Saeideh Kabirirad - Academia.edu (original) (raw)

Uploads

Papers by Saeideh Kabirirad

Research paper thumbnail of A Blockchain-Based Approach for Data Storage in Drug Supply Chain

2023 9th International Conference on Web Research (ICWR)

Traceability and auditability are essential features in supply chain management and construction.... more Traceability and auditability are essential features in supply chain management and construction. However, from the customers' perspective, trust is the most critical aspect of these systems. Additionally, relying on third parties for trade in centralized systems is indispensable. Blockchain-based drug traceability provides a potential solution to create a platform for an immutable, trustworthy, accountable, and transparent system in the pharmaceutical supply chain. Furthermore, we present a model for storing pharmaceutical supply chain data using blockchain, which leverages the key advantages of blockchain and smart contracts. Our proposed solution is based on hyperledger Besu and is complete and cost-effective in terms of the privacy and confidentiality of the blockchain network. Additionally, our proposed model addresses the challenges of storing large data in the blockchain, which we intend to solve by using the IPFS storage system. In such a system, instead of storing big data, we store their abstracts in the blockchain to reduce the load pressure of the chain and realize efficient information queries.

Research paper thumbnail of Forgery Attack on An Outsourced Attribute-Based Signature Scheme

2022 27th International Computer Conference, Computer Society of Iran (CSICC)

Research paper thumbnail of Another Security Weakness in an Authenticated Group Key Agreement

Journal of Internet Technology, 2010

Recently, Hwang et al. [1] showed that the authenticated group key agreement protocol proposed by... more Recently, Hwang et al. [1] showed that the authenticated group key agreement protocol proposed by Dutta and Barua [2] suffers from an impersonation attack and proposed an improvement to fix the problem. The goal of this paper is to prove that both the scheme of [2] and its improved version have another security weakness. In [2], it is claimed that the protocol has the ability to detect the presence of a corrupted group member so that if an invalid message is sent, then this can be detected by all legitimate members of the group. In this paper, we show that this claim is not true even in the improved version. We prove that two malicious participants can prohibit legitimate participants from obtaining the same shared key and remain completely unnoticed.

Research paper thumbnail of High-speed GPU implementation of a secret sharing scheme based on cellular automata

The Journal of Supercomputing, 2019

Parallel implementation provides a solution for the problem of accelerating cellular automata (CA... more Parallel implementation provides a solution for the problem of accelerating cellular automata (CA)-based secret sharing schemes and make them appropriate for bulk data sharing and real-time applications. By presenting new platforms, we need new implementation techniques to run algorithms as fast as possible on the platform. In this paper, we present a new implementation of a CA-based secret sharing scheme using the Graphic Processing Unit (GPU). We propose a new data arrangement that reduces the total number of accesses to the memories in GPU. Our algorithm further reduces the amount of data required by each thread and at the same time achieves a high cache hit rate. Also, it can achieve coalesced memory accesses to optimal use of the global memory bandwidth. The proposed method obtains speedup up to four times faster than the best previous GPU implemented CA-based multi-secret sharing schemes.

Research paper thumbnail of A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

Wireless Personal Communications, 2010

Research paper thumbnail of A block-based image encryption scheme using cellular automata with authentication capability

THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019), 2019

Research paper thumbnail of Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata

IACR Cryptol. ePrint Arch., 2015

Recently an image encryption scheme based on chaotic maps and memory cellular automata has been p... more Recently an image encryption scheme based on chaotic maps and memory cellular automata has been proposed. In this paper, the security of the scheme is evaluated and it is demonstrated that the scheme can be broken by chosen plain-text attack. Having one or more monochrome plain-images and their corresponding cipherimages, a part of key-stream can be retrieved. Furthermore, it is discovered that the scheme can be broken by brute search attack with efficient time complexity, and it is also vulnerable to differential attack. Meanwhile, we provide experimental results to support the proposed attacks and suggest several improvements to make scheme stronger.

Research paper thumbnail of A (t,n)-multi secret image sharing scheme based on Boolean operations

Journal of Visual Communication and Image Representation

Abstract In ( t , n ) -multi secret image sharing (MSIS) schemes, a number of secret images are s... more Abstract In ( t , n ) -multi secret image sharing (MSIS) schemes, a number of secret images are shared among n users so that participation of at least t of them is needed to recover the shared images. Due to the high volume of images and computing complexity of secret sharing schemes, recent Boolean-based approaches are highly desirable. Unfortunately, to the best of our knowledge, existing literature on Boolean-based MSIS schemes only supports two cases: ( 2 , n ) and ( n , n ) . In ( n , n ) -schemes, we lose fault tolerancy such that in the absence of even one share, secret images can not be recovered. On the other hand, ( 2 , n ) -MSIS seems to be quite restrictive for the wide range of applications that might occur in practice. It is therefore a challenging problem to propose a Boolean-based ( t , n ) -MSIS for t ≠ 2 , n . The aim of this paper is to solve this problem. We further provide formal proofs of security as well as comparison with existing literature.

Research paper thumbnail of Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders

Research paper thumbnail of Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders

Int. J. Netw. Secur., 2016

The most important security concern in group key exchange protocols is the semantic security of t... more The most important security concern in group key exchange protocols is the semantic security of the produced shared key which dictates that outsiders should not be able to learn anything about the key. It is also challenging for these protocols to retain their security even in the presence of dishonest insiders who do not follow the protocol specifications. In this paper, we propose an identity-based group key exchange protocol which addresses these security concerns. We prove that our scheme achieves semantic security in a well-known adversarial model. We then show that the success probability of recognizing dishonest insiders in the proposed scheme is almost one. We further provide a comparison between our protocol and some other schemes in terms of computation and communication cost, as well as security properties.

Research paper thumbnail of High-speed GPU implementation of a secret sharing scheme based on cellular automata

The Journal of Supercomputing

Parallel implementation provides a solution for the problem of accelerating cellular automata (CA... more Parallel implementation provides a solution for the problem of accelerating cellular automata (CA)-based secret sharing schemes and make them appropriate for bulk data sharing and real-time applications. By presenting new platforms, we need new implementation techniques to run algorithms as fast as possible on the platform. In this paper, we present a new implementation of a CA-based secret sharing scheme using the Graphic Processing Unit (GPU). We propose a new data arrangement that reduces the total number of accesses to the memories in GPU. Our algorithm further reduces the amount of data required by each thread and at the same time achieves a high cache hit rate. Also, it can achieve coalesced memory accesses to optimal use of the global memory bandwidth. The proposed method obtains speedup up to four times faster than the best previous GPU implemented CA-based multi-secret sharing schemes.

Research paper thumbnail of Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations

Journal of Information Security and Applications

Research paper thumbnail of A Blockchain-Based Approach for Data Storage in Drug Supply Chain

2023 9th International Conference on Web Research (ICWR)

Traceability and auditability are essential features in supply chain management and construction.... more Traceability and auditability are essential features in supply chain management and construction. However, from the customers' perspective, trust is the most critical aspect of these systems. Additionally, relying on third parties for trade in centralized systems is indispensable. Blockchain-based drug traceability provides a potential solution to create a platform for an immutable, trustworthy, accountable, and transparent system in the pharmaceutical supply chain. Furthermore, we present a model for storing pharmaceutical supply chain data using blockchain, which leverages the key advantages of blockchain and smart contracts. Our proposed solution is based on hyperledger Besu and is complete and cost-effective in terms of the privacy and confidentiality of the blockchain network. Additionally, our proposed model addresses the challenges of storing large data in the blockchain, which we intend to solve by using the IPFS storage system. In such a system, instead of storing big data, we store their abstracts in the blockchain to reduce the load pressure of the chain and realize efficient information queries.

Research paper thumbnail of Forgery Attack on An Outsourced Attribute-Based Signature Scheme

2022 27th International Computer Conference, Computer Society of Iran (CSICC)

Research paper thumbnail of Another Security Weakness in an Authenticated Group Key Agreement

Journal of Internet Technology, 2010

Recently, Hwang et al. [1] showed that the authenticated group key agreement protocol proposed by... more Recently, Hwang et al. [1] showed that the authenticated group key agreement protocol proposed by Dutta and Barua [2] suffers from an impersonation attack and proposed an improvement to fix the problem. The goal of this paper is to prove that both the scheme of [2] and its improved version have another security weakness. In [2], it is claimed that the protocol has the ability to detect the presence of a corrupted group member so that if an invalid message is sent, then this can be detected by all legitimate members of the group. In this paper, we show that this claim is not true even in the improved version. We prove that two malicious participants can prohibit legitimate participants from obtaining the same shared key and remain completely unnoticed.

Research paper thumbnail of High-speed GPU implementation of a secret sharing scheme based on cellular automata

The Journal of Supercomputing, 2019

Parallel implementation provides a solution for the problem of accelerating cellular automata (CA... more Parallel implementation provides a solution for the problem of accelerating cellular automata (CA)-based secret sharing schemes and make them appropriate for bulk data sharing and real-time applications. By presenting new platforms, we need new implementation techniques to run algorithms as fast as possible on the platform. In this paper, we present a new implementation of a CA-based secret sharing scheme using the Graphic Processing Unit (GPU). We propose a new data arrangement that reduces the total number of accesses to the memories in GPU. Our algorithm further reduces the amount of data required by each thread and at the same time achieves a high cache hit rate. Also, it can achieve coalesced memory accesses to optimal use of the global memory bandwidth. The proposed method obtains speedup up to four times faster than the best previous GPU implemented CA-based multi-secret sharing schemes.

Research paper thumbnail of A New Verifiable Multi-secret Sharing Scheme Based on Bilinear Maps

Wireless Personal Communications, 2010

Research paper thumbnail of A block-based image encryption scheme using cellular automata with authentication capability

THIRD INTERNATIONAL CONFERENCE OF MATHEMATICAL SCIENCES (ICMS 2019), 2019

Research paper thumbnail of Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata

IACR Cryptol. ePrint Arch., 2015

Recently an image encryption scheme based on chaotic maps and memory cellular automata has been p... more Recently an image encryption scheme based on chaotic maps and memory cellular automata has been proposed. In this paper, the security of the scheme is evaluated and it is demonstrated that the scheme can be broken by chosen plain-text attack. Having one or more monochrome plain-images and their corresponding cipherimages, a part of key-stream can be retrieved. Furthermore, it is discovered that the scheme can be broken by brute search attack with efficient time complexity, and it is also vulnerable to differential attack. Meanwhile, we provide experimental results to support the proposed attacks and suggest several improvements to make scheme stronger.

Research paper thumbnail of A (t,n)-multi secret image sharing scheme based on Boolean operations

Journal of Visual Communication and Image Representation

Abstract In ( t , n ) -multi secret image sharing (MSIS) schemes, a number of secret images are s... more Abstract In ( t , n ) -multi secret image sharing (MSIS) schemes, a number of secret images are shared among n users so that participation of at least t of them is needed to recover the shared images. Due to the high volume of images and computing complexity of secret sharing schemes, recent Boolean-based approaches are highly desirable. Unfortunately, to the best of our knowledge, existing literature on Boolean-based MSIS schemes only supports two cases: ( 2 , n ) and ( n , n ) . In ( n , n ) -schemes, we lose fault tolerancy such that in the absence of even one share, secret images can not be recovered. On the other hand, ( 2 , n ) -MSIS seems to be quite restrictive for the wide range of applications that might occur in practice. It is therefore a challenging problem to propose a Boolean-based ( t , n ) -MSIS for t ≠ 2 , n . The aim of this paper is to solve this problem. We further provide formal proofs of security as well as comparison with existing literature.

Research paper thumbnail of Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders

Research paper thumbnail of Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders

Int. J. Netw. Secur., 2016

The most important security concern in group key exchange protocols is the semantic security of t... more The most important security concern in group key exchange protocols is the semantic security of the produced shared key which dictates that outsiders should not be able to learn anything about the key. It is also challenging for these protocols to retain their security even in the presence of dishonest insiders who do not follow the protocol specifications. In this paper, we propose an identity-based group key exchange protocol which addresses these security concerns. We prove that our scheme achieves semantic security in a well-known adversarial model. We then show that the success probability of recognizing dishonest insiders in the proposed scheme is almost one. We further provide a comparison between our protocol and some other schemes in terms of computation and communication cost, as well as security properties.

Research paper thumbnail of High-speed GPU implementation of a secret sharing scheme based on cellular automata

The Journal of Supercomputing

Parallel implementation provides a solution for the problem of accelerating cellular automata (CA... more Parallel implementation provides a solution for the problem of accelerating cellular automata (CA)-based secret sharing schemes and make them appropriate for bulk data sharing and real-time applications. By presenting new platforms, we need new implementation techniques to run algorithms as fast as possible on the platform. In this paper, we present a new implementation of a CA-based secret sharing scheme using the Graphic Processing Unit (GPU). We propose a new data arrangement that reduces the total number of accesses to the memories in GPU. Our algorithm further reduces the amount of data required by each thread and at the same time achieves a high cache hit rate. Also, it can achieve coalesced memory accesses to optimal use of the global memory bandwidth. The proposed method obtains speedup up to four times faster than the best previous GPU implemented CA-based multi-secret sharing schemes.

Research paper thumbnail of Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations

Journal of Information Security and Applications