Dr Behzad Abdolmaleki
School of Computer Science
Lecturer in Cybersecurity
Full contact details
School of Computer Science
Regent Court (DCS)
211 Portobello
Sheffield
S1 4DP
- Profile
-
Behzad Abdolmaleki is a Lecturer at the Department of Computer Science (Cybersecurity) at the University of Sheffield. He is broadly interested in constructing cryptographic schemes in post-quantum and quantum settings and the intersections with other disciplines, e.g., zero-knowledge proofs, MPC, cryptocurrencies, and concurrent systems.
From Nov. 2020 to April 2023, he was a postdoctoral researcher in Cryptography at the Max Planck Institute for Security and Privacy (MPI-SP), Germany, where he was working with Giulio Malavolta. Prior to joining MPI-SP, he was a senior researcher in Cryptography at the University of Tartu (from August to December 2020). He finished his Ph.D. at the University of Tartu on September 2020, under the supervision of Helger Lipmaa. In August and November 2019, he visited the AIT Austrian Institute of Technology, Vienna, Austria, hosted by Daniel Slamanig.
- Publications
-
Journal articles
- Shuffle Arguments Based on Subset-Checking.. IACR Cryptol. ePrint Arch., 2024, 1056-1056.
- Post-Quantum Access Control with Application to Secure Data Retrieval.. IACR Cryptol. ePrint Arch., 2024, 1160-1160.
- Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.. CoRR, abs/2409.04877.
- Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.. IACR Cryptol. ePrint Arch., 2024, 1024-1024.
- Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.. IACR Cryptol. ePrint Arch., 2023, 97-97.
- On Quantum Simulation-Soundness.. IACR Cryptol. ePrint Arch., 2023, 1702-1702.
- stoRNA: Stateless Transparent Proofs of Storage-time.. IACR Cryptol. ePrint Arch., 2023, 515-515.
- CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.. IACR Cryptol. ePrint Arch., 2022, 1756-1756.
- Steganography-Free Zero-Knowledge.. IACR Cryptol. ePrint Arch., 2022, 1263-1263.
- Two-Round Concurrent 2PC from Sub-Exponential LWE.. IACR Cryptol. ePrint Arch., 2022, 1719-1719.
- On Subversion-Resistant SNARKs. Journal of Cryptology, 34(3).
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.. IACR Cryptol. ePrint Arch., 2021, 1360-1360.
- Smooth Zero-Knowledge Hash Functions.. IACR Cryptol. ePrint Arch., 2021, 653-653.
- Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.. IACR Cryptol. ePrint Arch., 2020, 364-364.
- Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.. IACR Cryptol. ePrint Arch., 2020, 62-62.
- On Subversion-Resistant SNARKs.. IACR Cryptol. ePrint Arch., 2020, 668-668.
- A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.. IACR Cryptol. ePrint Arch., 2019, 1063-1063.
- Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols.. IACR Cryptol. ePrint Arch., 2019, 1125-1125.
- DL-Extractable UC-Commitment Schemes.. IACR Cryptol. ePrint Arch., 2019, 201-201.
- UC-Secure CRS Generation for SNARKs.. IACR Cryptol. ePrint Arch., 2019, 471-471.
- Breaking anonymity of some recent lightweight RFID authentication protocols. Wireless Networks, 25(3), 1235-1252.
- On QA-NIZK in the BPK Model.. IACR Cryptol. ePrint Arch., 2018, 877-877.
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT. Wireless Personal Communications, 95(4), 5057-5080.
- A Subversion-Resistant SNARK.. IACR Cryptol. ePrint Arch., 2017, 599-599.
- Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.. IACR Cryptol. ePrint Arch., 2016, 387-387.
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.. IACR Cryptol. ePrint Arch., 2016, 649-649.
- Traceability Analysis of Recent RFID Authentication Protocols. Wireless Personal Communications, 83(3), 1663-1682.
- Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 7(2), 135-149.
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.. IACR Cryptol. ePrint Arch., 2015, 980-980.
Chapters
- stoRNA: Stateless Transparent Proofs of Storage-time, Computer Security – ESORICS 2023 (pp. 389-410). Springer Nature Switzerland
- Shuffle Arguments Based on Subset-Checking, Lecture Notes in Computer Science (pp. 345-366). Springer Nature Switzerland
- Two-Round Concurrent 2PC from Sub-exponential LWE, Advances in Cryptology – ASIACRYPT 2023 (pp. 71-105). Springer Nature Singapore
Conference proceedings papers
- Circuit-Succinct Universally-Composable NIZKs with Updatable CRS. 2024 IEEE 37th Computer Security Foundations Symposium (CSF) (pp 527-542), 8 July 2024 - 12 July 2024.
- CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments (pp 3-25)
- Steganography-Free Zero-Knowledge (pp 143-172)
- Smooth Zero-Knowledge Hash Functions (pp 510-535)
- Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs (pp 492-512)
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More (pp 46-67)
- Lift-and-Shift. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
- On QA-NIZK in the BPK Model (pp 590-620)
- A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing (pp 1-21)
- UC-Secure CRS Generation for SNARKs (pp 99-117)
- DL-Extractable UC-Commitment Schemes (pp 385-405)
- An AKARI-based Secure Communication Scheme for EPC Tags. 2017 Advances in Wireless and Optical Communications (RTUWO), 2 November 2017 - 3 November 2017.
- A Subversion-Resistant SNARK (pp 3-33)
- Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard. 2016 8th International Symposium on Telecommunications (IST), 27 September 2016 - 28 September 2016.
- Securing key exchange and key agreement security schemes for RFID passive tags. 2016 24th Iranian Conference on Electrical Engineering (ICEE), 10 May 2016 - 12 May 2016.
- Cryptanalysis of two EPC-based RFID security schemes. 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), 8 September 2015 - 10 September 2015.
- Untraceable RFID authentication protocols for EPC compliant tags. 2015 23rd Iranian Conference on Electrical Engineering, 10 May 2015 - 14 May 2015.
- Enhancing achievable sum-rate by making strong and weak interference in an ad-hoc network. 7'th International Symposium on Telecommunications (IST'2014), 9 September 2014 - 11 September 2014.
- Attacks and improvements on two new-found RFID authentication protocols. 7'th International Symposium on Telecommunications (IST'2014), 9 September 2014 - 11 September 2014.
- Privacy analysis and improvements of two recent RFID authentication protocols. 2014 11th International ISC Conference on Information Security and Cryptology, 3 September 2014 - 4 September 2014.
- Analysis of a novel audio hash function based upon stationary wavelet transform. 2012 6th International Conference on Application of Information and Communication Technologies (AICT), 17 October 2012 - 19 October 2012.
Preprints
- Research group
-
Security of Advanced Systems research group