Ziba Eslami

Ziba Eslami

Associate Professor, Shahid Beheshti University

Email: z_eslami@sbu.ac.ir
Phone: +98 21 2990 3007
Mail: Ziba Eslami
Department of Computer Science, Faculty of Mathematics
Shahid Beheshti University, Evin, Tehran, Iran


I received my Ph.D. in Applied Mathematics from Tehran University in 2000. During the academic years 2000-2003, I was a postdoctoral fellow in the Institute for Research in Fundamental Sciences (IPM). I served as a non-resident researcher at IPM during 2003-2005. Currently, I am an associate professor in the Department of Computer Science at Shahid Beheshti University (SBU) in Iran. I am also the head of the Network Security and Cryptography group at Cyberspace Research Center at SBU. My research interests include design theory, combinatorial algorithms, coding theory and cryptography.


Jump to:

Books
Journal Papers
Conference Papers
Teaching
Graduate Students
Honors/Awards

Books   ^

  1. Eslami Z.
    Introduction to Coding Theory (in Persian)
    Shahid Beheshti University Publishing Center, 2008.


Journal papers   ^

  1. Noroozi M. and Eslami Z.
    Public key authenticated encryption with keyword search: revisited.
    IET Information Security, to appear.

  2. Noroozi M. and Eslami Z.
    Public-key encryption with keyword search: a generic construction secure against online and offine keyword guessing attacks.
    Journal of Ambient Intelligence and Humanized Computing, to appear.

  3. Noroozi M., Karoubi I. and Eslami Z.
    Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved.
    Annals of Telecommunications, vol. 73, no. 11-12, pp. 769-776, 2018.

  4. Noroozi M., Eslami Z. and Pakniat N.
    Comments on a chaos-based public key encryption with keyword search scheme.
    Nonlinear Dynamics, vol. 94, no. 2, pp. 1127-1132, 2018.

  5. Kabirirad S. and Eslami Z.
    A (t, n)-multi secret image sharing scheme based on Boolean operations.
    Journal of Visual Communication and Image Representation , vol. 57, pp. 39-47, 2018.

  6. Rajabi B. and Eslami Z.
    A verifiable threshold secret sharing scheme based on lattices.
    Information Sciences, to appear.

  7. Pakniat N. and Eslami Z.
    Verifiable Social Multi-Secret Sharing Secure in Active Adversarial Model.
    Journal of Computing and Security, vol. 4, no. 1, pp. 3-12, 2017.

  8. Eslami Z. and Mohajer R.
    Cryptanalysis of a multiparty quantum key agreement protocol based on commutative encryption.
    Quantum Information Processing , vol. 16, no. 8, pp. 197:1-9, 2017.

  9. Rajabi B. and Eslami Z.
    A CCA2-Secure Incomparable Public Key Encryption Scheme.
    Journal of Computing and Security , vol. 3, no. 1, pp. 197:1-9, 2017.

  10. Pakniat N., Noroozi M. and Eslami Z.
    Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata.
    THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING , vol. 14, no. 1, pp. 38-43, 2016.

  11. Eslami Z., Pakniat N. and Nojoumian M.
    Ideal social secret sharing using Birkhoff interpolation method.
    Security and Communication Networks , vol. 9, no. 18, pp. 4973-4982, 2016.

  12. Eslami Z., Noroozi M. and Kabiri Rad S.
    Provably Secure Group Key Exchange Protocol in the Presence of Dishonest Insiders.
    International journal of network security , vol. 18, no. 1, pp.33-42 2016.

  13. Eslami Z.
    Algorithmic Aspects of Trades.
    ARS COMBINATORIA , vol. 120, no. 3, pp. 245-253, 2015.

  14. Pakniat N., Noroozi M. and Eslami Z.
    A Distributed Key Generation Protocol with Hierarchical Threshold Access Structure.
    IET Information Security , vol. 9, no. 4, pp. 248-255, 2015.

  15. Eslami Z., Kazemnasab Haji M. and Mirehi N.
    Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content.
    Multimedia Tools and Applications , vol. 72, no. 3, pp. 2723-2740, 2014.

  16. Eslami Z. and Pakniat N.
    Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model.
    Journal of King Saud University-Computer and Information Sciences , vol. 9, no. 4, pp. 248-255, 2015.

  17. Pakniat N., Eslami Z., Miri A.
    A note on "Selling multiple secrets to a single buyer".
    Information Sciences , vol. 279, pp. 889-892, 2014.

  18. Pakniat N., Noroozi M. and Eslami Z.
    Secret image sharing scheme with hierarchical threshold access structure.
    Journal of Visual Communication and Image Representation , vol. 25, no. 5, pp. 1093-1101, 2014.

  19. Eslami Z., Pakniat N. and Noroozi M.
    Cryptanalysis of an Attribute-based Key Agreement Protocol.
    International Journal of Computer and Information Technologies , vol. 2, no. 1, pp. 351-358, 2014.

  20. Bakhshandeh A. and Eslami Z.
    An authenticated image encryption scheme based on chaotic maps and memory cellular automata.
    Optics and Lasers in Engineering , vol. 51, no. 6, pp. 665-673, 2013.

  21. Eslami Z. and Bakhshandeh A.
    An improvement over an image encryption method based on total shuffling.
    Optics Communications , vol. 286, pp. 51-55, 2013.

  22. Babamir F. and Eslami Z.
    Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption.
    KSII Transactions on Internet and Information Systems , vol. 6, no. 11, pp. 2940-2955, 2012.

  23. Eslami Z. and Kabiri Rad S.
    A new verifiable multi-secret sharing scheme based on bilinear maps.
    Wireless Personal Communications , vol. 63, no. 2, pp. 459-467, 2012.

  24. Pakniat N. and Eslami Z.
    A Proxy E-Raffle Protocol Based on Proxy Signatures.
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications , vol. 2, no. 3, pp. 74-84, 2011.

  25. Eslami Z. and Zarepour Ahmadabadi J.
    Secret image sharing with authentication-chaining and dynamic embedding.
    Journal of Systems and Software , vol. 84, no. 5, pp. 803-809, 2011.

  26. Eslami Z. and Talebi M.
    A new untraceable off-line electronic cash system.
    Electronic Commerce Research and Applications , vol. 10, no. 1, pp. 59-66, 2011.

  27. Eslami Z. and Zarepour Ahmadabadi J.
    A verifiable multi-secret sharing scheme based on cellular automata.
    Information Sciences , vol. 180, no. 15, pp. 2889-2894, 2010.

  28. Eslami Z. and Kabiri Rad S.
    Another Security Weakness in an Authenticated Group Key Agreement.
    Journal of Internet Technology , vol. 11, no. 4, pp. 573-576, 2010.

  29. Eslami Z., Razzaghi H. and Zarepour Ahmadabadi J.
    Secret image sharing based on cellular automata and steganography.
    Pattern Recognition , vol. 43, no. 1, pp. 397-404, 2010.

  30. Eslami Z.
    On the possible automorphisms of a 3-(16, 7, 5) design.
    ARS COMBINATORIA , vol. 95, no. 2, pp. 217-224, 2010.

  31. Eslami Z.
    Classification Of Large Sets By Trades.
    ARS COMBINATORIA , vol. 82, no. 1, pp. 237-242, 2007.

  32. Eslami Z.
    Classification of designs with nontrivial automorphism groups.
    Journal of Combinatorial Designs , vol. 14, no. 6, pp. 479-489, 2006.

  33. Eslami Z., Khosrovshahi G.B. and Mohammad-Noori M.
    Enumeration of t-Designs Through Intersection Matrices.
    Designs, Codes and Cryptography , vol. 32, no. 1, pp. 185-191, 2004.

  34. Eslami Z., Khosrovshahi G.B., Mohammad-Noori M. and Tayfeh-Rezaie R.
    Some new 4-designs.
    ARS COMBINATORIA , vol. 73, no. 4, pp. 225-230, 2004.

  35. Eslami Z.
    LS[7](3,5,11) Exists.
    Journal of Combinatorial Designs , vol. 11, no. 5, pp. 312-316, 2003.

  36. Eslami Z.
    On the indecomposable partition problem: IPP(10,?).
    Discrete Mathematics , vol. 248, no. 1-3, pp. 255-264, 2002.

  37. Eslami Z. and Khosrovshahi G.B.
    Some New 6-(14, 7, 4) Designs.
    Journal of Combinatorial Theory, Series A , vol. 93, no. 1, pp. 141-152, 2001.

  38. Eslami Z., Khosrovshahi G.B. and Tayfeh-Rezaie R.
    On classification of 2-(8, 3) and 2-(9, 3) trades.
    Journal of Combinatorial Mathematics and Combinatorial Computing, vol. 38, pp. 231-242, 2001.

  39. Eslami Z., Khosrovshahi G.B. and Tayfeh-Rezaie R.
    On halvings of the 2-(10, 3, 8) design.
    Journal of Statistical Planning and Inference , vol. 86, no. 2, pp. 411-419, 2000.

  40. Eslami Z. and Khosrovshahi G.B.
    Classification of some large sets and designs.
    Journal of Geometry , vol. 67, no. 1, pp. 105-110, 2000.

  41. Eslami Z. and Khosrovshahi G.B.
    A complete classification of 3-(11, 4, 4) designs with nontrivial automorphism group.
    Journal of Combinatorial Designs , vol. 8, no. 6, pp. 419-425, 2000.

Conference papers   ^


  1. Mohajer R. and Eslami Z.
    Quantum Secret Sharing using single states.
    8th International Symposium on Telecommunications (IST) , pp. 174-177, Tehran, Iran, 2016.

  2. Amiri K., Noroozi M. and Eslami Z.
    Multi-user searchable encryption scheme with general access structure.
    2nd International Conference on Knowledge-Based Engineering and Innovation , pp. 399-404, Tehran, Iran, 2015.

  3. Eslami Z., Pakniat N. and Noroozi M.
    Hierarchical threshold multi-secret sharing scheme based on Birkhoff interpolation and cellular automata.
    18th CSI International Symposium on Computer Architecture & Digital Systems , pp. 1-6, Tehran, Iran, 2015.

  4. Eslami Z., Pakniat N. and Noroozi M.
    Cryptanalysis of an Attribute-based Key Agreement Protocol.
    International Conference on Computer, Information Technology and Digital Media , Tehran, Iran, 2013.

  5. Eslami Z. and Pakniat N.
    A certificateless proxy signature scheme secure in standard model.
    International Conference on Latest Computational Technologies (ICLCT), pp. 81-84, Bangkok, Thailand, 2012.

  6. Babamir F.S. and Eslami Z.
    An aggregate signcryption based on elliptic curves in unattended environments.
    International conference on Applied Analysis and Algebra (ICA), Stanbul, Turkey, 2012.

  7. Babamir F.S. and Eslami Z.
    Improving a coding method in unattended wireless sensor networks.
    5th Conference on Algebraic Combinatorics and Graph Theory (ICA), Kashan, Iran, 2012.

  8. Kazemnasab Haji M. and Eslami Z.
    An efficient buyer-seller watermarking protocol based on proxy signatures.
    8th International ISC Conference on Information Security and Cryptology , pp. 73-78, Mashahd, Iran, 2011.

  9. Eslami Z. and Pakniat N.
    Secret selling of secrets with elliptic curves.
    3rd International Conference on Machine Learning and Computing (ICMLC), Singapore, 2011.

  10. Eslami Z. and Ghavamipoor H.
    An improvement over Liaw's electronic voting scheme.
    IADIS International Conference on e-Societ , Porto, Portugal, 2010.

  11. Eslami Z. and Pakniat N.
    A simple protocol for selling multiple secrets to a single buyer without a trusted party.
    6th international ISC conference on information security and cryptology (ISCISC), pp. 3-6, Isfahan, Iran, 2009.

  12. Eslami Z. and Zarepour Ahmadabadi J.
    Secret image sharing with high quality stego images.
    6th international ISC conference on information security and cryptology (ISCISC), Isfahan, Iran, 2009.

  13. Eslami Z.
    Application of trades in construction/enumeration of combinatorial objects.
    International congress of Mathematicians (ICM), Beijing, China, 2002.

  1. نوروزی مهناز، نصراله پاک نیت و اسلامی زیبا
    رمزگذاری کلید عمومی با قابلیت جستجوی کلیدواژه: ارائه یک ساخت کلی امن در برابر حملات حدس کلیدواژه برخط و غیر برخط.
    چهاردهمین کنفرانس بین المللی انجمن رمز ایران , صفحه: 1-6، شیراز, ایران,1396.

  2. اسلامی زیبا و نوروزی مهناز
    پروتکل توافق کلید گروهی مقاوم در برابر تقلب با ویژگی تصحیح خطای ناشی از اختلال کانال.
    هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه, ایران,1394.

  3. اسلامی زیبا و هجرودی غلامرضا
    پروتکل واترمارکینگ فروشنده-خریدار غیرخطی بدون شخص سوم معتمد.
    هفتمین کنفرانس بین المللی فناوری اطلاعات و دانش , صفحه: 1-6، ارومیه, ایران,1394.

  4. اسلامی زیبا و کبیری راد سعیده
    پیک روش رمزنگاری تصویر بلوک-مبنا با استفاده از اتوماتای سلولی و نگاشت آشوب.
    بیستمین کنفرانس ملی سالانه انجمن کامپیوتر ایران، مشهد, ایران,1394.

  5. اسلامی زیبا و بابامیر فائزه سادات
    پایداری داده ها در شبکه های حسگر بی سیم بی ملازم.
    نهمین كنفرانس بین المللی انجمن رمز ايران, تبریز، ايران,1391.

  6. اسلامی زیبا و قوامی پور هدی
    يك طرح انتخابات الكترونيك امن و كار آمد مبتني بر امضاي كور.
    پانزدهمين كنفرانس انجمن كامپيوتر ايران, تهران، ايران,1388.


Teaching   ^

Graduate students   ^
Ph.D. students:
Honors/Awards   ^
  • 2015: Top Researcher of Cyberspace Research Center at Shahid Beheshti University.
  • 2002: Young Mathematicians Prize from The Institute for Research in Fundamental Sciences for the paper "Some New 6-(14,7,4) Designs".
  • 2000 : Ranked 2nd in 13th session of Khwarizmi International Awardfor research contributions in fundamental science.

Last update: March 03, 2019