Info Display Policy
RTI
Forms
Site Map
How to Reach
Contact Us
Login
Alumni
Faculty
Staff
Library
Department of Computer Science & Engineering
The LNM Institute of Information Technology
CSE Homepage
Programmes
Under Graduate
Post Graduate
Ph.D
People
Faculty
Staff
Scholars
Research
Research Groups
InterMedia Reearch Group
Sponsored Research Projects
IPR
Research Areas
Centers
C3-SDF
CMLBDA
Events
The LNM Distinguished Lectures
Invited Lectures
Conferences/Workshops
FDPs
Infrastructure
Hardware and Software
Servers
Alumni
M.Tech
Ph.D
Quick Links
Departmental Directory
Student Achievement
Projects
Publications
Patent
Time Table
Newsletters
Contact Us
Faculty
Prof. Rahul Banerjee
Prof. Ravi Prakash Gorthi
Prof. Vishv Malhotra
Prof. Pandu Rangan
Prof. Philip L. Miller
Dr. Jayaprakash Kar
Dr. Preety Singh
Dr. Sakthi Balan Muthiah
Dr. Subrat Kumar Dash
Dr. Aloke Datta
Dr. Anugrah Jain
Dr. Anukriti Bansal
Dr. Bharavi Mishra
Dr. Indra Deep Mastan
Dr. Mohit Gupta
Dr. Md Imran Alam
Mr. Mukesh K Jadon
Mr. Nirmal Kumar Sivaraman
Dr. Ashish Kumar Dwivedi
Dr. Poonam Gera
Dr. Pawan Kumar
Dr. Poulami Dalapati
Dr. Ram Prakash Sharma
Dr. Rajbir Kaur
Dr. Saurabh Kumar
Dr. Shweta Bhandari
Dr. Shweta Saharan
Dr. Sudheer Kumar Sharma
Dr. Sunil Kumar
Dr. Varun Kumar Sharma
Mr. Vikas Bajpai
Staff
Mr. Shivam Maheshwari
Ms. Shivangee Singh
Mr. Manish Kumar Mittal
Mr. Dinesh Kumar Sharma
Dr. Jayaprakash Kar
Personal
Contact
Academic
Project
Research Publication
Training Attended
Training Conducted
Personal Information
Name
Dr. Jayaprakash Kar
Designation
Associate Professor & HoD
Department
Computer Science & Engineering
URL
Date of Joining
19/08/2016
Research Area :
Cryptology, Provable Security and Random Oracle, Blockchain Technology, Information and Cyber Security.
Courses Taught
UG Courses
Compiler Design, Formal Language and Automata Theory, District Mathematical Structure, Computer Security, Optimization Techniques & Applications, Cryptographic Algorithms, Coding Theory
PG Courses
Cryptographic Algorithms, Applied Cryptography
Contact Information
Address
Room No-2107, Department of Computer Science and Engineering, The LNM Institute of Information Technology, Post-Sumel, Via-Jamdoli,Jaipur-302031 Phone-1416(O), +91-141 5191820
City
JAIPUR
State
RAJASTHAN
Country
INDIA
Email Address
jayaprakashkar@lnmiit.ac.in
Phone [Mobile]
9460521977
Office Extension
9114135262
Academic Information
Degree/Diploma
Institute/ Organization
Year
Branch/Specialization
5
Visiting Researcher/Scientist
University Of Waterloo, Canada
2017
Electrical and Computer Engineering
4
Ph. D.
(Doctor of Philosophy )
School of Mathematics, Statistics and Computer Science, Utkal University, Bhubaneswar, India
2011
Computer Science
3
M. Tech.
(Master of Technology )
School of Mathematics, Statistics and Computer Science, Utkal University, Bhubaneswar, India
2004
Computer Science
2
M.Phil
(Master of Philosophy )
Sambalpur University, India
1996
Mathematics
1
M.Sc.
(Master of Science )
Sambalpur University, India
1995
Mathematics
Project Information
Name of Project
Total Cost of Project
Funding Agency
Duration From
Duration To
2
Construction of Scalable and Robust Signcryption Scheme for IoMT devices
595900
Data Security Council of India
2023
2024
3
Lightweight proxy re-encryption technology and its application in medical Internet of Thing
120000
National Foreign Specialized Program of the Ministry of Science and Technology of China
2022
2023
1
A Novel Construction of Online/Offline Signature Scheme in Random Oracles for Wireless Security
950000
Sponsored by Deanship of Scientific Research (Distinct Research Study), King Abdulaziz University, Kingdom of Saudi Arabia
2014
2015
Research Publications
1
Udit Bansal, Jayaprakash Kar, Ikram Ali, Kshirasagar Naik “ID-CEPPA: Identity-based Computationally Efficient Privacy-Preserving Authentication scheme for vehicle-to-vehicle communications”, Journal of Systems Architecture, Elsevier, DOI: https://doi.org/10.1016/j.sysarc.2021.102387 , Volume 123, 102387, February 2022. FEB 2022
IndexedIn :
[Scopus,WoS]
DOI :
https://doi.org/10.1016/j.sysarc.2021.102387
2
Nandini Dhakad, Jayaprakash Kar “EPPDP: An Efficient Privacy-preserving Data Possession with Provable Security in Cloud Storage”, IEEE Systems Journal, DOI: https://doi.org/ 10.1109/JSYST.2022.3159847 , April 2022 APRIL 2022
IndexedIn :
[Scopus,WoS]
DOI :
10.1109/JSYST.2022.3159847
3
Jayaprakash Kar, Khirasagar Naik and Tamer Mostafa Abdelkader “A Secure and Lightweight Protocol for Message Authentication in Wireless Sensor Networks”, IEEE Systems Journal, Volume: 15, Issue: 3, Sept. 2021. SEPT 2021
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-3.931
DOI :
10.1109/JSYST.2020.3015424
4
Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma and Jayaprakash Kar, Application of Consensus Protocols in Blockchain: A Research Survey, Security and Communication Networks, Wiley & Hindawi, Vol-2021, Article ID 6693731, https://doi.org/10.1155/2021/6693731 JAN 2021
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-1.791
DOI :
https://doi.org/10.1155/2021/6693731
5
Jayaprakash Kar, Xiaoguang Liu , Fagen Li “CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks”, Journal of Information Security and Applications, Elsevier, Volume 61, 102905, 2021. JULY 2021
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-3.872
DOI :
https://doi.org/10.1016/j.jisa.2021.102905
6
Jayaprakash Kar, ELDA: an efficient and low-cost protocol for data authentication for IoT, Wireless Network, Springer, July 31, 2021. JULY 2021
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-2.602
DOI :
https://doi.org/10.1007/s11276-021-02739-3
7
Neha Kumari, Jayaprakash Kar, Kshirasagar Naik, "PUA-KE: Practical User Authentication with Key Establishment and its Application in Implantable Medical Devices", Journal of Systems Architecture, Elsevier, Volume 120, 102307, November 2021. SEPT 2021
IndexedIn :
[Scopus,WoS,UGC CARE List]
DOI :
doi.org/10.1016/j.sysarc.2021.102307
8
Jayaprakash Kar, “Provably secure certificateless deniable authenticated encryption scheme”, Journal of Information Security and Applications, Elsevier, Volume 54, 102581, pp 2214-2126, October 2020. OCT 2020
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-3.872
DOI :
https://doi.org/10.1016/j.jisa.2020.102581
9
Jayaprakash Kar, Khirasagar Naik and Tamer Mostafa Abdelkader, An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security, IEEE Access, VOLUME- 7, pp: 184207 - 184220, 2019. DEC 2019
IndexedIn :
[Scopus,WoS,UGC CARE List] SCI, IF-3.367
DOI :
10.1109/ACCESS.2019.2960291
10
Jayaprakash Kar and Khirasagar Naik, “Security Analysis and Implementation issues of Signcryption Scheme for Smart card”, International Journal of Business & Cyber Security, Vol.1 Issue 2, pp: 24-36, 2017. JAN 2017
11
Jayaprakash Kar “A Study of Key Management Protocols for Multicast Encryption”, International Journal of Innovative, Computing, Information and Control, Vol.13, Issue-2, pp-559-574, 2017. MAR 2017
12
Jayaprakash Kar "Cryptanalysis of Provably Secure Certificateless Short Signature Scheme by Solving Linear Diophantine Equations, ICIC Express Letters, Japan, Volume 11, Issue 3, pp-619-624, 2017. MAR 2017
13
Jayaprakash Kar “Cryptanalysis and Improvement of an Identity-based Proxy Multi-signature scheme", 11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland, LNCS Springer, pp-291-300,2017. AUG 2017
14
Jayaprakash Kar & Kshirasagar Naik “Generic Construction of Certificateless Signcryption Scheme” 12th International Conference on Information Systems Security (ICISS 2016), Jaipur, India, Springer- LNCS 10063, pp. 489–498, 2016, DOI: 10.1007/978-3-319-49806-5 28. DEC 2016
15
F. A. Alahmari , Turki. A. Alqarni and Jayaprakash Kar, “ A Research Survey of Ring Signature Scheme and Implementation Issues”, International Journal of Security and Its Applications, Vol. 10, No. 6, 2016, pp: pp.295-304, 2016, DOI: 10.14257/ijsia.2016.10.6.28. JUN 2016
16
S. A. Alhumrani and Jayaprakash Kar, “Cryptographic Protocols for Secure Cloud Computing”, International Journal of Security and Its Applications, Vol. 10, No. 2, 2016, pp: 301-310, 2016, DOI: 10.14257/ijsia.2016.10.2.27. FEB 2016
17
Jayaprakash Kar and Manoj Ranjan Mishra, “Mitigating Threats and Security Metrics in Cloud Computing”, Journal of Information Processing Systems(JIPS), Korea, Vol: 12, No: 2, pp: 226 - 233, 2016,DOI: 10.3745/JIPS.03.0049. MAY 2016
18
Jayaprakash Kar, Anser Ghazzaal Ali Alquraishee and Naomie Salim “ Short Online/Off-line Signature Scheme for Wireless Sensor Networks”, International journal of Information Security and Privacy(IJISP), IGI global, Vol. 9, No.1, pp: 47-61, 2015 , DOI: 10.4018/IJISP.2015010103. MAR 2015
19
Abeer M. AlMutairi , Rawan Abdullah Turdi AlBukhary and Jayaprakash Kar “ Security and Privacy of Big Data in Various Applications”, International Journal of Big Data Security Intelligence, SERSC, Korea, Vol.2, No.1, pp.19-24, 2015, doi: http://dx.doi.org/10.14257/ijbdsi.2015.2.1.03. JAN 2015
20
Jayaprakash Kar “Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles”, International Journal of Network Security, Taiwan, Vol.17, No.5, PP.580-587, 2015. MAY 2015
21
Jayaprakash Kar “Low Cost Scalar Multiplication Algorithms for Constrained Devices”, International Journal of Pure and Applied Mathematics, Vol.102, No.3, pp.579-592, 2015. doi: http://dx.doi.org/10.12732/ijpam.v102i3.14. MAR 2015
22
Manoj Ranjan Mishra, Jayaprakash Kar & Banshidhar Majhi, “Practical deployment of One-pass key establishment Protocol on Wireless Sensor Networks”, International Journal of Pure and Applied Mathematics, Vol(100), No-4, pp 531-542, 2015. Doi: http://dx.doi.org/10.12732/ijpam.v100i4.12. APRIL 2015
23
Jayaprakash Kar & Daniyal M. Alghazzawi “On Construction of Signcryption Scheme for Smart Card Security”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), US, pp-109-113, 2015. DOI: 10.1109/ISI.2015.7165948 MAY 2015
24
Jayaprakash Kar “Online/Offline Ring Signature Scheme with Provable Security”, IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), US, pp-197-197, 2015. DOI: 10.1109/ISI.2015.7165979 MAY 2015
25
Manoj Ranjan Mishra, Jayaprakash Kar & Banshidhar Majhi “One-Pass Authenticated Key Establishment Protocol on Bilinear Pairing for Wireless Sensor Networks" IEEE International Conference on Privacy and Security in Mobile Systems (PRISMS), 2014. pp-01-07 Doi: 10.1109/PRISMS.2014.6970595 MAY 2014
26
Jayaprakash Kar “A Novel Construction of Aggregate Signcryption Scheme for Smart Card” IEEE 2nd International Workshop on Cyber Security and Privacy (CSP), International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Cyber Security and Privacy, China, pp-06-13, 2013. Doi:10.1109/CyberC.2013.11. MAY 2014
27
Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks, “Case Studies in Secure Computing Achievements and Trends”, CRC Press, Taylor and Francis (New York), Chapter-04, Pages 67–88, Catalogue No- K21540, Print ISBN: 978-1-4822-0706-4, eBook ISBN: 978-1-4822-0707-1, DOI: 10.1201/b17352-5, 2014. 2014
28
A Novel Construction of Certificateless Signcryption Scheme for Smart Card, “Case Studies in Secure Computing Achievements and Trends”, CRC Press, Taylor and Francis (New York), Chapter-22, Pages 437–456, 2014, Catalogue No- K21540, Print ISBN: 978-1-4822-0706-4, eBook ISBN: 978-1-4822-0707-1, DOI: 10.1201/b17352-23, 2014. 2014
29
Anser Ghazzaal Ali Alquraishee and Jayaprakash Kar “ A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks ”, Contemporary Engineering Sciences, HIKARI Ltd, Vol.(07), 2014, no.3, 135-147, 2014. doi: http://dx.doi.org/10.12988/ces.2014.3949 MAR 2014
30
Jayaprakash Kar “Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network”, International Journal of Network Security, Taiwan, Vol.16 (01), PP.26-36, Jan. 2014. JAN 2014
31
Jayaprakash Kar “ID-based Deniable Authentication Protocol based on Diffie Hellman Problem on Elliptic Curve”, International Journal of Network Security, Taiwan, Vol.15 (05), PP.347-354, 2013. MAY 2013
32
Jayaprakash Kar, Daniyal M. Alghazzawi and Syed Hamid Hasan. “A Novel Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme with message recovery” INFORMATION-An International Interdisciplinary Journal, Japan Vol.16(01) (B), pp.807-814, Jan. 2013. JAN 2013
33
Jayaprakash Kar “Deniable Authentication Protocol based on Discrete Logarithms and Integer Factorization Problems” ICIC Express Letters, Japan, 2012. Vol. 7(07), pp 2061-2067, July 2013 JULY 2013
34
Jayaprakash Kar “'Provably Secure Signcryption Scheme based on -Diffie-Hellman Problem for Wireless Security'” 2nd IEEE International Workshop on Cyber Security and Privacy (CSP), International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), China, pp-31-37, 2013. Doi: 10.1109/CyberC.2013.15. MAY 2013
35
Jayaprakash Kar “Provably Secure Identity-Based Aggregate Signature Scheme” IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2012), Cyber Security and Privacy, China, pp 137-142, 2012. doi:10.1109/CyberC.2012.30 MAY 2012
36
Jayaprakash Kar “ID-based Deniable Authentication Protocol Suitable for Mobile devices” 3rd International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2011), Aalborg, Denmark, Springer- LNICST Vol-94, pp 160-171, 2012. Doi: 10.1007/978-3-642-30244-2_14. MAY 2012
37
Jayaprakash Kar “Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme” 5th International Conference on Information Security and Assurance (ISA 2011), Czech Republic, Springer- CCIS Vol- 200, pp 166-176, 2011. Doi: 10.1007/978-3-642-23141-4_16. AUG 2011
38
Jayaprakash Kar, Banshidhar Majhi “A Novel Deniable Authentication Protocol based on Diffie-Hellman Algorithm using Pairing techniques” ACM International Conference on Communication, Computing and Security (ICCCS 2011), NIT, Rourkela, India. pp-493-498, 2011. doi:10.1145/1947940.1948042. 2011
39
Jayaprakash Kar “Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme” International Journal of Smart Home. Korea Vol.5 (4), pp 39-49, Oct 2011. MAY 2011
40
Jayaprakash Kar, Banshidhar Majhi & Mohammed Sajid Anwer “An Efficient Password Security of Multi-Party Key Exchange Protocol using Secret Sharing based on ECDLP” IEEE 2nd International Conference on Computer Engineering and Technology (ICCET 2010) China, Vol-3 pp-78-81, 2010. Doi:10.1109/ICCET.2010.5485778 2010
41
Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Three Party Key Exchange Protocol based on ECDLP” 12th International Conference on Information Technology 2009 (ICIT 2009), Bhubaneswar, India, Tata McGrow Hill Education Private Limited, pp75-78, 2009. 2009
42
Jayaprakash Kar & Banshidhar Majhi “Personal Authentication Protocol based on ECDLP using Bio-metrics Feature Values” International Journal of Computer Science and Network Security, Korea Vol.9 (6), pp 79-84, June 2009. JUN 2009
43
Jayaprakash Kar & Banshidhar Majhi “A Novel Fair Tracing E-Cash System based on Elliptic Curve Discrete Logarithm Problem” International Journal of Security and Its Application, Korea , Vol.3 (4), pp 9-24, October 2009. APRIL 2009
44
Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Three Party Key Exchange Protocol based on ECDLP” International Journal of Security & Its Applications, Korea, Vol.3 (4), pp 25-32, October 2009. OCT 2009
45
Jayaprakash Kar & Banshidhar Majhi “An Efficient Password Security of Multiparty Key Exchange Protocol based on ECDLP” International Journal of Computer Science and Security (IJCSS), Malyasia, Vol.3 (5),pp 405-413, Nov 2009. NOV 2009
46
Jayaprakash Kar & Banshidhar Majhi “A Secure Two-Party Identity Based Key Exchange Protocol based on Elliptic Curve Discrete Logarithm Problem”, Journal of Information Assurance and Security, USA Vol-5(1),pp 473-482,2009. JAN 2009
Academic Experience
Name of Institute
Post/Designation
Duration From
Duration To
1
King Abdulaziz University, Kingdom of Saudi Arabia
Assistant Professor
2011
2016
2
Al Musanna College of Technology, Ministry of Manpower, Sultanate of Oman
Assistant Professor
2006
2011
Training/Conferences/Short Term Courses Attended
Type
Month
Year
Information
1
Training
MAY
2020
AICTE Training And Learning (ATAL) Academy Online FDP on "Cyber Security" conducted by National Institute of Technical Teachers Training & Research, Chandigarh.
2
Training
APRIL
2020
AICTE Training And Learning (ATAL) Academy Online FDP on "Blockchain Technology" conducted by JNTUA College of Engineering, Pulivendula.
3
Training
MAY
2020
AICTE Training And Learning (ATAL) Academy Online FDP on "Data Science" conducted by JNTUA College of Engineering, Pulivendula.
4
Conference
AUG
2017
11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland
5
Conference
DEC
2016
International Conference on Information Systems Security (ICISS-2016), MNIT, Jaipur, India
6
Conference
MAY
2015
IEEE International Conference on Intelligence and Security Informatics (IEEE ISI 2015), Baltimore, Maryland
7
Conference
FEB
2012
ACM International Conference on Communication, Computing and Security (ICCCS 2011), NIT, Rourkela, India
8
Workshop
MAY
2008
Workshop on Quality Assurance and Strategic Planning, Sultanate of Oman
Training/Conferences/Short Term Courses Conducted
Type
Month
Year
Information
1
Workshop
JAN
2022
AICTE-ISTE Sponsored Induction/Orientation Programme 06 days FDP on Cybersecurity
2
Conference
DEC
2022
12th International Conference on Security, Privacy and Applied Cryptographic Engineering 2022-General Chair and PC member
3
Workshop
SEPT
2022
National Workshop on Digital Forenscis and Cybercrime
4
Workshop
APRIL
2021
AICTE-ISTE sponsored Induction/Refresher Programme - Faculty Development Programme (FDP) On Cyber Security
5
Workshop
MAY
2021
AICTE-ISTE sponsored Induction/Refresher Programme- Faculty Development Programme on Digital Forensics and Cybercrime.
6
Workshop
JUN
2021
AICTE Training and Learning Academy (ATAL) Faculty Development Program on Blockchain
7
Conference
DEC
2021
22nd International Conference on Cryptology (Indocrypt 2021) -Organizing Chair
8
Conference
DEC
2021
22nd International Conference on Cryptology (Indocrypt 2021)- PC member.
9
Training
DEC
2020
AICTE-ISTE Sponsored Induction/Refresher Programs - Faculty Development Program on Blockchain Technology
10
Conference
AUG
2017
Session Chair, 11th International Conference of Network and Systems Security (NSS 2017), Helsenki, Finland
11
Workshop
SEPT
2016
Session Chair(s): Workshops on Multidisciplinary Perspectives in Cryptology and Information Security (CIS 2016), The LNM Institute of Information Technology, Jaipur
12
Workshop
MAR
2014
TPC Members, Workshop on Multidisciplinary perspective in Cryptology and Information Security (CIS 2014) - TPC member.
13
Training
MAY
2010
Expert in the 2nd Oman Skills Competition, Sultanate of Oman
OTHER LINKS
Director's Message
Photo Gallery
Webmail
Course Management System
Bus Time Table
Foundation
WAY TO LNMIIT
Plagiarism Prevention Software
Rules & MOA
Tender Notification
Sankalp
UGC
ASME LNMIIT
Counselling Cell
CSI
Vivacity
E-Cell
SAE LNMIIT
IEEE Student Branch
IUPC
Plinth
Innovation Club
Desportivos
Archive Information
Quick Links
Login
Faculty
Staff
Info Display Policy
Career
RTI
Forms
Site Map
How to Reach
Contact Us