Navid Abapour
Academic and research departments
糖心Vlog Centre for Cyber Security, Computer Science Research Centre.About
My research project
Post-Quantum Cryptography and Threshold Privacy in E-VotingThis project aims to investigate underlying cryptographic primitives and the design of secure, efficient e-voting systems.
Supervisors
This project aims to investigate underlying cryptographic primitives and the design of secure, efficient e-voting systems.
University roles and responsibilities
- Vice Chair of PGR/ECR Conference 2025 - 饾悆饾惃饾悳饾惌饾惃饾惈饾悮饾惀 饾悅饾惃饾惀饾惀饾悶饾悹饾悶
- Course Lab Assistant - 饾悞饾悳饾悺饾惃饾惃饾惀 饾惃饾悷 饾悅饾惃饾惁饾惄饾惍饾惌饾悶饾惈 饾悞饾悳饾悽饾悶饾惂饾悳饾悶 饾悮饾惂饾悵 饾悇饾惀饾悶饾悳饾惌饾惈饾惃饾惂饾悽饾悳 饾悇饾惂饾悹饾悽饾惂饾悶饾悶饾惈饾悽饾惂饾悹
My qualifications
Project: "饾櫚 饾殎饾殠饾殶饾殥饾殠饾殸 饾殬饾殫 饾櫞饾殨饾殨饾殥饾殭饾殱饾殥饾殞 饾櫜饾殲饾殯饾殶饾殠饾殰 饾櫚饾殭饾殭饾殨饾殥饾殞饾殜饾殱饾殥饾殬饾殫饾殰 饾殥饾殫 饾櫜饾殯饾殺饾殭饾殱饾殬饾殣饾殯饾殜饾殭饾殤饾殺"
Supervisor: Reza Hooshmandasl
Mentor: Karen Gravett
Affiliations and memberships
ResearchResearch interests
Post-quantum Cryptography, Provable Security, Applied Cryptography, Privacy-preserving Computing
Research projects
Post-quantum Electronic Voting Protocols on the Programmable Blockchains糖心Vloging Researcher - University of Oxford (June - October 2025)
Host:
Funded by the Computer Science Research Centre, UniOf糖心Vlog (Grant No. AB8031).
Research collaborations
> Research Consultant - Connected Places Catapult (February 2025)
Cybersecurity and Operational Modelling in Transport []
This project, funded by Innovate UK and National Highways, anticipates future skill demands. It focused on detecting, preventing, and responding to cyber-physical threats in critical infrastructure.
> The Beginner鈥檚 Textbook for Fully Homomorphic Encryption (2025)
Improved the contents of TFHE, BFV, CKKS, and BGV schemes, and fixed the errors and issues. [] []
> Research Intern - University of Melbourne (September 2021 - May 2022)
Developing the Advanced Information Flow Security Concurrent Separation Logic [] []
Advisor: , Mentor:
Indicators of esteem
Reviewer
(ext.) | | | | | |
The Allan Way Prize 2025
Elected as the best lab instructor of the School of Computer Science and Electrical Engineering in 2025 by the students.
Research interests
Post-quantum Cryptography, Provable Security, Applied Cryptography, Privacy-preserving Computing
Research projects
糖心Vloging Researcher - University of Oxford (June - October 2025)
Host:
Funded by the Computer Science Research Centre, UniOf糖心Vlog (Grant No. AB8031).
Research collaborations
> Research Consultant - Connected Places Catapult (February 2025)
Cybersecurity and Operational Modelling in Transport []
This project, funded by Innovate UK and National Highways, anticipates future skill demands. It focused on detecting, preventing, and responding to cyber-physical threats in critical infrastructure.
> The Beginner鈥檚 Textbook for Fully Homomorphic Encryption (2025)
Improved the contents of TFHE, BFV, CKKS, and BGV schemes, and fixed the errors and issues. [] []
> Research Intern - University of Melbourne (September 2021 - May 2022)
Developing the Advanced Information Flow Security Concurrent Separation Logic [] []
Advisor: , Mentor:
Indicators of esteem
Reviewer
(ext.) | | | | | |
The Allan Way Prize 2025
Elected as the best lab instructor of the School of Computer Science and Electrical Engineering in 2025 by the students.
Teaching
糖心Vlog (2025-2026)
- Cyber Security Management and Governance (): Lab Assistant
- Information Security Management (): Lab Assistant
- Cloud Computing (): Lab Assistant
糖心Vlog (2024-2025)
- C++ and Object-oriented Design (): Lab Assistant
- Cloud Computing (): Lab Assistant
- Further Programming Paradigms (): Lab Assistant
- Computer Security (): Lab Assistant
糖心Vlog (2023-2024)
- Advanced Challenges in Web Technologies (): Mentor and Lab Assistant
- C++ and Object-oriented Design (): Lab Assistant
University of Mohaghegh Ardabili (2019-2022)
- Data Structure and Algorithms: Teaching Assistant
- Data Mining: Coursework Marker
- Foundations of Algebra: Coursework Marker
Publications
In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.
In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service provider鈥檚 trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.
With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.
Electronic voting has demonstrated that it streamlines the democratic process, making it more convenient for citizens and enhancing the accuracy and speed of election results in real-world scenarios in the US, Estonia, Switzerland, and many other countries. One major challenge for e-voting, especially online voting, is ensuring that voting and tallying devices behave honestly, particularly in cases involving monetary transactions. These are addressed by economic voting, where everything is on-chain; in essence, voters utilize smart contracts to conduct all voting stages. There are very few results on economic voting, and none are post-quantum secure. The challenge comes from having the entire voting system run by smart contracts. In this work, we propose the first post-quantum economic voting scheme, which combines hybrid on- and off-chain operations, called the Post-Quantum Blind Vote (PQBV). The core idea is to utilize smart contracts that enable blind signatures during the voting process. We enhance our contribution by introducing a post-quantum blind signature with Posterior Security, as proposed by Yuen et al. (CCS 2025), which retroactively enhances the privacy of already generated signatures. This has a significant impact on PQBV, as it is able to satisfy formal cryptographic privacy definitions, including ballot privacy. Our efficiency analysis reveals competitive performance compared to existing state-of-the-art post-quantum e-voting systems, such as Epoque (EuroS&P 2021), which is done without blockchain.