Behzad Abdolmaleki

Orcid: 0009-0008-8335-2787

According to our database1, Behzad Abdolmaleki authored at least 35 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2025

Universally Composable Password-Hardened Encryption.
IACR Cryptol. ePrint Arch., 2025

Post-Quantum Access Control with Application to Secure Data Retrieval.
IACR Commun. Cryptol., 2025

PGUS: Pretty Good User Security for Thick MVNOs with a Novel Sanitizable Blind Signature.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024

Post-Quantum Access Control with Application to Secure Data Retrieval.
IACR Cryptol. ePrint Arch., 2024

On Quantum Simulation-Soundness.
IACR Commun. Cryptol., 2024

Shuffle Arguments Based on Subset-Checking.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Circuit-Succinct Universally-Composable NIZKs with Updatable CRS.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.
IACR Cryptol. ePrint Arch., 2023

stoRNA: Stateless Transparent Proofs of Storage-time.
Proceedings of the Computer Security - ESORICS 2023, 2023

Two-Round Concurrent 2PC from Sub-exponential LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Steganography-Free Zero-Knowledge.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
Smooth Zero-Knowledge Hash Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

On Subversion-Resistant SNARKs.
IACR Cryptol. ePrint Arch., 2020

On QA-NIZK in the BPK Model.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Breaking anonymity of some recent lightweight RFID authentication protocols.
Wirel. Networks, 2019

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

UC-Secure CRS Generation for SNARKs.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

DL-Extractable UC-Commitment Schemes.
Proceedings of the Applied Cryptography and Network Security, 2019

2017
Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT.
Wirel. Pers. Commun., 2017

A Subversion-Resistant SNARK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.
IACR Cryptol. ePrint Arch., 2016

Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.
IACR Cryptol. ePrint Arch., 2016

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
Traceability Analysis of Recent RFID Authentication Protocols.
Wirel. Pers. Commun., 2015

Enhancing privacy of recent authentication schemes for low-cost RFID systems.
ISC Int. J. Inf. Secur., 2015

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.
IACR Cryptol. ePrint Arch., 2015

2014
Privacy analysis and improvements of two recent RFID authentication protocols.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014


  Loading...