Navid Abapour
Academic and research departments
Surrey Centre for Cyber Security, Computer Science Research Centre.About
My research project
Trust and Privacy in Post-Quantum Electronic VotingInitiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmm⦠Let me see⦠We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkβs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
Supervisors
Initiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmm⦠Let me see⦠We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkβs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
My qualifications
Project: "π³ππππππππππ£ππ π»ππππππ-πππππ πΌπππππ πππ π πππππ ππ’πππππππ π²ππ’πππππππππ’"
Affiliations and memberships
ResearchResearch interests
πΏπππ-πππππππ π²ππ’πππππππππ’, ππππππ πππππππππ, πΌππππ-πππππ’ π²ππππππππππ, πΏππππππ’
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [Prototype Draft] [Source Code]
Supervisor: Toby Murray, Advisor: Mohammad Ahmadpanah
Indicators of esteem
Research interests
πΏπππ-πππππππ π²ππ’πππππππππ’, ππππππ πππππππππ, πΌππππ-πππππ’ π²ππππππππππ, πΏππππππ’
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [Prototype Draft] [Source Code]
Supervisor: Toby Murray, Advisor: Mohammad Ahmadpanah
Indicators of esteem
Teaching
University of Surrey (2024-2025)
University of Surrey (2023-2024)
- Advanced Challenges in Web Technologies (COM3014): Mentor and Lab Instructor
- C++ and Object-oriented Design (EEE2047): Lab Instructor
University of Mohaghegh Ardabili (2019-2022)
- Data Structure and Algorithms: Teaching Assistant
- Data Mining: Assignment Corrector
- Foundations of Algebra: Assignment Corrector
Publications
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.
In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service providerβs trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.
With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.