Profile Image

Navid Abapour


Postgraduate Research Student
AFHEA

About

My research project

University roles and responsibilities

  • Vice Chair of PGR/ECR Conference 2025 - 饾悆饾惃饾悳饾惌饾惃饾惈饾悮饾惀 饾悅饾惃饾惀饾惀饾悶饾悹饾悶
  • Course Lab Assistant - 饾悞饾悳饾悺饾惃饾惃饾惀 饾惃饾悷 饾悅饾惃饾惁饾惄饾惍饾惌饾悶饾惈 饾悞饾悳饾悽饾悶饾惂饾悳饾悶 饾悮饾惂饾悵 饾悇饾惀饾悶饾悳饾惌饾惈饾惃饾惂饾悽饾悳 饾悇饾惂饾悹饾悽饾惂饾悶饾悶饾惈饾悽饾惂饾悹

    My qualifications

    2018 - 2022
    Computer Science BSc (Hons 1:1)
    Project: "饾櫚 饾殎饾殠饾殶饾殥饾殠饾殸 饾殬饾殫 饾櫞饾殨饾殨饾殥饾殭饾殱饾殥饾殞 饾櫜饾殲饾殯饾殶饾殠饾殰 饾櫚饾殭饾殭饾殨饾殥饾殞饾殜饾殱饾殥饾殬饾殫饾殰 饾殥饾殫 饾櫜饾殯饾殺饾殭饾殱饾殬饾殣饾殯饾殜饾殭饾殤饾殺"
    Supervisor: Reza Hooshmandasl
    University of Mohaghegh Ardabili
    2025
    Associate Fellowship of the Higher Education Academy (AFHEA)
    Mentor: Karen Gravett
    糖心Vlog

    Affiliations and memberships

    Research

    Research interests

    Research projects

    Research collaborations

    Indicators of esteem

    • Reviewer

      (ext.) |  |  |  | | |

    • The Allan Way Prize 2025

      Elected as the best lab instructor of the School of Computer Science and Electrical Engineering in 2025 by the students.

      Teaching

      Publications

      Navid Abapour, and Mohsen Ebadpour (2023)

      In recent years, establishing secure visual communications has turned into one of the essential problems for security engineers and researchers. However, only limited novel solutions are provided for image encryption, and limiting visual cryptography to only limited schemes can bring up negative consequences, especially with emerging quantum computational systems. This paper presents a novel algorithm for establishing secure private visual communication. The proposed method has a layered architecture with several cohesive components, and corresponded with an NP-hard problem, despite its symmetric structure. This two-step technique is not limited to gray-scale pictures, and furthermore, it is relatively secure from the theoretical dimension.

      Mona Soleymani, Navid Abapour, Elham Taghizadeh, Safieh Siadat, Rasoul Karkehabadi (2021)

      In the last few years, due to the benefit of solving large-scale computational problems, researchers have developed multi-cloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multi-cloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service provider鈥檚 trust values. This new framework can identify and rectify fake feedback from other feedbacks. Another advantage of this framework is applying fuzzy rules to calculate trust values. Two main components of the proposed framework are simulated in this paper. The simulation results confirm the important role of applied components. Also, this paper proposed a framework compared with other frameworks (feedback-based model, SLA-based model, and multi-cloud model). Simulation results show the proposed framework increased trust values more than other models. Also, compared with other models, our framework gives better mean trust values.

      Mahdi Mahdavi, Navid Abapour, Zahra Ahmadian (2024)

      With the increasing integration of crowd computing, new vulnerabilities emerge in widely used cryptographic systems like the RSA cryptosystem, whose security is based on the factoring problem. It is strongly advised to avoid using the same modulus to produce two pairs of public-private keys, as the cryptosystem would be rendered vulnerable to common modulus attacks. Such attacks can take two forms: one that aims to factorize the common modulus based on one key pair and the other that aims to decrypt certain ciphertexts generated by two public keys if the keys are co-prime. This paper introduces a new type of common modulus attack on the RSA cryptosystem. In our proposed attack, given one public-private key pair, an attacker can obtain the private key corresponding to a given public key in RSA decryption. This allows the adversary to decrypt any ciphertext generated using this public key. It is worth noting that the proposed attack can be used in the CRT model of RSA. In addition, we propose a parallelizable factoring algorithm with an order equivalent to a cyclic attack in the worst-case scenario.

      Navid Abapour, Amir Goharshady, Catalin Dragan, and Mahdi Mahdavi (2025)

      Electronic voting has demonstrated that it streamlines the democratic process, making it more convenient for citizens and enhancing the accuracy and speed of election results in real-world scenarios in the US, Estonia, Switzerland, and many other countries. One major challenge for e-voting, especially online voting, is ensuring that voting and tallying devices behave honestly, particularly in cases involving monetary transactions. These are addressed by economic voting, where everything is on-chain; in essence, voters utilize smart contracts to conduct all voting stages. There are very few results on economic voting, and none are post-quantum secure. The challenge comes from having the entire voting system run by smart contracts. In this work, we propose the first post-quantum economic voting scheme, which combines hybrid on- and off-chain operations, called the Post-Quantum Blind Vote (PQBV). The core idea is to utilize smart contracts that enable blind signatures during the voting process. We enhance our contribution by introducing a post-quantum blind signature with Posterior Security, as proposed by Yuen et al. (CCS 2025), which retroactively enhances the privacy of already generated signatures. This has a significant impact on PQBV, as it is able to satisfy formal cryptographic privacy definitions, including ballot privacy. Our efficiency analysis reveals competitive performance compared to existing state-of-the-art post-quantum e-voting systems, such as Epoque (EuroS&P 2021), which is done without blockchain.