Ziba Eslami

Ziba Eslami

Associate Professor, Shahid Beheshti University

Email:

z_eslami@sbu.ac.ir

Phone:

+98 21 2990 3007

Mail:

Ziba Eslami,

Department of Data and Computer Science,

Faculty of Mathematical Sciences,

Shahid Beheshti University,

Evin, Tehran, Iran

 

I received my Ph.D. in Applied Mathematics from Tehran University in 2000. During the academic years 2000-2003, I was a postdoctoral fellow in the Institute for Research in Fundamental Sciences (IPM). I served as a non-resident researcher at IPM during 2003-2005. Currently, I am an associate professor in the Department of Data and Computer Science at Shahid Beheshti University (SBU) in Iran. My research is primarily centered around cryptography and security of cryptographic protocols.

 

Jump to:

Books
Journal Papers
Conference Papers
Teaching
Graduate Students
Honors/Awards


Books   ^

 

1.     Eslami Z.
Introduction to Coding Theory (in Persian)
Shahid Beheshti University Publishing Center, 2008.


Journal papers   ^

 

 

 

 

1.     D Shiraly, N Pakniat, M Noroozi, Z Eslami

  Pairing-free certificateless authenticated encryption with keyword search

  Journal of Systems Architecture 124, (2022) 102390

 

2.     S Esmaeilzade, N Pakniat, Z Eslami

     A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes

   The Journal of Supercomputing 78 (1), (2022) 72-92

2

2022

 

3.     S Sheidani, Z Eslami

     Blind Multipurpose Image Watermarking with Perfect Security

The ISC International Journal of Information Security 13 (2), (2021) 145-156

 

4.     Z Eslami, M Noroozi, K Amirizirtol

     Public key encryption with distributed keyword search

Journal of Discrete Mathematical Sciences and Cryptography, (2021) 1-25

 

5.     S Sheidani, A Mahmoudi-Aznaveh, Z Eslami

     CPA-Secure privacy-preserving reversible data hiding for JPEG images

IEEE Transactions on Information Forensics and Security 16, (2021) 3647-3661

 

6.     S Sheidani, Z Eslami

     Blind multipurpose watermarking with insertion of a single watermark: a generic    construction based on verifiable threshold secret sharing

IET Image Processing 14 (17), (2020) 4766-4773

 

 

7.     Pakniat N., Shiraly D. and Eslami Z.
Certificateless authenticated encryption with keyword search: Enhanced security model and a concrete construction for industrial IoT.
Journal of Information Security and Applications, vol. 53, pp 102525, 2020.

8.     Pakniat N. and Eslami Z.
Cryptanalysis and improvement of a group RFID authentication protocol.
Wireless Networks, vol. 26, no. 5, pp 3363–3372, 2020.

9.     Noroozi M. and Eslami Z.
Public key authenticated encryption with keyword search: revisited.
IET Information Security, vol. 13, no. 4, pp 336-342, 2019.

10.            Eslami Z., Noroozi M. and Baek J.
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme..
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 10, no. 1, pp 75-85, 2019.

11.            Noroozi M. and Eslami Z.
Public-key encryption with keyword search: a generic construction secure against online and offline keyword guessing attacks.
Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 2, pp. 879-890.

12.            Kabirirad Fazlali M. and Eslami Z.
High-speed GPU implementation of a secret sharing scheme based on cellular automata.
The Journal of Supercomputing, vol. 75, no. 11, pp 7314-7336, 2019.

13.            Kabirirad S. and Eslami Z.
Improvement of  (n, n)-multi secret image sharing schemes based on Boolean operations.
Journal of Information Security and Applications, vol. 47, pp. 16-27, 2019.

14.            Noroozi M., Karoubi I. and Eslami Z.
Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved.
Annals of Telecommunications, vol. 73, no. 11-12, pp. 769-776, 2018.

15.            Noroozi M., Eslami Z. and Pakniat N.
Comments on a chaos-based public key encryption with keyword search scheme.
Nonlinear Dynamics, vol. 94, no. 2, pp. 1127-1132, 2018.

16.            Kabirirad S. and Eslami Z.
A (t, n)-multi secret image sharing scheme based on Boolean operations.
Journal of Visual Communication and Image Representation, vol. 57, pp. 39-47, 2018.

17.            Rajabi B. and Eslami Z.
A verifiable threshold secret sharing scheme based on lattices.
Information Sciences, vol. 501, pp. 655-661, 2019.

18.            Pakniat N. and Eslami Z.
Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model.
Journal of Computing and Security, vol. 4, no. 1, pp. 3-12, 2017.

19.            Eslami Z. and Mohajer R.
Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption.
Quantum Information Processing , vol. 16, no. 8, pp. 197:1-9, 2017.

20.            Rajabi B. and Eslami Z.
A CCA2-Secure Incomparable Public Key Encryption Scheme.
Journal of Computing and Security , vol. 3, no. 1, pp. 197:1-9, 2017.

21.            Pakniat N., Noroozi M. and Eslami Z.
Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata.
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING , vol. 14, no. 1, pp. 38-43, 2016.

22.            Eslami Z., Pakniat N. and Nojoumian M.
Ideal social secret sharing using Birkhoff interpolation method.
Security and Communication Networks , vol. 9, no. 18, pp. 4973-4982, 2016.

23.            Eslami Z., Noroozi M. and Kabiri Rad S.
Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders.

International journal of network security , vol. 18, no. 1, pp.33-42 2016.

24.            Eslami Z.
Algorithmic Aspects of Trades.
ARS COMBINATORIA , vol. 120, no. 3, pp. 245-253, 2015.

25.            Pakniat N., Noroozi M. and Eslami Z.
A Distributed Key Generation Protocol with Hierarchical Threshold Access Structure.

IET Information Security , vol. 9, no. 4, pp. 248-255, 2015.

26.            Eslami Z., Kazemnasab Haji M. and Mirehi N.
Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content.

Multimedia Tools and Applications , vol. 72, no. 3, pp. 2723-2740, 2014.

27.            Eslami Z. and Pakniat N.
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model.

Journal of King Saud University-Computer and Information Sciences , vol. 9, no. 4, pp. 248-255, 2015.

28.            Pakniat N., Eslami Z., Miri A.
A note on "Selling multiple secrets to a single buyer".

Information Sciences , vol. 279, pp. 889-892, 2014.

29.            Pakniat N., Noroozi M. and Eslami Z.
Secret image sharing scheme with hierarchical threshold access structure.

Journal of Visual Communication and Image Representation , vol. 25, no. 5, pp. 1093-1101, 2014.

30.            Eslami Z., Pakniat N. and Noroozi M.
Cryptanalysis of an Attribute-based Key Agreement Protocol.

International Journal of Computer and Information Technologies , vol. 2, no. 1, pp. 351-358, 2014.

31.            Bakhshandeh A. and Eslami Z.
An authenticated image encryption scheme based on chaotic maps and memory cellular automata.

Optics and Lasers in Engineering , vol. 51, no. 6, pp. 665-673, 2013.

32.            Eslami Z. and Bakhshandeh A.
An improvement over an image encryption method based on total shuffling.

Optics Communications , vol. 286, pp. 51-55, 2013.

33.            Babamir F. and Eslami Z.
Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption.

KSII Transactions on Internet and Information Systems , vol. 6, no. 11, pp. 2940-2955, 2012.

34.            Eslami Z. and Kabiri Rad S.
A new verifiable multi-secret sharing scheme based on bilinear maps.

Wireless Personal Communications , vol. 63, no. 2, pp. 459-467, 2012.

35.            Pakniat N. and Eslami Z.
A Proxy E-Raffle Protocol Based on Proxy Signatures.

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications , vol. 2, no. 3, pp. 74-84, 2011.

36.            Eslami Z. and Zarepour Ahmadabadi J.
Secret image sharing with authentication-chaining and dynamic embedding.

Journal of Systems and Software , vol. 84, no. 5, pp. 803-809, 2011.

37.            Eslami Z. and Talebi M.
A new untraceable off-line electronic cash system.

Electronic Commerce Research and Applications , vol. 10, no. 1, pp. 59-66, 2011.

38.            Eslami Z. and Zarepour Ahmadabadi J.
A verifiable multi-secret sharing scheme based on cellular automata.

Information Sciences , vol. 180, no. 15, pp. 2889-2894, 2010.

39.            Eslami Z. and Kabiri Rad S.
Another Security Weakness in an Authenticated Group Key Agreement.
Journal of Internet Technology , vol. 11, no. 4, pp. 573-576, 2010.

40.            Eslami Z., Razzaghi H. and Zarepour Ahmadabadi J.
Secret image sharing based on cellular automata and steganography.

Pattern Recognition , vol. 43, no. 1, pp. 397-404, 2010.

41.            Eslami Z.
On the possible automorphisms of a 3-(16, 7, 5) design.
ARS COMBINATORIA , vol. 95, no. 2, pp. 217-224, 2010.

42.            Eslami Z.
Classification Of Large Sets By Trades.
ARS COMBINATORIA , vol. 82, no. 1, pp. 237-242, 2007.

43.            Eslami Z.
Classification of designs with nontrivial automorphism groups.

Journal of Combinatorial Designs , vol. 14, no. 6, pp. 479-489, 2006.

44.            Eslami Z., Khosrovshahi G.B. and Mohammad-Noori M.
Enumeration of t-Designs Through Intersection Matrices.

Designs, Codes and Cryptography , vol. 32, no. 1, pp. 185-191, 2004.

45.            Eslami Z., Khosrovshahi G.B., Mohammad-Noori M. and Tayfeh-Rezaie R.
Some new 4-designs.
ARS COMBINATORIA , vol. 73, no. 4, pp. 225-230, 2004.

46.            Eslami Z.
LS[7](3,5,11) Exists.

Journal of Combinatorial Designs , vol. 11, no. 5, pp. 312-316, 2003.

47.            Eslami Z.
On the indecomposable partition problem: IPP(10,?).

Discrete Mathematics , vol. 248, no. 1-3, pp. 255-264, 2002.

48.            Eslami Z. and Khosrovshahi G.B.
Some New 6-(14, 7, 4) Designs.

Journal of Combinatorial Theory, Series A , vol. 93, no. 1, pp. 141-152, 2001.

49.            Eslami Z., Khosrovshahi G.B. and Tayfeh-Rezaie R.
On classification of 2-(8, 3) and 2-(9, 3) trades.
Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 38, pp. 231-242, 2001.

50.            Eslami Z., Khosrovshahi G.B. and Tayfeh-Rezaie R.
On halvings of the 2-(10, 3, 8) design.

Journal of Statistical Planning and Inference , vol. 86, no. 2, pp. 411-419, 2000.

51.            Eslami Z. and Khosrovshahi G.B.
Classification of some large sets and designs.

Journal of Geometry , vol. 67, no. 1, pp. 105-110, 2000.

52.            Eslami Z. and Khosrovshahi G.B.
A complete classification of 3-(11, 4, 4) designs with nontrivial automorphism group.

Journal of Combinatorial Designs , vol. 8, no. 6, pp. 419-425, 2000.

Conference papers   ^

 

  1. Sheidani S., Fazlali M. and Eslami Z.
    Accelerating Robust Watermarking Through Parallelization.

    25th International Computer Conference, Computer Society of Iran (CSICC) ,
    pp. 1-7, Tehran, Iran, 2020.
  2. Kabirirad S. and Eslami Z.
    A block-based image encryption scheme using cellular automata with authentication capability.

    AIP Conference Proceedings,
    pp. 080002, Istanbul, Turkey, 2019.
  3. Sheidani S. and Eslami Z.
    Blind Multipurpose Image Watermarking Based on Secret Sharing.

    16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC),
    pp. 1-8, Mashhad, Iran, 2019.
  4. Mohajer R. and Eslami Z.
    Quantum Secret Sharing using single states.

    8th International Symposium on Telecommunications (IST) , pp. 174-177, Tehran, Iran, 2016.
  5. Amiri K., Noroozi M. and Eslami Z.
    Multi-user searchable encryption scheme with general access structure.

    2nd International Conference on Knowledge-Based Engineering and Innovation , pp. 399-404, Tehran, Iran, 2015.
  6. Eslami Z., Pakniat N. and Noroozi M.
    Hierarchical threshold multi-secret sharing scheme based on Birkhoff interpolation and cellular automata.

    18th CSI International Symposium on Computer Architecture & Digital Systems , pp. 1-6, Tehran, Iran, 2015.
  7. Eslami Z., Pakniat N. and Noroozi M.
    Cryptanalysis of an Attribute-based Key Agreement Protocol.
    International Conference on Computer, Information Technology and Digital Media , Tehran, Iran, 2013.
  8. Eslami Z. and Pakniat N.
    A certificateless proxy signature scheme secure in standard model.

    International Conference on Latest Computational Technologies (ICLCT), pp. 81-84, Bangkok, Thailand, 2012.
  9. Babamir F.S. and Eslami Z.
    An aggregate signcryption based on elliptic curves in unattended environments.
    International conference on Applied Analysis and Algebra (ICA), Stanbul, Turkey, 2012.
  10. Babamir F.S. and Eslami Z.
    Improving a coding method in unattended wireless sensor networks.
    5th Conference on Algebraic Combinatorics and Graph Theory (ICA), Kashan, Iran, 2012.
  11. Kazemnasab Haji M. and Eslami Z.
    An efficient buyer-seller watermarking protocol based on proxy signatures.

    8th International ISC Conference on Information Security and Cryptology , pp. 73-78, Mashahd, Iran, 2011.
  12. Eslami Z. and Pakniat N.
    Secret selling of secrets with elliptic curves.
    3rd International Conference on Machine Learning and Computing (ICMLC), Singapore, 2011.
  13. Eslami Z. and Ghavamipoor H.
    An improvement over Liaw's electronic voting scheme.

    IADIS International Conference on e-Societ , Porto, Portugal, 2010.
  14. Eslami Z. and Pakniat N.
    A simple protocol for selling multiple secrets to a single buyer without a trusted party.
    6th international ISC conference on information security and cryptology (ISCISC), pp. 3-6, Isfahan, Iran, 2009.
  15. Eslami Z. and Zarepour Ahmadabadi J.
    Secret image sharing with high quality stego images.
    6th international ISC conference on information security and cryptology (ISCISC), Isfahan, Iran, 2009.
  16. Eslami Z.
    Application of trades in construction/enumeration of combinatorial objects.
    International congress of Mathematicians (ICM), Beijing, China, 2002.

13.                        نوروزی مهناز، نصراله پاک نیت و اسلامی زیبا
رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه: ارائه یک ساخت کلی امن در برابر حملات حدس کلیدواژه برخط و غیر برخط.

چهاردهمین کنفرانس بین المللی انجمن رمز ایران , صفحه: 1-6، شیراز, ایران,1396.

14.                        اسلامی زیبا و نوروزی مهناز
پروتکل توافق کلید گروهی مقاوم در برابر تقلب با ویژگی تصحیح خطای ناشی از اختلال کانال.

هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه, ایران,1394.

15.                        اسلامی زیبا و هجرودی غلامرضا
پروتکل واترمارکینگ فروشنده-خریدار غیرخطی بدون شخص سوم معتمد.

هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه, ایران,1394.

16.                        اسلامی زیبا و کبیری راد سعیده
پیک روش رمزنگاری تصویر بلوک-مبنا با استفاده از اتوماتای سلولی و نگاشت آشوب.

بیستمین کنفرانس ملی سالانه انجمن کامپیوتر ایران، مشهد, ایران,1394.

17.                        اسلامی زیبا و بابامیر فائزه سادات
پایداری داده ها در شبکه های حسگر بی سیم بی ملازم.
نهمین كنفرانس بین المللی انجمن رمز ايران, تبریز، ايران,1391.

18.                        اسلامی زیبا و قوامی پور هدی
يك طرح انتخابات الكترونيك امن و كار آمد مبتني بر امضاي كور.
پانزدهمين كنفرانس انجمن كامپيوتر ايران, تهران، ايران,1388.


Teaching   ^

·         Hot Topics in Cryptography

·         Cryptocurrencies and Blockchain Technologies

·         Cryptographic Protocols

·         Foundations of Cryptography

·         Advanced Cryptography

·         Advanced Coding Theory

·         Introduction to Cryptography (undergraduate)

·         Introduction to Coding Theory (undergraduate)

·         English for Computer Science (undergraduate)

·         Linear Algebra

·         Advanced Programming

·         Foundations of Computers


Graduate students   ^

Ph.D. students:

·         Surur Sheidani : graduated in 2021

·         Saeideh Kabiri Rad: graduated in 2019. 

·         Mahnaz Noroozi: graduated in 2019. 

·         Nasrollah Pakniat: graduated in 2015.

·         Bahman Rajabi: graduated in 2017


Honors/Awards   ^

·         2015: Top Researcher of Cyberspace Research Center at Shahid Beheshti University.

·         2002: Young Mathematicians Prize from The Institute for Research in Fundamental Sciences for the paper "Some New 6-(14,7,4) Designs".

·         2000 : Ranked 2nd in 13th session of Khwarizmi International Awardfor research contributions in fundamental science.


Last update: June 6, 2020