Omid Mir

Orcid: 0000-0003-1691-5291

According to our database1, Omid Mir authored at least 16 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Constant-Size Inner Product Arguments for Group-Scalar Relations, Dynamic Threshold VRFs, and More.
IACR Cryptol. ePrint Arch., 2025

Leap: A Fast, Lattice-Based OPRF with Application to Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation.
IEEE Trans. Dependable Secur. Comput., 2024

Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications.
IACR Cryptol. ePrint Arch., 2024

Delegatable Anonymous Credentials from Mercurial Signatures with Stronger Privacy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Decentralized, Privacy-Preserving, Single Sign-On.
Secur. Commun. Networks, 2022

Practical Delegatable Anonymous Credentials From Equivalence Class Signatures.
IACR Cryptol. ePrint Arch., 2022

2020
Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation.
Int. J. Inf. Sec., 2020

DAMFA: Decentralized Anonymous Multi-Factor Authentication.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2018
Cryptanalysis and improvement of a Multi-Server Authenticated Key Agreement by Chen and Lee's Scheme.
Inf. Technol. Control., 2018

Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Efficient anonymous authentication with key agreement protocol for wireless medical sensor networks.
Peer-to-Peer Netw. Appl., 2017

2015
A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services.
Wirel. Pers. Commun., 2015

A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems.
J. Medical Syst., 2015


  Loading...