Dr Behzad Abdolmaleki
School of Computer Science
Lecturer in Cybersecurity
Admissions Tutor
behzad.abdolmaleki@sheffield.ac.uk
Regent Court (CS)
Full contact details
Dr Behzad Abdolmaleki
School of Computer Science
Regent Court (CS)
211 Portobello
Sheffield
S1 4DP
School of Computer Science
Regent Court (CS)
211 Portobello
Sheffield
S1 4DP
- Profile
-
I am an Assistant Professor in the Department of Computer Science and a member of the Security of Advanced Systems research group at the ±¬ÁÏTV, UK.
My research broadly focuses on the construction of cryptographic schemes in Post-Quantum and Quantum settings, as well as their intersections with other disciplines, including Zero-Knowledge proofs, Cryptocurrencies, and Secure, Transparent AI and ML systems.
- Publications
-
Journal articles
- A Lattice-based Designated Verifier zkSNARK from Standard Assumptions.. IACR Cryptol. ePrint Arch., 2025, 2099-2099.
- On the Simulation-Extractability of Proof-Carrying Data.. IACR Cryptol. ePrint Arch., 2025, 2037-2037.
- A Generic Framework for Practical Lattice-Based Non-interactive Publicly Verifiable Secret Sharing.. IACR Cryptol. ePrint Arch., 2025, 901-901.
- Universally Composable Password-Hardened Encryption.. IACR Cryptol. ePrint Arch., 2025, 1647-1647.
- Post-Quantum Access Control with Application to Secure Data Retrieval.. IACR Commun. Cryptol., 2, 20-20.
- Shuffle Arguments Based on Subset-Checking.. IACR Cryptol. ePrint Arch., 2024, 1056-1056.
- Post-Quantum Access Control with Application to Secure Data Retrieval.. IACR Cryptol. ePrint Arch., 2024, 1160-1160.
- Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.. IACR Cryptol. ePrint Arch., 2024, 1024-1024.
- On Quantum Simulation-Soundness.. IACR Commun. Cryptol., 1, 18-18.
- Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.. IACR Cryptol. ePrint Arch., 2023, 97-97.
- stoRNA: Stateless Transparent Proofs of Storage-time.. IACR Cryptol. ePrint Arch., 2023, 515-515.
- CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.. IACR Cryptol. ePrint Arch., 2022, 1756-1756.
- Steganography-Free Zero-Knowledge.. IACR Cryptol. ePrint Arch., 2022, 1263-1263.
- Two-Round Concurrent 2PC from Sub-Exponential LWE.. IACR Cryptol. ePrint Arch., 2022, 1719-1719.
- . Journal of Cryptology, 34(3).
- Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.. IACR Cryptol. ePrint Arch., 2021, 1360-1360.
- Smooth Zero-Knowledge Hash Functions.. IACR Cryptol. ePrint Arch., 2021, 653-653.
- Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.. IACR Cryptol. ePrint Arch., 2020, 364-364.
- Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.. IACR Cryptol. ePrint Arch., 2020, 62-62.
- On Subversion-Resistant SNARKs.. IACR Cryptol. ePrint Arch., 2020, 668-668.
- A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.. IACR Cryptol. ePrint Arch., 2019, 1063-1063.
- Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols.. IACR Cryptol. ePrint Arch., 2019, 1125-1125.
- DL-Extractable UC-Commitment Schemes.. IACR Cryptol. ePrint Arch., 2019, 201-201.
- UC-Secure CRS Generation for SNARKs.. IACR Cryptol. ePrint Arch., 2019, 471-471.
- . Wireless Networks, 25(3), 1235-1252.
- On QA-NIZK in the BPK Model.. IACR Cryptol. ePrint Arch., 2018, 877-877.
- . Wireless Personal Communications, 95(4), 5057-5080.
- A Subversion-Resistant SNARK.. IACR Cryptol. ePrint Arch., 2017, 599-599.
- Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags.. IACR Cryptol. ePrint Arch., 2016, 387-387.
- Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT.. IACR Cryptol. ePrint Arch., 2016, 649-649.
- . Wireless Personal Communications, 83(3), 1663-1682.
- Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 7(2), 135-149.
- Analysis of an RFID Authentication Protocol in Accordance with EPC Standards.. IACR Cryptol. ePrint Arch., 2015, 980-980.
- . IACR Communications in Cryptology, 1(4).
Book chapters
- , Lecture Notes in Computer Science (pp. 235-267). Springer Nature Singapore
- , Lecture Notes in Computer Science (pp. 107-142). Springer Nature Switzerland
- In Galdi C & Phan DH (Ed.), Lecture Notes in Computer Science (pp. 345-366). Springer Nature Switzerland
- , Lecture Notes in Computer Science (pp. 389-410). Springer Nature Switzerland
- , Advances in Cryptology – ASIACRYPT 2023 (pp. 71-105). Springer Nature Singapore
Conference proceedings
- . 2026 International Conference on Quantum Communications, Networking, and Computing (QCNC) (pp 820-824), 6 April 2026 - 8 April 2026.
- . 2025 IEEE Symposium on Security and Privacy (SP) (pp 1140-1158), 12 May 2025 - 15 May 2025.
- . CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp 2057-2071). Salt Lake City, UT, USA, 14 October 2024 - 14 October 2024.
- . 2024 IEEE 37th Computer Security Foundations Symposium (CSF) (pp 527-542), 8 July 2024 - 12 July 2024.
- Strong Privacy-Preserving Universally Composable AKA Protocol with Seamless Handover Support for Mobile Virtual Network Operator.. CCS (pp 2057-2071)
- (pp 3-25)
- (pp 143-172)
- (pp 510-535)
- (pp 492-512)
- (pp 46-67)
- . Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (pp 1987-2005)
- (pp 590-620)
- (pp 1-21)
- (pp 99-117)
- (pp 385-405)
- . 2017 Advances in Wireless and Optical Communications (RTUWO) (pp 208-213), 2 November 2017 - 3 November 2017.
- (pp 3-33)
- . 2016 8th International Symposium on Telecommunications (IST) (pp 111-116), 27 September 2016 - 28 September 2016.
- . 2016 24th Iranian Conference on Electrical Engineering (ICEE) (pp 1475-1480), 10 May 2016 - 12 May 2016.
- . 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC) (pp 116-121), 8 September 2015 - 10 September 2015.
- . 2015 23rd Iranian Conference on Electrical Engineering (pp 426-431), 10 May 2015 - 14 May 2015.
- . 7'th International Symposium on Telecommunications (IST'2014) (pp 1172-1177), 9 September 2014 - 11 September 2014.
- . 7'th International Symposium on Telecommunications (IST'2014) (pp 895-900), 9 September 2014 - 11 September 2014.
- . 2014 11th International ISC Conference on Information Security and Cryptology (pp 137-142), 3 September 2014 - 4 September 2014.
- . 2012 6th International Conference on Application of Information and Communication Technologies (AICT) (pp 1-6), 17 October 2012 - 19 October 2012.
Preprints
- , arXiv.
- Research group
-
Security of Advanced Systems research group
- Grants
-
- zkHealth: Zero Knowledge (Minimal-Disclosure) Verification for NHS Service Access, Innovate UK, 04/2026 - 07/2026, £27,996, as PI
- AEGIS - Auditable Eligibility Governance & Integrity Service, Innovate UK, 04/2026 - 07/2026, £15,443, as PI
- DIDShield: A Privacy-Centric Approach to Digital Wallet Security, Innovate UK, 04/2025 - 07/2025, £22,757, as PI
Links