Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammed Ashraful Alam Tuhin is active.

Publication


Featured researches published by Mohammed Ashraful Alam Tuhin.


international symposium on information theory | 2009

Optimal secure message transmission by public discussion

Hongsong Shi; Shaoquan Jiang; Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin

In a secure message transmission (SMT) scenario, a sender wants to send a message in a private and reliable way to a receiver. Sender and receiver are connected by n wires, t of which can be controlled by an adaptive adversary with unlimited computational resources. In Eurocrypt 2008, Garay and Ostrovsky considered an SMT scenario where sender and receiver have access to a public discussion channel and showed that secure and reliable communication is possible when n ≥ t + 1. In this paper, we will show that a secure protocol requires at least three rounds of communication and two rounds invocation of the public channel and hence give a complete answer to the open question raised by Garay and Ostrovsky. We also describe a round optimal protocol that has constant transmission rate over the public channel.


applied cryptography and network security | 2012

A general construction for 1-round δ-RMT and (0, δ)-SMT

Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin; Pengwei Wang

In Secure Message Transmission (SMT) problem, a sender


financial cryptography | 2011

Optimal one round almost perfectly secure message transmission (short paper)

Mohammed Ashraful Alam Tuhin; Reihaneh Safavi-Naini

\cal S


computer and communications security | 2011

Optimal message transmission protocols with flexible parameters

Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin; Hongsong Shi

is connected to a receiver


international conference on cryptology in africa | 2012

Bounds and constructions for 1-round (0, δ)-secure message transmission against generalized adversary

Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin

\cal R


Archive | 2012

Efficient 1-Round Almost-Perfect Secure Message Transmission Protocols with Flexible Connectivity

Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin

through N node disjoint bidirectional paths in the network, t of which are controlled by an adversary with unlimited computational power.


cyberworlds | 2009

(ε, 0)-Secure Message Transmission

Mohammed Ashraful Alam Tuhin; Hongsong Shi; Rei Safavi-Naini

\cal{S}


IEEE Transactions on Information Theory | 2011

On Optimal Secure Message Transmission by Public Discussion

Hongsong Shi; Shaoquan Jiang; Reihaneh Safavi-Naini; Mohammed Ashraful Alam Tuhin

wants to send a message m to


arXiv: Cryptography and Security | 2014

Sanitization of Call Detail Records via Differentially-private Summaries

Mohammad Alaggan; Sébastien Gambs; Stan Matwin; Eriko Souza; Mohammed Ashraful Alam Tuhin

\cal{R}


New results on secure message transmission | 2012

New results on secure message transmission

Reihaneh Alsadat Safavi-Naeini; Mohammed Ashraful Alam Tuhin

in a reliable and private way. It is proved that SMT is possible if and only if N≥2t+1. In Reliable Message Transmission (RMT) problem, the network setting is the same and the goal is to provide reliability for communication, only. In this paper we focus on 1-round δ-RMT and (0,δ)-SMT where the chance of protocol failure (receiver cannot decode the sent message) is at most δ, and in the case of SMT, privacy is perfect. We propose a new approach to the construction of 1-round δ-RMT and (0, δ)-SMT for all connectivities N≥2t+1, using list decodable codes and message authentication codes. Our concrete constructions use folded Reed-Solomon codes and multireceiver message authentication codes. The protocols have optimal transmission rates and provide the highest reliability among all known comparable protocols. Important advantages of these constructions are, (i) they can be adapted to all connectivities, and (ii) have simple and direct security (privacy and reliability) proofs using properties of the underlying codes, and δ can be calculated from parameters of the underlying codes. We discuss our results in relation to previous work in this area and propose directions for future research.

Collaboration


Dive into the Mohammed Ashraful Alam Tuhin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shaoquan Jiang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge