scispace - formally typeset
M

Mehrdad Nojoumian

Researcher at Florida Atlantic University

Publications -  54
Citations -  696

Mehrdad Nojoumian is an academic researcher from Florida Atlantic University. The author has contributed to research in topics: Secret sharing & Secure multi-party computation. The author has an hindex of 13, co-authored 51 publications receiving 550 citations. Previous affiliations of Mehrdad Nojoumian include Southern Illinois University Carbondale & University of Ottawa.

Papers
More filters
Journal ArticleDOI

Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems

TL;DR: Simulation results indicate that the secure MPC-based protocol can be a viable privacy-preserving data aggregation mechanism since it not only reduces the overhead with respect to FHE but also almost matches the performance of the Paillier cryptosystem when it is used within a proper sized AMI network.
Journal ArticleDOI

Unconditionally secure social secret sharing scheme

TL;DR: The authors introduce the notion of a ‘social secret sharing scheme’, in which shares are allocated based on a player's reputation and the way he/she interacts with other participants, and allows trusted participants to gain more authority.
Book ChapterDOI

Socio-Rational Secret Sharing as a New Direction in Rational Cryptography

TL;DR: The authors show that, in a setting with rational players, secret sharing and multiparty computation are only possible if the actual secret reconstruction round remains unknown to the players.
Book ChapterDOI

A New Approach for the Trust Calculation in Social Networks

TL;DR: The main goals are to support good agents strongly, block bad ones and create opportunities for newcomers or agents who want to show their merit in their society although the authors can not judge them.
Journal ArticleDOI

Reliable Hardware Architectures for Cryptographic Block Ciphers LED and HIGHT

TL;DR: This paper proposes efficient error detection architectures including variants of recomputing with encoded operands and signature-based schemes to detect both transient and permanent faults and shows that the proposed schemes are applicable to the case study of simple lightweight CFB for providing authenticated encryption with associated data.