Loading...
Search for: rajabzadeh-asaar--maryam
0.172 seconds

    A provably secure identity-based proxy ring signature based on RSA

    , Article Security and Communication Networks ; Volume 8, Issue 7 , July , 2015 , Pages 1223-1236 ; 19390114 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    Proxy ring (anonymous proxy) signatures allow an entity to delegate its signing capability to a group of entities (proxy group) such that only one of the members in the proxy group can generate a proxy signature on behalf of the delegator, while privacy of the proxy signer is protected. Identity-based versions of proxy ring signatures employ identity strings in place of randomly generated public keys. Our contribution is twofold. First, we formalize a security model for identity-based proxy ring signatures. We note that there exists no formal security model for identity-based proxy ring signatures prior to our work. Second, we present the first provably secure identity-based proxy ring... 

    A short identity-based proxy ring signature scheme from RSA

    , Article Computer Standards and Interfaces ; Volume 38 , February , 2015 , Pages 144-151 ; 09205489 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Identity-based proxy ring signature concept was introduced by Cheng et al. in 2004. This primitive is useful where the privacy of proxy signers is required. In this paper, the first short provably secure identity-based proxy ring signature scheme from RSA assumption has been proposed. In addition, the security of the proposed scheme tightly reduces to the RSA assumption, and therefore, the proposed scheme has a proper advantage in security reduction compared to the ones from RSA. The proposed scheme not only outperforms the existing schemes in terms of efficiency and practicality, but also does not suffer from the proxy key exposure attack due to the use of the sequential aggregation... 

    Identity-based proxy signatures: A generic construction and a concrete scheme from RSA

    , Article Security and Communication Networks ; Volume 8, Issue 18 , May , 2015 , Pages 3602-3614 ; 19390114 (ISSN) Rajabzadeh asaar ,M ; Salmasizadeh, M ; Boyd, C ; Sharif University of Technology
    John Wiley and Sons Inc  2015
    Abstract
    Proxy signatures allow an entity to delegate its signing capability to a proxy which can sign messages on behalf of the delegator. We examine identity-based versions of proxy signatures which employ identity strings in place of randomly generated public keys. First, we give a new generic construction of identity-based proxy signatures from identity-based standard signatures and show that our generic construction is secure if the underlying identity-based standard signature is secure. In addition, we present the first identity-based proxy signature from Rivest, Shamir and Adleman (RSA), secure under the one-wayness of RSA in the random oracle model. We should highlight that the proxy key... 

    A short ID-based proxy signature scheme

    , Article International Journal of Communication Systems ; Volume 29, Issue 5 , 2016 , Pages 859-873 ; 10745351 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    John Wiley and Sons Ltd  2016
    Abstract
    The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead because signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: the schemes of Singh and Verma and Yoon et al. Unfortunately, Tian et al., by presenting two forgery attacks, show that Singh and Verma scheme is not secure, and also, the scheme of Yoon et al. does not support provable security. The contributions of this paper are twofold. First, we review the scheme by Yoon et al. and discuss why it does not have message recovery property, and consequently, it is not... 

    Another security improvement over the Lin et al.'s electronic-voting scheme

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 1, Issue 4 , 2008 , Pages 413-422 ; 1751911X (ISSN) Rajabzadeh Asaar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Inderscience Publishers  2008
    Abstract
    Lin, Hwang and Chang (2003) have proposed an electronic-voting scheme which can be utilised in large-scale elections, and claimed that it detects double voting. In this article, by presenting an attack, we show that voters can successfully vote more than once without being detected. Then, we propose a new modified scheme based on the Lin, Hwang and Chang's (2003) scheme with the same efficiency to solve this weakness and analyse its security. © 2008, Inderscience Publishers  

    A provably secure code-based short signature scheme and its nontransferable variant

    , Article International Journal of Communication Systems ; Volume 31, Issue 6 , April , 2018 ; 10745351 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    John Wiley and Sons Ltd  2018
    Abstract
    Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are helpful where bandwidth is one of the critical concern. This primitive is especially used for signing short messages in applications such as time stamping, certified email services, and identity-based cryptosystems. In this paper, to have quantum-attack-resistant short signatures, the first signature scheme with partially message recovery based on coding theory is presented. Next, it is shown that the proposal is secure under Goppa Parametrized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model. Relying on the partially... 

    Design of Intermediate-level Primitives for Electronic Voting and Multi-party Protocols

    , Ph.D. Dissertation Sharif University of Technology Rajabzadeh Asaar, Maryam (Author) ; Salmasizadeh, Mahmoud (Supervisor)
    Abstract
    In this thesis, intermediate-level cryptographic primitives of multi-proxy multi-signatures and proxy signatures with message recovery with different applications in multi-party protocols such as electronic voting are considered. To save bandwidth, improve efficiency and ensure the accuracy of design, four factors: employing identity-based settings, independency of signature size to the number of signers in multi-proxy multi-signature schemes, transmission of signatures without messages in proxy signature schemes and presenting provable security are vital. On
    one hand, to take advantage of identity-based cryptosystems to improve efficiency, designing schemes without bilinear pairings is... 

    A secure and efficient authentication technique for vehicular Ad-Hoc networks

    , Article IEEE Transactions on Vehicular Technology ; Volume 67, Issue 6 , 2018 , Pages 5409-5423 ; 00189545 (ISSN) Rajabzadeh Asaar, M ; Salmasizadeh, M ; Susilo, W ; Majidi, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Vehicular ad-hoc networks (VANETs) are under active development, thanks in part to recent advances in wireless communication and networking technologies. The most fundamental part in VANETs is to enable message authentications between vehicles and roadside units. Message authentication using proxy vehicles has been proposed to reduce the computational overhead of roadside units significantly. In this message authentication scheme, proxy vehicles that verify multiple messages at the same time improve roadside units' efficiency. In this paper, first we show that the only proxy-based authentication scheme (PBAS) presented for this goal by Liu et al. cannot guarantee message authenticity, and... 

    Comments on a lightweight cloud auditing scheme: Security analysis and improvement

    , Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Academic Press  2019
    Abstract
    In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server... 

    A provably secure code-based concurrent signature scheme

    , Article IET Information Security ; Volume 12, Issue 1 , 2018 ; 17518709 (ISSN) Rajabzadeh Asaar, M ; Ameri, M. H ; Salmasizadeh, M ; Aref, M. R ; Sharif University of Technology
    Institution of Engineering and Technology  2018
    Abstract
    Concurrent signatures allow two entities to generate two signatures in such a way that both signatures are ambiguous till some information is revealed by one of the parties. This kind of signature is useful in auction protocols and in a wide range of scenarios in which involving participants are mutually distrustful. In this study, to have quantum-attack-resistant concurrent signatures as recommended by National Institute of Standards and Technology (NISTIR 8105), the first concurrent signature scheme based on coding theory is proposed. Then, its security is proved under Goppa Parameterized Bounded Decoding and the Goppa Code Distinguishing assumptions in the random oracle model. In... 

    A lightweight identity-based provable data possession supporting users’ identity privacy and traceability

    , Article Journal of Information Security and Applications ; Volume 51 , 2020 Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction... 

    3d Design of a Microfluidic Chip for Anticancer Drugs Screening

    , M.Sc. Thesis Sharif University of Technology Hashemi, Maryam Sadat (Author) ; Mashayekhan, Shohreh (Supervisor) ; Saadatmand, Maryam (Supervisor)
    Abstract
    Nowadays, advanced and inexpensive pre-clinical methods for investigating the effects of anti-cancer drugs are expanding. One of the latest three-dimensional laboratory modeling for evaluating the effects of drugs is the use of tumor-on-chip technology, which actually models the physiological system of the body through three-dimensional scaffolds, multicellular cultures, and shaped vascular systems. In this study, three-dimensional culture of cancer cells was performed in the form of spheroids. A chip of U-shaped microstructures with and without gaps was used to trap cells and form cancer spheroids. We simulated the simultaneous effect of drug and oxygen concentration distribution inside the... 

    A short ID-based proxy signature scheme

    , Article International Journal of Communication Systems ; 2014 ; ISSN: 10745351 Asaar, M. R ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    2014
    Abstract
    The notion of identity-based proxy signature with message recovery feature has been proposed to shorten identity-based proxy signatures and improve their communication overhead because signed messages are not transmitted with these kinds of signatures. There are a few schemes for this notion: the schemes of Singh and Verma and Yoon et al. Unfortunately, Tian et al., by presenting two forgery attacks, show that Singh and Verma scheme is not secure, and also, the scheme of Yoon et al. does not support provable security. The contributions of this paper are twofold. First, we review the scheme by Yoon et al. and discuss why it does not have message recovery property, and consequently, it is not... 

    Non-delegatable strong designated verifier signature using a trusted third party without pairings

    , Article Conferences in Research and Practice in Information Technology Series ; Volume 138 , 2013 , Pages 13-25 ; 14451336 (ISSN) ; 9781921770234 (ISBN) Asaar, M. R ; Vardasbi, A ; Salmasizadeh, M ; Sharif University of Technology
    Australian Computer Society  2013
    Abstract
    Strong designated verifier signature (SDVS) is characterized by two properties; namely the nontransferability and the privacy of the signer's identity (PSI). Non-transferability prevents anyone else other than the designated verifier to verify the signature, while PSI prevents a third party to distinguish between two different signers. In this paper, we propose a non-delegatable SDVS which uses a trusted third party for the key generation. Our signature scheme does not use bilinear pairings which makes it suitable for the resource constraint applications. Using one-way homomorphic functions, our scheme is presented at an abstract level, the unification of which was noticed by Maurer in the... 

    An identity-based multi-proxy multi-signature scheme without bilinear pairings and its variants

    , Article Computer Journal ; Volume 58, Issue 4 , May , 2015 , Pages 1021-1039 ; 00104620 (ISSN) Asaar, M. R ; Salmasizadeh, M ; Susilo, W ; Sharif University of Technology
    2015
    Abstract
    The notions of identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature have been proposed to facilitate public key certificate management of these kinds of signatures by merely employing signer's identities in place of the public keys and their certificates. In the literature, most identity-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes are based on bilinear pairings. Without incorporating bilinear pairings, Tiwari and Padhye proposed an identity-based proxy multi-signature scheme in 2011. Subsequently, an identity-based multi-proxy multi-signature scheme was proposed by Tiwari et al. in 2012. First, we review... 

    Security modification for the hwang-wen-hwang 's E-voting scheme

    , Article 2008 International Conference on Security and Management, SAM 2008, Las Vegas, NV, 14 July 2008 through 17 July 2008 ; 2008 , Pages 486-490 ; 160132085X (ISBN); 9781601320858 (ISBN) Asaar, M. R ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    2008
    Abstract
    Hwang-Wen-Hwang have proposed an anonymous secure electronic voting scheme to be applied over a network, and claimed that their scheme satisfies the requirement of perceptibility of double voting. But in this paper, by presenting an attack which shows imperceptible of double voting, we show that their scheme has a weakness in security and improve it. Finally, we show that this new scheme preserves the properties of the old one and also is resistant against the proposed attack  

    Feature specific control flow checking in COTS-based embedded systems

    , Article Proceedings - 3rd International Conference on Dependability, DEPEND 2010, 18 July 2010 through 25 July 2010 ; July , 2010 , Pages 58-63 ; 9780769540900 (ISBN) Rajabzadeh, A ; Miremadi, S.G ; IARIA ; Sharif University of Technology
    2010
    Abstract
    While the Control Flow Checking (CFC) methods are using the ordinary instruction set and general Arithmetic and Logic Unit (ALU) features to protect the programs against the transient faults, this paper presents a new kind of CFC method, called feature specific CFC. The idea behind this method is using a specific internal hardware in modern processors which provides the ability to monitor internal various parameters of the program. This method is a pure software method and the external hardware overhead is zero. Other overheads have been measured experimentally by executing the workloads on a Pentium system. The execution time overhead is between 42% and 67% and the program size overhead is... 

    Transient detection in COTS processors using software approach

    , Article Microelectronics Reliability ; Volume 46, Issue 1 , 2006 , Pages 124-133 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a software-based error detection scheme called enhanced committed instructions counting (ECIC) for embedded and real-time systems using commercial off-the-shelf (COTS) processors. The scheme uses the internal performance monitoring features of a processor, which provides the ability to count the number of committed instructions in a program. To evaluate the ECIC scheme, 6000 software induced faults are injected into a 32-bit Pentium® processor. The results show that the error detection coverage varies between 90.52% and 98.18%, for different workloads. © 2004 Elsevier Ltd. All rights reserved  

    CFCET: A hardware-based control flow checking technique in COTS processors using execution tracing

    , Article Microelectronics Reliability ; Volume 46, Issue 5-6 , 2006 , Pages 959-972 ; 00262714 (ISSN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    This paper presents a behavioral-based error detection technique called control flow checking by execution tracing (CFCET) to increase concurrent error detection capabilities of commercial off-the-shelf (COTS) processors. This technique traces the program jumps graph (PJG) at run-time and compares it with the reference jumps graph to detect possible violations caused by transient faults. The reference graph is driven by a preprocessor from the source program. The idea behind the CFCET is based on using an external watchdog processor (WDP) and also the internal execution tracing feature available in COTS processors to monitor the addresses of taken branches in a program, externally. This is... 

    A hardware approach to concurrent error detection capability enhancement in COTS processors

    , Article 11th Pacific Rim International Symposium on Dependable Computing, PRDC 2005, Changsha, Hunan, 12 December 2005 through 14 December 2005 ; Volume 2005 , 2005 , Pages 83-90 ; 0769524923 (ISBN); 9780769524924 (ISBN) Rajabzadeh, A ; Miremadi, S. G ; Sharif University of Technology
    2005
    Abstract
    To enhance the error detection capability in COTS (commercial off-the-shelf) -based design of safety-critical systems, a new hardware-based control flow checking (CFC) technique will be presented. This technique, Control Flow Checking by Execution Tracing (CFCET), employs the internal execution tracing features available in COTS processors and an external watchdog processor (WDP) to monitor the addresses of taken branches in a program. This is done without any modification of application programs, therefore, the program overhead is zero. The external hardware overhead is about 3.5% using an Altera Flex 10K30 FPGA. For different workload programs, the execution time overhead and the error...