
Navid Abapour
Academic and research departments
Surrey Centre for Cyber Security, Computer Science Research Centre.ย้ถนสำฦต
My research project
Trust and Privacy in Post-Quantum Electronic VotingInitiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmmโฆ Let me seeโฆ We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
Supervisors
Initiation: October 2023
Goal? Never trust parties whose names start with A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z!
My project aims to design an efficient e-voting for the post-quantum era, where each party has a high level of trustworthiness in their interaction.
How? Hmmmโฆ Let me seeโฆ We still can not vote classic online after 40 years! And you are asking me How to do it in Post-quantum?!
We are trying to model the trust as a set of statements/attributes each party must satisfy. Also, combining algebraic lattice-based structures with primitives like secret-sharing schemes, zero-knowledge proofs, ring signatures, and attribute-based encryption is going to increase the applicability of this frameworkโs protocols for the post-quantum era, along with keeping an eye on being computationally secure.
Challenges? Well... sometimes it is hard to trust...
Apart from the emergence of novel quantum algorithms, numerous things like handling practical efficiency in lattice-based systems make this project hard. Still, the most critical one is a set of conflicting properties in privacy, such as ballot secrecy, receipt freeness, coercion resistance, everlasting and participation privacy, etc.
University roles and responsibilities
- Vice Chair of PGR/ECR Conference 2025 - ๐๐จ๐๐ญ๐จ๐ซ๐๐ฅ ๐๐จ๐ฅ๐ฅ๐๐ ๐
- Course Lab Assistant - ๐๐๐ก๐จ๐จ๐ฅ ๐จ๐ ๐๐จ๐ฆ๐ฉ๐ฎ๐ญ๐๐ซ ๐๐๐ข๐๐ง๐๐ ๐๐ง๐ ๐๐ฅ๐๐๐ญ๐ซ๐จ๐ง๐ข๐ ๐๐ง๐ ๐ข๐ง๐๐๐ซ๐ข๐ง๐
My qualifications
Project: "๐ณ๐๐๐๐๐๐๐๐๐๐ฃ๐๐ ๐ป๐๐๐๐๐๐-๐๐๐๐๐ ๐ผ๐๐๐๐๐ ๐๐๐ ๐ ๐๐๐๐๐ ๐๐ข๐๐๐๐๐๐๐ ๐ฒ๐๐ข๐๐๐๐๐๐๐๐๐ข"
Supervisor: Reza Hooshmandasl
Teaching and Learning in Higher Education
Mentor: Karen Gravett
Affiliations and memberships
ResearchResearch interests
Post-quantum Cryptography, Secure Multi-party Computation, Privacy-preserving Computing, Trustworthiness
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [] []
Supervisor: , Advisor:
Indicators of esteem
Reviewer of (ext.) | | | | |
Research interests
Post-quantum Cryptography, Secure Multi-party Computation, Privacy-preserving Computing, Trustworthiness
Research collaborations
University of Melbourne (2021-2022)
Developed the Advanced Information Flow Security Concurrent Separation Logic [] []
Supervisor: , Advisor:
Indicators of esteem
Reviewer of (ext.) | | | | |
Teaching
ย้ถนสำฦต (2024-2025)
- C++ and Object-oriented Design (): Lab Instructor
- Cloud Computing (): Lab Instructor
- Further Programming Paradigms (): Lab Instructor
- Computer Security (): Lab Instructor
ย้ถนสำฦต (2023-2024)
- Advanced Challenges in Web Technologies (): Mentor and Lab Instructor
- C++ and Object-oriented Design (): Lab Instructor
University of Mohaghegh Ardabili (2019-2022)
- Data Structure and Algorithms: Teaching Assistant
- Data Mining: Coursework Marker
- Foundations of Algebra: Coursework Marker
Publications
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.
In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service providerโs trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.
With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.