Jaydeep Howlader
National Institute of Technology, Durgapur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jaydeep Howlader.
international conference on contemporary computing | 2009
Jaydeep Howlader; Anushma Ghosh; Tandra Pal
The auction scheme that provides receipt-freeness, prevents the bidders from bid-rigging by the coercers. Bid-rigging is a dangerous attack in electronic auction. This happen if the bidder gets a receipt of his bidding price, which proves his bidding prices, from the auction protocol. The coercers used to force the bidders to disclose their receipts and hence bidders lose the secrecy of their bidding prices. This paper presents a protocol for a receipt-free, sealed-bid auction. The scheme ensures the receipt-freeness, secrecy of the bid, secrecy of the bidder and public verifiability.
Security and Communication Networks | 2015
Jaydeep Howlader; Ashis Kumar Mal
Sealed-Bid auction is an efficient and rational way to establish the price and trading goods in the open market. However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms are proposed to prevent bid-rigging. So far, all the proposed receipt-free mechanisms are based on strict assumptions: i The channel between bidders and the auction authorities like auctioneer, sealer, registering authority etc. must be untappable, 2 the authorities are assumed to be honest not colluded, hence ensure privacy and anonymity of bids. Moreover, the existing receipt-free mechanisms are bandwidth intensive estimated difference between the minimum and maximum bidding price. In this paper, we present a receipt-free sealed-bid auction mechanism which can withstand public channel and colluded authorities. The proposed mechanism can work even under the situation where all the authorities except one are colluded. Unlike the existing mechanisms, the computational complexity of the proposed mechanism is independent of the bandwidth and only depends on the number of valid bids. The auction mechanism requires Omlogm computational steps to resolve the winner, where m is the number of valid bids in the system. Copyright
international conference on information security and cryptology | 2013
Jaydeep Howlader; Sanjit Kumar Roy; Ashis Kumar Mal
Sealed-Bid auction is an efficient and rational method to establish the price in open market. However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms were proposed to prevent bid-rigging. The prior receipt-free mechanisms are based on two assumptions; firstly, existence of untappable channel between bidders and auction authorities. Secondly, mechanisms assume the authorities to be honest (not colluding). Moreover the bandwidth required to communicate the receipt-free bids is huge. This paper presents a sealed-bid auction mechanism to resist bid-rigging. The proposed method does not assume untappable channel nor consider the authorities to be necessarily honest. The proposed mechanism also manages the bandwidth efficiently, and improves the performance of the system.
international conference on information systems security | 2012
Jaydeep Howlader; Jayanta Kar; Ashis Kumar Mal
Coercion in sealed-bid auction refers to the problem of bid-rigging, where the adversary (coercer) dictates the bidder (coerced bidder) to bid some low value and also feasible to determine whether the victim has complied with the demands. Therefore uncoerciveness is an essential property to achieve fair and competitive sealed-bid auction. Receipt-free mechanisms are developed to confine the property of uncoerciveness. The prior receipt-free schemes assume an impractical assumption of the availability of an untappable channel between bidders and the auction authorities. Our previous work proposed a sender-side deniable encryption scheme to relax the assumption of the untappable channel where the receiver side is not colluded. However, we examined that neither the untappable channel nor the deniable encryption can provide receipt-freeness in presence of colluded authorities unless the privacy of the bidders are not preserved. MIX (MIX-cascade) is a well known technique for anonymous communication. This paper presents a MIX scheme compatible with deniable encryption to facilitate the receipt-freeness mechanisms to be practical without the assumption of untappable channel and also in the presence of colluded authorities. The proposed MIX may replace the untappable channel without changing the existing receipt-free mechanisms.
international conference of distributed computing and networking | 2015
S. Choudhury; Vivek Nair; Jaydeep Howlader; B. Choudhury; Ashis Kumar Mal
Optical burst switching (OBS) is considered as one of the most potential technology for implementation of transparent optical Internet in near future. In this paper we propose an integrated scheme for loss reduction and efficient resource utilization in OBS. We develop a framework for computation of estimated space-time loss surface in space-time plane for a burst over the network and utilise it to determine the most appropriate route and corresponding offset-time for the burst. The integrated routing and offset-time adaptation scheme proposed here, can simultaneously offer significantly lower burst loss rate and higher network-wide resource utilisation.
international test conference | 2010
G. Praveen Kumar; Biswas Parajuli; Arjun Kumar Murmu; Prasenjit Choudhury; Jaydeep Howlader
The Internet traffic is increasing day by day. Also, secure data communication is the need of the hour. But the standard compression techniques which are in use, are independent and do not consider the security issues. Hence, we present a general encoding technique for secure data communication over a language
Archive | 2014
Abhijit Chowdhury; Shubhajit Nath; Jaydeep Howlader
L
international conference on computer science and information technology | 2011
Jaydeep Howlader; Vivek Nair; Saikat Basu
with a finite alphabet set
advances in recent technologies in communication and computing | 2009
Jaydeep Howlader; Saikat Basu
\sum
International Journal of Network Security & Its Applications | 2011
Jaydeep Howlader; Vivek Nair; Saikat Basu; Ashis Kumar Mal
. The encoded message is a bi-tuple of which, the first is a vector of quotients denoted as