School of Mathematics, Iran University of Science & Technology
Narmak,Tehran 1684613114, I. R. Iran.
Journal Papers
New efficient and practical verifiable multi-secret sharing schemes, Information Sciences, Volume 178, 2008, pp. 2262-2274. (with M. Hadian)
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves, Computer Communications, Volume 31, 2008, pp. 1777-1784. (with M. Hadian)
An efficient threshold verifiable multi-secret sharing, Computer Standards & Interfaces, Volume 30, 2008, pp.187-190. (with M. Hadian)
A new threshold multi-secret sharing scheme, Amirkabir Journal of Science and Technology, Volume 68, 2008, pp. 45-50. (with M. Hadian)
Analysis of frame attack on Hsu et al.'s non-repudiable threshold multi-proxy multi-signature scheme with shared verification, Scientia Iranica, Volume 19, Issue 3, 2012, pp. 674–679.
A novel secure self proxy signature scheme, International Journal of Network Security, Volume 14, 1, 2012, pp. 83-87.
A novel non-repudiable threshold proxy signature scheme with known signers, International Journal of Network Security, Volume 15, No.1, 2013, pp. 231-236.
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem, Information Sciences, Volume 294, 2015, pp. 31–40.
A Secure non-repudiable general proxy signature, International Journal of Cyber-Security and Digital Forensics, Volume 4, No. 2, 2015, pp. 380-389.
Computationally-secure Multiple Secret Sharing: Models, Schemes, and Formal Security Analysis, ISeCure Journal, Volume 7, No. 2, 2015, pp. 91-99.
Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes, Journal of Information Processing Systems, Volume 12, No. 2, 2016, pp. 249-262.
How to fairly share multiple secrets stage by stage, Wireless Personal Communications, Volume 90, No. 1, 2016, pp. 93-107.
Share Secrets Stage by Stage with Homogeneous Linear Feedback Shift Register in the Standard Model, Security and Communication Networks, Volume 9, No. 17, 2016, pp. 4495–4504.
Semiquantum secret sharing using three particles without entanglement, Journal Of Electronical & Cyber Defence, Volume 4, No. 3, 2016, pp. 83-92.
Secure publicly verifiable and proactive secret sharing schemes with general access structure, Information Sciences, Volume 378, 2017, pp. 99-108.
Seminars and Conferences
Combinatorial theory and modern cryptography, The 38th Iranian International Conference on Mathematics, 2007. (with M. Hadian)
Application of mathematics and cryptology in international relationships, 41st Iranian International Conference on Mathematics, 12-15 September 2010, University of Urmia, Urmia, Iran.
Application of mathematics in astronomy and engineering science, The 1st National Congress on the Effect of Mathematics Development of Sciences, 2011.
Application of number theory in cryptography, The 4th Mathematics Annual National Conference of PNU, 25-26 September 2011, Ardabil, Iran. (with M. Abdi)
Design of a proxy signature based on discrete logarithm problem, The 4th Mathematics Annual National Conference of PNU, 25-26 September 2011, Ardabil, Iran.
Application of mathematics in policy, The 4th Mathematics Annual National Conference of PNU, 25-26 September 2011, Ardabil, Iran.
Application of elliptic curves in electronic commerce, The 4th Mathematics Annual National Conference of PNU, 25-26 September 2011, Ardabil, Iran. (with M. Abdi)
Security of e-mail, 1th National Conference on Mathematics and its Applications in Engineering Science, 22-23 February, 2012, Juybar University, Iran
Analysis of Hsu et al's scheme, The 44th Annual Iranian Mathematics Conference, 27-30 August 2013, Ferdowsi University of Mashhad, Iran
Generalization of threshold proxy signature scheme, The 44th Annual Iranian Mathematics Conference, 27-30 August 2013, Ferdowsi University of Mashhad, Iran.
A secret sharing scheme based on Jordan matrix. 5th Iranian Conference on Applied Mathematics, 2-4 September, 2013, Bu-Ali Sina University, Hamadan, Iran.
A linear secret sharing scheme based on connected graphs. 2th Iranian Conference on algebraic graph and 3^th Iranian Conference on Chemical graph theory, 2-4 September, 2013, Bu-Ali Sina University, Hamadan, Iran.
Semiquantum Secret Sharing, 1st International Conference on New Research Achievements in Electrical and Computer Engineering, 12 May 2016, IEEE, Amirkabir University of Technology, Tehran, Iran.
An signcryption scheme with compartmented secret sharing for unsigncryption, 1st National Conference on Computer Sciences & Information Technology, 25 May 2016, Qom, Iran.