3rd International Conference on

Public Key Infrastructure and its Applications (PKIA 2022)

Bangalore, Karnataka, India, September 9-10, 2022

Thank you for making PKIA 2022 an astounding success. Please check below for proceedings.

About PKIA 2022

The 3rd International Conference on Public Key Infrastructure and its Applications (PKIA 2022) is a joint conference by IEEE CS (Computer Society) and IAS (Industry Application Society) Bangalore Chapter. It will be a premium venue for bringing together all stakeholders of a Public Key Infrastructure Ecosystem. The objective is to provide a platform for presenting novel ideas from academia and industry on traditional and emerging topics and new paradigms in the areas of PKI, with a clear connection to real-world problems, systems or applications.

Call for Papers

Applications of PKI as a technology has grown by leaps and bounds in the recent years and is on the verge of becoming synonymous with trust in electronic transactions all over the world.

The world of PKI has evolved as a robust and reliable system owing to the strong ecosystem - backed by the development in Cryptography, Protocols, Standards, Policy, Laws, Software libraries and hardware components.

The objective is to provide a platform for exchanging of research concepts, brainstorming of emerging trends and best practices, showcasing of new and innovative PKI applications and presenting novel ideas from academia and industry with a clear connection to real-world problems, systems or applications.

The conference therefore seeks submissions presenting innovative research and current developments in the areas of Public Key Infrastructures, Digital Certificates, Digital Signatures, Key Management, One-Time Signatures, Certificate-less secure communication, Time Stamping, PKI based Authentication etc. Submissions may focus on Modelling, Design, Analysis (incl. security proofs and attacks), Development (e.g. implementations), Deployment (e.g. system integration), and Maintenance (e.g. performance measurements, usability studies) of algorithms/protocols/standards/implementations/technologies /devices/systems standing in relation with public key cryptography. Some topics of interest include but not limited to:

  • Advanced Cryptographic Methods for Digital Signing
  • Light Weight Cryptography and PKI
  • Security issues and Challenges in Crypto Tokens
  • PKI and FIDO
  • Policy and Legal support systems for PKI
  • Key Management Implementation and Issues
  • Critical Infrastructure Protection using PKI
  • Public Key Infrastructure Protection
  • Certificate Validation
  • Implementation of PKI Applications
  • Standard Libraries for PKI Applications
  • Standard Plug-ins for PKI enablement
  • PKI of IoT Security
  • Usability in PKI for ease of issuance of tokens
  • Human factors in PKI security
  • Dynamic Digital / Electronic Signatures
  • PKI for Securing Mobile APPs
  • Biometric and PKI enabled applications
  • PKI for Identity Management
  • PKI in e-Governance, e-Banking
  • Advances in Public Key Cryptography
  • Trust Models, Trust List etc

Visit the International Conference CFP page HERE

Papers should be a maximum of 8 pages in the IEEE conference proceedings format available HERE

Please submit your technical papers via EasyChair for PKIA 2022 HERE

Important Dates:

Last Date for Submission : 31st May 2022 18th June, 2022 11th July 2022 (Hard deadline)
Notification of Acceptance: 31st July 2022
Camera-Ready Submission : 22nd August 2022

Author Registration Fee:

IEEE Member: ₹6600
Student IEEE Member: ₹3500
Non-Member: ₹8800
Student Non-Member: ₹5300
Foreign Author: $135

Attendee (Non-Author) Registration Fee:

Indian Participant - IEEE Member - ₹2000
Indian Participant - Non-IEEE Member - ₹3000/-
Foreign Participant - IEEE Member - $65
Foreign Participant - Non-IEEE Member - $100
Virtual Participant - ₹1000/- (Certificate of Participation will be provided on request by a registered virtual participant)

*INR Amount is inclusive of GST
Registration Link: Click Here
Camera Ready Submission Instructions: Click Here
All accepted and presented papers will be submitted to IEEE Xplore for publication.


Day 1 (9th September 2022)

  • Inauguration (10:00 - 11:00)
    • Welcome Address: Shri Aashish Banati, Deputy Controller (Technology) O/o CCA, MeitY
    • Introduction to PKIA 2022: Prof. R. K. Shymasundar, General Chair, PKIA 2022
    • Address by Chair, IEEE CS, Bangalore Chapter: Dr. Prasant Misra, General Co-Chair, PKIA 2022
    • Address by member IEEE, Bangalore section: Shri. B. S. Bindhumadhava, Senior Director, C-DAC, Bengaluru
    • Address by CCA: Shri Arvind Kumar, Patron, PKIA 2022
    • Inaugural Address by Chief Guest: Dr. Rajendra Kumar, IAS Additional Secretary, MeitY
    • Vote of Thanks: Dr. Balaji Rajendran, Associate Director, C-DAC, Bengaluru
  • Invited Talk 1 (11:30 - 12:15)
    • Title: Enhancing parameters of cryptographic hardware security attacks
    • Speaker: Hoda Al Khzaimi
    • Abstract: This talk will focus on the classical design and analysis approaches of side channels analysis and propose ML frameworks to enhance attack and design primitives yielding better resiliency of attacks.
    • Brief: Hoda A. Al Khzaimi is currently a research assistant professor at New York University Abu Dhabi and the Director of Center of Cyber Security in New York University Abu Dhabi. She served in different posts for research and development in Cyber Security and Cryptology for the past years. She headed the Department of Research and Development for Cyber Security and Cryptology in different national initiatives in the United Arab Emirates along with her associations to different security initiatives nationally and internationally.

  • Invited Talk 2 (12:15 - 13:00)
    • Title: Role of Public Key in Securing Cyber Space
    • Speaker: Dr. P K Saxena
    • Brief: Dr. P K Saxena is PSA Fellow, office of Principal Scientific Advisor to GOI and former Director SAG, DRDO.

  • Invited Talk 3 (14:00 - 14:45)
    • Title: Evolving Role of PKIs in Facilitating Trust over the Internet
    • Speaker: Dr. Vishwas Patil
    • Brief: Dr. Vishwas Patil is a Senior Research Scientist at the Department of Computer Science and Engineering, IIT Bombay. His current work focuses on various research aspets in cybersecurity of critical infrastructure, privacy in linkable datasets, modern payment systems, blockchains. Vishwas is a Ph.D. from the University of Rome and is an alumnus of NIT Surat. He has been associated with Tata Institute of Fundamental Research (TIFR Mumbai) as a Scientific Officer, and with A*STAR Singapore as a Scientist, and as a Security Analyst with BNP-Paribas bank Singapore.

  • Paper Presentations

    Session-1 (14:45 - 15:30)

    Theme: PKI in IoT Environment

    • "Improved PKI Certificate Lifecycle Management With Centralized Device Management For Industrial IoT", Ashwin A Krishnan, Satish Rajendran and Sunil Kumar T K
    • "PKI for IoT using the DNS infrastructure", Sandoche Balakrichenan, Ibrahim Ayoub and Benoît Ampeau
    • "Towards Automated PKI Trust Transfer for IoT", Joel Höglund, Martin Furuhed and Shahid Raza

    Session-2 (15:30 - 16:15)

    Theme: PKI Ecosystem

    • "A Study of PKI Ecosystem in South Asian and Oceania Countries", Lavanya Palani, Anoop Kumar Pandey, Balaji Rajendran, Bindhumadhava B S and S D Sudarsan
    • "PKI Ecosystem for Reliable Smart Contracts and NFT", Dr. Balaji Rajendran, Mr. Anoop Kumar Pandey
    • "Identity of Things - Need and Requirements", Ms. Rashmi Harish, Ms. Ananya K, Dr. Mohammed Misbahuddin

    Session-3 (16:30 - 17:15)

    Theme: Diverse Applications of PKI

    • "A JSON Web Signature based Adaptive Authentication Modality for Healthcare Applications", Vivin Krishnan, Sreeja C S, Sumitra Binu and Mohammed Misbahuddin
    • "Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation", Harshal Kallurkar and B R Chandavarkar
    • "Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study of IIT Bhilai", Souvik Pan, Dhiman Saha and Rajat Moona

Day 2 (10th September 2022)

  • Invited Talk 4 (10:00 - 10:45)
    • Title: PKI for OT Environment
    • Session By: Sukumara T, Senior Principal Engineer, Cyber Defense Evaluation Center, Electrification R&D, ABB Common Technology Centre, Bangalore.
    • Abstract: Recently OT environment especially critical Infrastructure sector across the world has come under severe and repeated cybersecurity attacks. The constant challenge for OT product vendors, system builders and customers areto keep building and improving strong cyber defense to protect the infrastructure from both internal, external (amateur as well as state sponsored) cyber-attacks. In OT environment, millions of real-time intelligent embedded devices have been deployed already and continuously being deployed. These include smart sensors, smart energy meters, PLCs, SCADA controllers, gateways etc. which are continuously communicating and exchanging the data/information and helping customers, industry, utility operatorx and thereby countries to maintain the complex Infrastructure to sustain the country's economy. In OT domain, typical product life cycle would be around 15 to 20 long years. Cybersecurity dynamics and computing complexities pose challenge for R&D teams to keep product cyber defense architecture to withstand the innovative cybersecurity attack vectors and threats throughout product life cycle. OT products need strong PKI Systems mainly for signing public key certificates as well as firmware code signing for protection of firmware throughout secure distribution and update processes. NIST recommends that OT product/platform manufacturers deliver digitally signed firmware and associated verification support to provide assurance of the integrity and authenticity of their delivered code / firmware. This tutorial covers experiences related to handling PKI architecture challenges and adopted PKI solutions by OT product R&D and Commissioning teams in deployment of a strong communication PKI certificates as well as code-signing requirements during various phases of product life cycle like development, testingand crucial on-field operation spanning over decades.
    • Bio: Sukumaran T is an experienced Senior Principal Engineer with a demonstrated history of working in the electrical and electronic manufacturing industry. Skilled in Embedded Software, Smart Grid, C++, Control Systems Design, SCADA & Cyber security. Strong engineering professional with a Master of Business Administration (M.B.A.) focused in Systems from University of Madras.

  • Keynote Address 1 (11:00 - 11:45)
    • Title: High-Level Approaches to Hardware Security
    • Speaker: Prof. Ramesh Karri, New York University
    • Abstract: Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising. This is forcing IC designers and end users to re-evaluate their trust in ICs. If an attacker gets hold of an unprotected IC, he can reverse engineer the IC and pirate the IP. Similarly, if an attacker gets hold of a design, she can insert malicious circuits and backdoors into the design.
      In this talk I will outline High-Level Design for Trust techniques that we developed to prevent such attacks: Locking/Obfuscation and Secure Sourcing of IPs for High-Level Integration. Locking/Obfuscation implements a built-in obfuscation mechanism in ICs to prevent reverse engineering. Secure sourcing can thwart Trojan insertion in 3rd party Intellectual Properties.
      I will wrap up the presentation by pointing out why hardware security is an essential objective from economics, security, and safety aspects and offer my vision of the exciting field of hardware cybersecurity.
    • Bio: Ramesh Karri is a Professor of Electrical and Computer Engineering at New York University. He co-directs the NYU Center for Cyber Security ( He also leads the Cyber Security thrust of the NY State Center for Advanced Telecommunications Technologies at NYU. He co-founded the Trust-Hub ( and organizes the Embedded Systems Challenge (, the annual red team blue team event. He has a Ph.D. in Computer Science and Engineering, from the University of California at San Diego and a B.E in ECE from Andhra University. His research and education activities in hardware cybersecurity include trustworthy ICs, processors and cyber-physical systems, security-aware computer-aided design, test, verification, validation, and reliability, nano meets security, hardware security competitions, benchmarks and metrics, biochip security, additive manufacturing security. He has published over 300 articles in leading journals and conference proceedings. He is a Fellow of IEEE. His work on hardware cybersecurity received best paper award nominations (ICCD 2015 and DFTS 2015), awards (ITC 2014, CCS 2013, DFTS 2013 and VLSI Design 2012, ACM Student Research Competition at DAC 2012, ICCAD 2013, DAC 2014, ACM Grand Finals 2013, Kaspersky Challenge and Embedded Security
  • Paper Presentations

    Session-4 (11:45 - 12:45)

    Theme: PKI Algorithmic Implementations

    • "A hybrid hyperchaotic based dynamic keystream generator using perturbance process for public key infrastructure application", Anirudh Sivapriya M, Dilip Kumar Barman and K K Soundra Pandian
    • "Random number generation for PKI using Controlled Anderson PUF", Aditi Roy, Kokila J., Ramasubramanian N and Shameedha Begum B.
    • "Experimentation on usage of PQC Algorithms for eSign", Pavan Kurariya, Ankita Bhargava, Srikanth Sailada, N. Subramanian, Jahnavi Bodhankar and Ajai Kumar
    • "FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers", Ruby Mishra, Manish Okade and Kamalakanta Mahapatra

    Session-5 (12:45 - 13:15)

    Theme: Security Analysis and Validation

    • "Security Analysis of LDPC Code-based Encryption", Dibyasree Guha, Debasish Bera and Bhaskar Biswas
    • "Publc Key Cryptographic implementation validation: Present and Future", Dr. Ananda Mohan P V, Dr. Abey Jacob and Raghavendra Patil S
  • Invited Talk 5 (14:15 - 15:00)
    • Title: Why PKI consolidation and certificate ownership are crucial elements of success
    • Speaker: Jacob Højmark Nielsen
    • Abstract: A holistic dive into the challenges of being successful with PKI and digital certificates and insights in why people are the most vital part of the technology's future.
    • Brief: Jacob Højmark Nielsen has 20 years of experience in PKI industry, the last 18 years as Co-founder and CEO of TRUSTZONE, a Danish IT security company focusing on the commercial aspects of PKI and digital certificates. The mission is to make PKI feasible, understandable, and tangible for a broad audience and thus communicating and catering the technology and the principles of it in a stakeholder point of view.

  • Keynote Address 2 (16:15 - 17:00)
    • Title: Privacy-preserving Data Sharing and Analytics
    • Speaker: Prof. Jaideep Vaidya, Rutgers University
    • Abstract: In the current digital age, data is continually being collected by organizations and governments alike. While the goal is to use this data to derive insight and improve services, the ubiquitous collection and analysis of data creates a threat to privacy. Furthermore, the digitization and centralization of data creates attractive targets for cyber criminals, with security breaches harming both individuals and organizations. In this talk, we examine the underlying challenges in enabling data sharing and analytics in a privacy-preserving manner. This requires a combination of technological advances to ensure both process and output privacy as well as socio-cognitive approaches to ensure the widespread use and deployment of such work. We discuss some of our recent research results in this context and avenues for future research.
    • Bio: Prof. Jaideep Vaidya is a Distinguished Professor in the MSIS Department at Rutgers University. He received the B.E. degree in Computer Engineering from the University of Mumbai, the M.S. and Ph.D. degree in Computer Science from Purdue University. His general area of research is in data mining, data management, security, and privacy. He has published over 130 technical papers in peer-reviewed journals and conference proceedings, and has received several best paper awards from the premier conferences in data mining, databases, digital government, security, and informatics. He has also received the NSF Career Award, the Rutgers Board of Trustees Research Fellowship for Scholarly Excellence, and the Junior Faculty Research Award from Rutgers Business School. He is a senior member of the IEEE and ACM and has been recognized as an ACM Distinguished Scientist.
  • Valedictory Session (17:00 - 17:30)
    • Opening remarks: Dr. Prasant Misra
    • Address by Chief Guest: Prof. Debabrata Das
    • Announcement of best papers: Dr. P. V. Anandamohan, Publication Chair, PKIA-2022
    • Felicitations by:
      • Mr. Anil Jain, CEO, NIXI
      • Mr. Aashish Banati
      • Prof. R. K. Shyamasundar
    • Closing remarks: Dr. S. D. Sudarsan, Executive Director, C-DAC, Bengaluru
  • Best Paper Award
    • "Towards Automated PKI Trust Transfer for IoT", Joel Höglund, Martin Furuhed and Shahid Raza
    • "PKI for IoT using the DNS infrastructure", Sandoche Balakrichenan, Ibrahim Ayoub and Benoît Ampeau

The Committee


General Chair

General Co-Chair

Technical Program Committee

Organizing Committee

Publicity Committee

Publication Committee

Administration & Finance Committee

Web Committee

Facilitation Committee


Date and time: September 9-10, 2022, 09:30AM India Time (Mumbai, GMT +05:30)

Online: Day 1: Click here...
Day 2: Click here...
Offline: The Chancery Pavilion,
135, Residency Road,
Karnataka 560025, India



The Controller of Certifying Authorities (CCA) has been appointed by the Central Government under section 17 of the Act for the purpose of IT Act. The office of the CCA aims at promoting the growth of e-Commerce and e-Governance through the wide use of digital signatures. The CAs issues Digital Signature Certificates to the subscribers. The CCA certifies the public keys of CAs using its own private key, which enables user in the cyberspace to verify that a given certificate is issued by a licenced CA. For this purpose it operates, the Root Certifying Authority of India (RCAI). More information can be found at:


Center for Development of Advanced Computing (C-DAC) is the premier R&D organization of the Department of Electronics and Information Technology (DietY), Ministry of Communication and Information Technology (MCIT) for carrying out R&D in IT, Electronics and associated areas. C-DAC has today emerged as premier R&D organization in IT&E (Information Technlogies and Electronics) in the country working on strengthening national technological capabilities in the context of global developments. More information can be found at:

Contact Us

Centre for Development of Advanced Computing,
#68, Electronic City, Bangalore - 560100
Phones: +91-8028523300
Fax: +91-8028522590