Mahdi Sedaghat

Orcid: 0000-0002-1507-6927

According to our database1, Mahdi Sedaghat authored at least 15 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Traceable Verifiable Secret Sharing and Applications.
IACR Cryptol. ePrint Arch., 2025

Keyed-Verification Anonymous Credentials with Highly Efficient Partial Disclosure.
IACR Commun. Cryptol., 2025

2024
Unlinkable Policy-Compliant Signatures for Compliant and Decentralized Anonymous Payments.
Proc. Priv. Enhancing Technol., 2024

Threshold Structure-Preserving Signatures: Strong and Adaptive Security Under Standard Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Subset-Optimized BLS Multi-signature with Key Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2024

zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Fine-Grained Accountable Privacy via Unlinkable Policy-Compliant Signatures.
IACR Cryptol. ePrint Arch., 2023

Benchmarking the Setup of Updatable Zk-SNARKs.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

Threshold Structure-Preserving Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

Reusable, Instant and Private Payment Guarantees for Cryptocurrencies.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Structure-Preserving Threshold Signatures.
IACR Cryptol. ePrint Arch., 2022

Nirvana: Instant and Anonymous Payment-Guarantees.
IACR Cryptol. ePrint Arch., 2022

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme.
Future Gener. Comput. Syst., 2022

2021
Cross-Domain Attribute-Based Access Control Encryption.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021


  Loading...