scispace - formally typeset
Z

Zulfikar Ramzan

Researcher at Symantec

Publications -  100
Citations -  3211

Zulfikar Ramzan is an academic researcher from Symantec. The author has contributed to research in topics: Cryptography & Encryption. The author has an hindex of 31, co-authored 100 publications receiving 3094 citations. Previous affiliations of Zulfikar Ramzan include Cisco Systems, Inc. & Alcatel-Lucent.

Papers
More filters
Book ChapterDOI

Single-database private information retrieval with constant communication rate

TL;DR: A single-database private information retrieval (PIR) scheme with communication complexity ${\mathcal O}(k+d)$, where k ≥ log n is a security parameter that depends on the database size n and d is the bit-length of the retrieved database block.
Book ChapterDOI

Identity-Based aggregate signatures

TL;DR: In this paper, identity-based aggregate signature schemes are developed that are secure in the random oracle model under the computational Diffie-Hellman assumption over pairing-friendly groups against an adversary that chooses its messages and its target identities adaptively.
Book ChapterDOI

Group Blind Digital Signatures: A Scalable Solution to Electronic Cash

TL;DR: This paper constructs a practical group blind signature scheme that is an extension of Camenisch and Stadler's Group Signature Scheme that adds the blindness property and shows how to use it to construct an electronic cash system in which multiple banks can securely distribute anonymous and untraceable e-cash.
Patent

Filter-based identification of malicious websites

TL;DR: In this article, a plurality of lightweight features associated with the candidate suspicious website is identified, and a filter score is determined based on the plurality of features, wherein the filter score indicates a likelihood that the candidatesuspicious website is a malicious website.
Book ChapterDOI

A method for making password-based key exchange resilient to server compromise

TL;DR: Security in the universal composability framework is proved by defining a new functionality for PAKE with resilience to server compromise, specifying a protocol combining this technique with a (basic) PAKE functionality, and proving that this protocol securely realizes the new functionality.