Dr Behzad Abdolmaleki
School of Computer Science
Lecturer in Cybersecurity
Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
91Ö±²¥
S1 4DP
- Profile
-
Behzad Abdolmaleki is a Lecturer at the Department of Computer Science (Cybersecurity) at the University of 91Ö±²¥. He is broadly interested in constructing cryptographic schemes in post-quantum and quantum settings and the intersections with other disciplines, e.g., zero-knowledge proofs, MPC, cryptocurrencies, and concurrent systems.
From Nov. 2020 to April 2023, he was a postdoctoral researcher in Cryptography at the , Germany, where he was working with . Prior to joining MPI-SP, he was a senior researcher in Cryptography at the University of Tartu (from August to December 2020). He finished his Ph.D. at the University of Tartu on September 2020, under the supervision of . In August and November 2019, he visited the , Vienna, Austria, hosted by .
- Publications
-
Journal articles
- Shuffle Arguments Based on Subset-Checking.. IACR Cryptol. ePrint Arch., 2024, 1056-1056.
- Post-Quantum Access Control with Application to Secure Data Retrieval.. IACR Cryptol. ePrint Arch., 2024, 1160-1160.
- Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.. CoRR, abs/2409.04877.
- Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.. IACR Cryptol. ePrint Arch., 2024, 1024-1024.
- Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.. IACR Cryptol. ePrint Arch., 2023, 97-97.
- On Quantum Simulation-Soundness.. IACR Cryptol. ePrint Arch., 2023, 1702-1702.
- stoRNA: Stateless Transparent Proofs of Storage-time.. IACR Cryptol. ePrint Arch., 2023, 515-515.
- CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.. IACR Cryptol. ePrint Arch., 2022, 1756-1756.
- Steganography-Free Zero-Knowledge.. IACR Cryptol. ePrint Arch., 2022, 1263-1263.
- Two-Round Concurrent 2PC from Sub-Exponential LWE.. IACR Cryptol. ePrint Arch., 2022, 1719-1719.
- . Journal of Cryptology, 34(3).
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.. IACR Cryptol. ePrint Arch., 2021, 1360-1360.
- Smooth Zero-Knowledge Hash Functions.. IACR Cryptol. ePrint Arch., 2021, 653-653.
- Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.. IACR Cryptol. ePrint Arch., 2020, 364-364.
- Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.. IACR Cryptol. ePrint Arch., 2020, 62-62.
- On Subversion-Resistant SNARKs.. IACR Cryptol. ePrint Arch., 2020, 668-668.
- A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.. IACR Cryptol. ePrint Arch., 2019, 1063-1063.
- Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols.. IACR Cryptol. ePrint Arch., 2019, 1125-1125.
- DL-Extractable UC-Commitment Schemes.. IACR Cryptol. ePrint Arch., 2019, 201-201.
- UC-Secure CRS Generation for SNARKs.. IACR Cryptol. ePrint Arch., 2019, 471-471.
- . Wireless Networks, 25(3), 1235-1252.
- On QA-NIZK in the BPK Model.. IACR Cryptol. ePrint Arch., 2018, 877-877.
- . Wireless Personal Communications, 95(4), 5057-5080.
- A Subversion-Resistant SNARK.. IACR Cryptol. ePrint Arch., 2017, 599-599.
- Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.. IACR Cryptol. ePrint Arch., 2016, 387-387.
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.. IACR Cryptol. ePrint Arch., 2016, 649-649.
- . Wireless Personal Communications, 83(3), 1663-1682.
- Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 7(2), 135-149.
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.. IACR Cryptol. ePrint Arch., 2015, 980-980.
Chapters
- , Computer Security – ESORICS 2023 (pp. 389-410). Springer Nature Switzerland
- , Lecture Notes in Computer Science (pp. 345-366). Springer Nature Switzerland
- , Advances in Cryptology – ASIACRYPT 2023 (pp. 71-105). Springer Nature Singapore
Conference proceedings papers
- . 2024 IEEE 37th Computer Security Foundations Symposium (CSF) (pp 527-542), 8 July 2024 - 12 July 2024.
- (pp 3-25)
- (pp 143-172)
- (pp 510-535)
- (pp 492-512)
- (pp 46-67)
- . Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
- (pp 590-620)
- (pp 1-21)
- (pp 99-117)
- (pp 385-405)
- . 2017 Advances in Wireless and Optical Communications (RTUWO), 2 November 2017 - 3 November 2017.
- (pp 3-33)
- . 2016 8th International Symposium on Telecommunications (IST), 27 September 2016 - 28 September 2016.
- . 2016 24th Iranian Conference on Electrical Engineering (ICEE), 10 May 2016 - 12 May 2016.
- . 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), 8 September 2015 - 10 September 2015.
- . 2015 23rd Iranian Conference on Electrical Engineering, 10 May 2015 - 14 May 2015.
- . 7'th International Symposium on Telecommunications (IST'2014), 9 September 2014 - 11 September 2014.
- . 7'th International Symposium on Telecommunications (IST'2014), 9 September 2014 - 11 September 2014.
- . 2014 11th International ISC Conference on Information Security and Cryptology, 3 September 2014 - 4 September 2014.
- . 2012 6th International Conference on Application of Information and Communication Technologies (AICT), 17 October 2012 - 19 October 2012.
Preprints
- Research group
-
Security of Advanced Systems research group
Links