Skip to main content

Showing 1–6 of 6 results for author: Mohajeri, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2107.10133  [pdf, other

    cs.CR

    HUAP: Practical Attribute-based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices

    Authors: Mostafa Chegenizadeh, Mohammad Ali, Javad Mohajeri, Mohammad Reza Aref

    Abstract: Attribute-based encryption (ABE) is a promising cryptographic mechanism for providing confidentiality and fine-grained access control in the cloud-based area. However, due to high computational overhead, common ABE schemes are not suitable for resource-constrained devices. Moreover, data owners should be able to update their defined access policies efficiently, and in some cases, applying hidden a… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: This paper is an extension of work presented in ISCISC 2019

  2. Improved Secure Efficient Delegated Private Set Intersection

    Authors: Alireza Kavousi, Javad Mohajeri, Mahmoud Salmasizadeh

    Abstract: Private Set Intersection (PSI) is a vital cryptographic technique used for securely computing common data of different sets. In PSI protocols, often two parties hope to find their common set elements without needing to disclose their uncommon ones. In recent years, the cloud has been playing an influential role in PSI protocols which often need huge computational tasks. In 2017, Abadi et al. intro… ▽ More

    Submitted 28 January, 2021; v1 submitted 8 April, 2020; originally announced April 2020.

    Comments: 6 pages, presented in proceedings of the 28th Iranian Conference on Electrical Engineering (ICEE 2020). Final version of the paper has been added

  3. An Efficient Anonymous Authentication Scheme Using Registration List in VANETs

    Authors: A. Aghabagherloo, J. Mohajeri, M. Salmasizadeh, M. Mohassel Feghhi

    Abstract: Nowadays, Vehicular Ad hoc Networks (VANETs) are popularly known as they can reduce traffic and road accidents. These networks need several security requirements, such as anonymity, data authentication, confidentiality, traceability and cancellation of offending users, unlinkability, integrity, undeniability and access control. Authentication is one of the most important security requirements in t… ▽ More

    Submitted 1 April, 2020; originally announced April 2020.

    Comments: 5 pages, 4 figures, Accepted for ICEE2020

  4. arXiv:1810.05864  [pdf, ps, other

    cs.CR

    On the security of the hierarchical attribute based encryption scheme proposed by Wang et al

    Authors: Mohammad Ali, Javad Mohajeri, Mohammad-Reza Sadeghi

    Abstract: Ciphertext-policy hierarchical attribute-based encryption (CP-HABE) is a promising cryptographic primitive for enforcing the fine-grained access control with scalable key delegation and user revocation mechanisms on the outsourced encrypted data in a cloud. Wang et al. (2011) proposed the first CP-HABE scheme and showed that the scheme is semantically secure in the random oracle model [4, 5]. Due… ▽ More

    Submitted 13 October, 2018; originally announced October 2018.

  5. arXiv:cs/0508110  [pdf

    cs.CR

    Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework

    Authors: Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh

    Abstract: In this paper we try to unify the frameworks of definitions of semantic security, indistinguishability and non-malleability by defining semantic security in comparison based framework. This facilitates the study of relations among these goals against different attack models and makes the proof of the equivalence of semantic security and indistinguishability easier and more understandable. Beside… ▽ More

    Submitted 25 August, 2005; originally announced August 2005.

    Comments: 8 pages, 1 figure

  6. arXiv:cs/0505055  [pdf

    cs.CR cs.CC

    A Verifiable Partial Key Escrow, Based on McCurley Encryption Scheme

    Authors: Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh, Siamak Fayyaz

    Abstract: In this paper, firstly we propose two new concepts concerning the notion of key escrow encryption schemes: provable partiality and independency. Roughly speaking we say that a scheme has provable partiality if existing polynomial time algorithm for recovering the secret knowing escrowed information implies a polynomial time algorithm that can solve a well-known intractable problem. In addition,… ▽ More

    Submitted 22 May, 2005; originally announced May 2005.