Skip to main content

Showing 1–3 of 3 results for author: Kazempour, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.07355  [pdf, ps, other

    cs.IT

    Information-Theoretic Secure and Private Voting System

    Authors: Seyed Reza Hoseini Najarkolaei, Narges Kazempour, Hasti Rostami, Mohammad Reza Aref

    Abstract: In this paper, we present a private voting system that consists of N authorized voters who may vote to one of the K candidates or vote abstain. Each voter wants to compute the final tally while staying private and robust against malicious voters, who try to gain information about the vote of the other voters beyond the final result, or send incorrect information to affect the final tally. We desig… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: 13 pages

  2. arXiv:1901.05927  [pdf, other

    cs.IT

    Fundamental Limits of Private User Authentication

    Authors: Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: Most of the security services in the connected world of cyber-physical systems necessitate authenticating a large number of nodes privately. In this paper, the private authentication problem is considered which consists of a certificate authority, a verifier (or some verifiers), many legitimate users (provers), and an arbitrary number of attackers. Each legitimate user wants to be authenticated (u… ▽ More

    Submitted 12 September, 2022; v1 submitted 17 January, 2019; originally announced January 2019.

    Comments: 15 pages, 4 figures

  3. arXiv:1604.04818  [pdf, ps, other

    cs.IT cs.CR

    Secrecy Capacity in Large Cooperative Networks in Presence of Eavesdroppers with Unknown Locations

    Authors: Amir Hossein Hadavi, Narges Kazempour, Mahtab Mirmohseni, Mohammad Reza Aref

    Abstract: In this paper, an extended large wireless network under the secrecy constraint is considered. In contrast to works which use idealized assumptions, a more realistic network situation with unknown eavesdroppers locations is investigated: the legitimate users only know their own Channel State Information (CSI), not the eavesdroppers CSI. Also, the network is analyzed by taking in to account the effe… ▽ More

    Submitted 16 April, 2016; originally announced April 2016.