Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mahdi Zamani is active.

Publication


Featured researches published by Mahdi Zamani.


conference on current trends in theory and practice of informatics | 2015

Recent Results in Scalable Multi-Party Computation

Jared Saia; Mahdi Zamani

Secure multi-party computation (MPC) allows multiple parties to compute a known function over inputs held by each party, without any party having to reveal its private input. Unfortunately, traditional MPC algorithms do not scale well to large numbers of parties. In this paper, we describe several recent MPC algorithms that are designed to handle large networks. All of these algorithms rely on recent techniques from the Byzantine agreement literature on forming and using quorums. Informally, a quorum is a small set of parties, most of which are trustworthy. We describe the advantages and disadvantages of these scalable algorithms, and we propose new ideas for improving practicality of current techniques. Finally, we conduct simulations to measure bandwidth cost for several current MPC algorithms.


computational intelligence and security | 2009

A DDoS-Aware IDS Model Based on Danger Theory and Mobile Agents

Mahdi Zamani; Mahnush Movahedi; Mohammad Mehdi Ebadzadeh; Hossein Pedram

Most of the security problems in large and distributed information systems are vastly complex. Few research on detection of burgeoning Distributed Denial of Service (DDoS) attacks, leads us to expand our perspectives to a comprehensive architectural approach in which particular issues like arrangement and communication of system components appear. In this paper, many useful ideas from the behaviour of biological immune systems are elicited based on the results of the latest immunological researches, especially Danger Theory. They are applied to create a model for immunization of distributed intrusion detection systems (IDSs) that are resistant to DDoS. Although a general model for various IDSs is proposed and implemented in this research, a particular simulation scenario for detecting DDoS in a wireless sensor network (WSN) is planned as an example to assess the general ability of the proposed model in detecting undesirable events.


Distributed Computing | 2017

Secure multi-party computation in large networks

Varsha Dani; Valerie King; Mahnush Movahedi; Jared Saia; Mahdi Zamani

We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a significant number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a 1/3 fraction of the parties. In the asynchronous environment, we allow the adversary to corrupt less than a 1/8 fraction of parties. For any deterministic function that can be computed by an arithmetic circuit with m gates, both of our protocols require each party to send a number of messages and perform an amount of computation that is


SIROCCO 2015 Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439 | 2015

Secure Multi-party Shuffling

Mahnush Movahedi; Jared Saia; Mahdi Zamani


foundations of mobile computing | 2014

Secure location sharing

Mahdi Zamani; Mahnush Movahedi

\tilde{O}(m/n + \sqrt{n})


principles of distributed computing | 2013

Brief announcement: scalable anonymous communication with byzantine adversary

Josh R. Karlin; Joud Khoury; Jared Saia; Mahdi Zamani


computer and communications security | 2018

RapidChain: Scaling Blockchain via Full Sharding

Mahdi Zamani; Mahnush Movahedi; Mariana Raykova

O~(m/n+n). We also show that our protocols provide statistical and universally-composable security. To achieve our asynchronous MPC result, we define the threshold counting problem and present a distributed protocol to solve it in the asynchronous setting. This protocol is load balanced, with computation, communication and latency complexity of


international symposium on stabilization safety and security of distributed systems | 2017

TorBricks: Blocking-Resistant Tor Bridge Distribution

Mahdi Zamani; Jared Saia; Jedidiah R. Crandall


international conference on distributed computing systems | 2015

Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling

Mahnush Movahedi; Jared Saia; Mahdi Zamani

O(\log {n})


foundations of computational intelligence | 2013

Towards Provably-Secure Scalable Anonymous Broadcast

Mahdi Zamani; Jared Saia; Mahnush Movahedi; Joud Khoury

Collaboration


Dive into the Mahdi Zamani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jared Saia

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Varsha Dani

University of New Mexico

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bryan Ford

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Italo Dacosta

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

View shared research outputs
Researchain Logo
Decentralizing Knowledge