Navid Abapour
Academic and research departments
Surrey Centre for Cyber Security, Computer Science Research Centre.About
My research project
Trust and Privacy in Post-Quantum Electronic VotingInitiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmmโฆ Let me seeโฆ We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
Supervisors
Initiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmmโฆ Let me seeโฆ We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
My qualifications
Project: "๐ณ๐๐๐๐๐๐๐๐๐๐ฃ๐๐ ๐ป๐๐๐๐๐๐-๐๐๐๐๐ ๐ผ๐๐๐๐๐ ๐๐๐ ๐ ๐๐๐๐๐ ๐๐ข๐๐๐๐๐๐๐ ๐ฒ๐๐ข๐๐๐๐๐๐๐๐๐ข"
Affiliations and memberships
ResearchResearch interests
๐ฃ๐ผ๐๐-๐พ๐๐ฎ๐ป๐๐๐บ ๐๐ฟ๐๐ฝ๐๐ผ๐ด๐ฟ๐ฎ๐ฝ๐ต๐, ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ ๐๐น๐๐ถ-๐ฝ๐ฎ๐ฟ๐๐ ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป, ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ผ๐บ๐ฝ๐น๐ฒ๐
๐ถ๐๐, ๐ฃ๐ฟ๐ถ๐๐ฎ๐ฐ๐-๐ฝ๐ฟ๐ฒ๐๐ฒ๐ฟ๐๐ถ๐ป๐ด ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [Prototype Draft] [Source Code]
Supervisor: Toby Murray, Advisor: Mohammad Ahmadpanah
Indicators of esteem
Research interests
๐ฃ๐ผ๐๐-๐พ๐๐ฎ๐ป๐๐๐บ ๐๐ฟ๐๐ฝ๐๐ผ๐ด๐ฟ๐ฎ๐ฝ๐ต๐, ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ฒ ๐ ๐๐น๐๐ถ-๐ฝ๐ฎ๐ฟ๐๐ ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป, ๐๐ผ๐บ๐ฝ๐๐๐ฎ๐๐ถ๐ผ๐ป๐ฎ๐น ๐๐ผ๐บ๐ฝ๐น๐ฒ๐ ๐ถ๐๐, ๐ฃ๐ฟ๐ถ๐๐ฎ๐ฐ๐-๐ฝ๐ฟ๐ฒ๐๐ฒ๐ฟ๐๐ถ๐ป๐ด ๐๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [Prototype Draft] [Source Code]
Supervisor: Toby Murray, Advisor: Mohammad Ahmadpanah
Indicators of esteem
Teaching
University of Surrey (2024-2025)
University of Surrey (2023-2024)
- Advanced Challenges in Web Technologies (COM3014): Mentor and Lab Instructor
- C++ and Object-oriented Design (EEE2047): Lab Instructor
University of Mohaghegh Ardabili (2019-2022)
- Data Structure and Algorithms: Teaching Assistant
- Data Mining: Assignment Corrector
- Foundations of Algebra: Assignment Corrector
Publications
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.
In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service providerโs trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.
With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.