Surathkal,pp.88-95, Dec 2012 [Best Paper Award] DEC 2012
Publication Category: International Purushothama B R, B B Amberker, Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), CCIS- Springer, Vol. 335, IIITM-Kerala, pp. 11-22, 2012 OCT 2012
Publication Category: International Purushothama B R, Kusuma Shirisha ,B B Amberker, Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), CCIS- Springer, Vol. 335, IIITM-Kerala, pp. 135-146, 2012 OCT 2012
Publication Category: International Purushothama B R, B B Amberker, Group key management scheme for simultaneous multiple groups with overlapped membership, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), CCIS- Springer, Vol. 335, IIITM-Kerala, pp. 11-22, 2012 OCT 2012
Publication Category: International Purushothama B R, B B Amberker, Access control mechanisms for outsourced data in cloud, Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), Bangalore, pp. 1-10, 2012 JAN 2012
Publication Category: International Purushothama B R, B B Amberker, Group key management scheme for simultaneous multiple groups with overlapped membership, Third International Conference on Communication Systems and Networks (COMSNETS 2011), Bangalore, pp. 1-10, 2011 JAN 2011
Publication Category: International Purushothama B R, Alwyn Roshan Pais, Design and implementation of secure internet based voting system with user anonymity using identity based encryption system, 6th IEEE International conference on services computing, Bangalore, pp. 474-481, 2009 AUG 2009
Publication Category: National Purushothama B R, Alwyn Roshan Pais, Secure Internet Based Voting System, eINDIA 2009 , Hyderabad, 2009 (Poster Presentation) AUG 2009
Ph. D scholar: Gaurav Pareek (awarded) Thesis title: Cryptographic Solutions for Secure Sharing of Outsourced Data
Ph.D Scholar: Payal Sharma (Joined:July-2018)
Ph.D Scholar: Ankit Chouhan (Joined:July-2021)
Gurunath (Joined: July 2021)
Pooja Dalvi (Co-Guide: Joined July 2021)
SERB sponsored project (Project No: ECR/2015/000428) titled “Development of Secure Key Management Protocols for Group Communication Under Active Outsider Attack Model”. Grant: Rs. 15,00,000. Role: Principle investigator.
IEEE - Member
ACM- member
Cryptology Research Society of India (CRSI)-Life Member
Sr.No. |
Month |
Year |
Training attended Information |
---|---|---|---|
1 |
JAN |
2019 |
15th International Conference on Distributed Computing and Internet Technology (ICDCIT), KIIT, Bhubaneshwar |
2 |
SEPT |
2017 |
5th International Symposium on Security in Computing and Communication (SSCC’17), Manipal, Karnataka, India, September 13-16, 2017. |
3 |
JUN |
2017 |
5th International Conference on Advanced Computing, Networking, and Informatics (ICACNI-2017), NIT Goa, India, June 1-3, 2017. |
4 |
DEC |
2016 |
A seven days Global Initiative of Academic Networks (GIAN) course on “Cyber Crime Investigation and Digital Forensics”, organized at NIT Goa, India, 30th Nov to 6th Dec, 2016. |
5 |
DEC |
2016 |
A ten days Global Initiative of Academic Networks (GIAN) course on “Privacy Preserving Data Mining”, organized at NIT Goa, India, 19-29 Dec, 2016. |
6 |
NOV |
2016 |
A ten days Global Initiative of Academic Networks (GIAN) course on “Public Key Infrastructure and Trust Management (PKI&TM)”, organized at NIT Goa, India, 5-14 Nov, 2016. |
7 |
SEPT |
2016 |
Advanced Computing, Networking, and Informatics (ICACNI - 2016), NIT Rourkela, September 21-24, 2016. |
8 |
AUG |
2015 |
International Symposium on Security in Computing and Communications Kochi, Kerala. |
9 |
AUG |
2015 |
Fourth International conference Advances in Computing, Communications and Informatics , Kochi, Kerala. |
10 |
AUG |
2015 |
Third ACM International symposium on Women in Computing and Informatics, Kochi, Kerala. |
11 |
SEPT |
2014 |
Information Security and Cryptography Workshop, National Institute of Technology Karnataka Surathkal, 15-16 September 2014. |
12 |
AUG |
2014 |
IEEE Authorhip workshop, Indian Institute of Science Bangalore, 12 August 2014. |
13 |
OCT |
2013 |
International Workshop on Cloud Computing & Identity Management (CloudID 2013) |
14 |
OCT |
2013 |
International Symposium on Security in Computing and Communications (SSCC-13), Mysore. |
15 |
MAY |
2013 |
2013 ACM Asia Public-Key Cryptography in conjunction with 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Hangzou, China. |
16 |
DEC |
2012 |
International Symposium on Cloud and Services Computing (ISCOS), NIT Surathkal. |
17 |
OCT |
2012 |
International Conference on Security in Computer Networks and Distributed Systems , IIITM Kerala |
18 |
OCT |
2012 |
International Conference on Communication, Computing & Security (ICCCS), NIT Rourkela |
19 |
JUN |
2012 |
Two week workshop on Introduction to Research Methodologies conducted by IIT Bombay from 25th June to 4th July 2012 |
20 |
MAR |
2012 |
Five day database security workshop at NIT Warangal from 5th March to 9th March 2012 |
21 |
NOV |
2011 |
Ethical Hacking event during Technozion 2011 at NIT Warangal |
22 |
AUG |
2009 |
e-INDIA |
23 |
AUG |
2005 |
Network Management and Network Simulation Using NS2 from 16th aug to 20th Aug 2005 at NMAMIT Karnataka |
Sr.No |
Month |
Year |
Training Conducted Information |
---|---|---|---|
1 |
OCT |
2015 |
Five Days National Workshop on Cryptography, Applications and Foundations of Data Science |
2 |
AUG |
2015 |
Two Days National Workshop on LaTeX for Technical Documentation |
3 |
OCT |
2013 |
Robotics Workshop at NIT Goa |