payman's picture

Payman Mohassel

Research Scientist at Yahoo Labs, Sunnyvale
Associate Professor at University of Calgary
Contact : pmohassel at yahoo-inc dot com
              pmohasse at ucalgary dot ca
[About Me] [Publications /Google Scholar] [Activities] [Teaching] [Students/Visitors]

About Me
I am a Research Scientist at Yahoo! Labs, Sunnyvale, and an Associate Professor at University of Calgary. I received my Ph.D. from UC Davis, in 2009 under the supervision of Matthew Franklin, and subsequently joined the Department of Computer Science at University of Calgary. I have been a visiting researcher or an intern at a number of places such as Microsoft Research, Redmond (July 2014, August 2011, October 2010), Sun Microsystems (Summer 2008), Google Inc. (Summer 2007), and UCLA's IPAM (Fall 2006). My research interests are in information security, cryptography, and privacy enhancing technologies.

WAMPC, 2014
ACNS, 2013
Program Committees: (submit good papers!)
CRYPTO 2016, ACNS 2016
CRYPTO, 2014
ICICS, 2013
ACM WPES, 2010

Recent and Upcoming Talks:
Aarhus MPC Workshop. Private Function Evaluation: A General Framework and Efficient Instantiations. (Talk PPT). Aarhus, Denmark, May 2014
CRYPTO 2013. Garbled Circuits Checking Garbled Circuits. (Talk PPT). Santa Barbara, August 2013
Cryptography Group, Aarhus University. Private Function Evaluation. (Talk PPT). Aarhus, Denmark, June 2013
Cryptography Group, Bristol University. Private Function Evaluation. (Talk PPT). Bristol, UK, May, 2013
FC 2012. (Talk PPT). Bonaire, February, 2012
CANS 2011. (Talk PPT). Sanya, China, December 10-12, 2011
Cryptography Group, Microsoft Research. Oblivious Automata Evaluation and Its Applications. (Talk Video). Redmond, August 30, 2011
Asiacrypt, 2010. (Talk PPT). Singapore, Dec 5-9, 2010
Selected Areas of Cryptography. (Talk PDF). Waterloo, Canada, August 11-13, 2010
Applied Cryptography and Network Security Conference (Talk PPT). Beijing, China, June 22-25, 2010
Workshop on Computer Security and Cryptography (Talk PDF). Montreal, Canada, April 12-16, 2010
UofC Theory Seminar (Talk PDF). Calgary, Canada, Jan 22, 2010

Foundations of Modern Cryptography (CPSC 601.48) : Winter 2010, Winter 2011, Fall 2011, Winter 2013
Networked Systems Security (CPSC 626/526) :Winter 2010, Winter 2011, Winter 2012, Winer 2013
Explorations in Information Security (CPSC 329) : Winter 2011, Winter 2012
Introduction to Computer Science for Majors II (CPSC 233): Fall 2012, Fall 2013

Arash Afshar, PhD. (July. 2013 - present)
Ostap Orobets, MSc. (Jan. 2013 - Jan 2015). Now at Nureva Inc.
Negin Karimian, MSc. (Sept 2012 - Jan 2015). Now at OSo Consulting Inc.
Saeed Sadeghian, Ph.D. (Sept 2011 - Nov 2015)
Akshaya Mani, BSc. (May. 2013 - August 2013)
Greg Lewis , Undergrad (Jan. 2011 - Dec. 2011)
Research: Fingerprinting attacks against anonymizing networks.
Masoud Barati , MSc. (Sept. 2009 - Nov. 2011)
Thesis: Learning Decision Trees Through Black-Box Queries.

Seny Kamara (March 2012, 1 wk)
Salman Niksefat , visiting PhD (April 2011 - Dec. 2011)
Research: Privacy-preserving computation for pattern matching, IDS and more.
Adam O'Neill ( July 2010, 1wk)

Publication List
The following is a chronological list of most of my publications. Presentation slides are made available in cases when I gave the talks. Also see my Google Scholar Profile.

with Alptekin Kupcu
Fast Optimistically Fair Cut-and-Choose 2PC.
to Appear in FC 2016.
with Ostap Orobetes and Ben Riva
Efficient Server-Aided 2PC for Mobile Phones.
to Appear in PETS 2016.
with Mike Rosulek and Ye Zhang
Fast and Secure Three-party Computation: The Garbled Circuit Approach.
to Appear in ACM CCS 2015.
with Zhangxiang Hu and Mike Rosulek
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost.
to Appear in CRYPTO 2015. [ePrint]
with Arash Afshar and Zhangxiang Hu and Mike Rosulek
How to Efficiently Evaluate RAM Programs with Malicious Security.
In Proceedings of EUROCRYPT 2015. [ePrint]
with Vladimir Kolesnikov and Ben Riva and Mike Rosulek
Richer Efficiency/Security Trade-offs in 2PC.
In Proceedings of TCC 2015. [ePrint]
with Saeed Sadeghian and Nigel Smart
Actively Secure Private Function Evaluation.
In Proceedings of ASIACRYPT 2014. [ePrint]
with Vladimir Kolesnikov and Mike Rosulek
FleXOR: Flexible garbling for XOR gates that beats free-XOR.
In Proceedings of CRYPTO 2014. [ePrint]
with Arash Afshar, Benny Pinkas, and Ben Riva
Non-Interactive Secure Computation Based on Cut-and-Choose.
In Proceedings of EUROCRYPT 2014.[ePrint]
with Seny Kamara, Mariana Raykova, and Saeed Sadeghian
Scaling Private Set Intersection to Billion-Element Sets.
In Proceedings of FC 2014. [tech report]

with Dana Dachman-Soled and George Fuchsbauer and Adam O'Neill
Enhance Chosen-Ciphertext Security and Applications.
In Proceedings of PKC 2014. [eprint archive]

with Ebrahim Tarameshloo and Philip W. L. Fong
On Protection in Federated Social Computing Systems.
In Proceedings of ACM CODASPY 2014.
with Ben Riva.
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation.
In proceedings of CRYPTO 2013. [
eprint archive]
with Isheeta Nargis and Wayne Eberly.
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority.
To Appear in AFRICACRYPT 2013.
with Saeed Sadeghian
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation.[
Full Version][Long Talk]
In Proceedings of Advances in Cryptology, EUROCRYPT 2013.
with Salman Niksefat, Babak Sadeghiyan, and Saeed Sadeghian
ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
The Computer Journal, 2013, doi: 10.1093/comjnl/bxt019. [PDF]
with Ozgur Dagdelen and Daniele Venturi
Rate-limited Secure Function Evaluation: Definitions and Constructions.
In Proceedings of Public-Key Cryptography Conference, PKC 2013. [
Full Version]
with Salman Niksefat and Babak Sadeghiyan
Oblivious Decision Program Evaluation.
In IET Information Security Journal, 2013, doi: 10.1049/iet-ifs.2012.0032. [PDF]
with Seny Kamara and Ben Riva
Salus: A System for Server-Aided Secure Function Evaluation. [Full Version]
ACM Computer and Communications Security Conference, ACM CCS 2012.
Efficient and Secure Delegation of Linear Algebra. [eprint archive]

with Salman Niksefat
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions. [Proceedings PDF][Talk PPT]
Financial Cryptography and Data Security, FC 2012.
with Salman Niksefat, Saeed Sadeghian, and Babak Sadeghiyan
An Efficient Protocol for Oblivious DFA Evaluation and Applications. [Eprint PDF][Talk video]
RSA Conference, The Cryptographer's Track, CT-RSA 2012.
with Seny Kamara, and Mariana Raykova
Outsourcing Multiparty Computation. eprint archive

Fast Computation On Encrypted Polynomials and Applications. [Proceedings PDF][Talk PPT]
International Conference on Cryptography and Network Security, CANS 2011 .
A Closer Look at Anonymity and Robustness in Encryption Schemes. [PDF][Talk PPT]
Advances in Cryptology, ASIACRYPT 2010 .

One-time Signatures and Chameleon Hash Functions. [PDF][Talk PDF]
Selected Areas in Cryptography, SAC 2010 .

with Matthew Franklin
Secure and Efficient Evaluation of Multivariate Polynomials and Applications. [Proceedings PDF][Talk PPT]
Applied Cryptography and Network Security Conference, ACNS 2010 .
with Eike Kiltz and Adam O'Neill.
Adaptive Trapdoor Functions and Chosen Ciphertext Security. [Prceedings PDF]
Advances in Cryptology, EUROCRYPT 2010 .
with Mark Gondree.
Longest Common Subsequence as Private Search. [Full version PDF] [Talk PPT \PDF]
Workshop on Privacy in the Electronic Society, ACM WPES 2009 .
with Matthew Franklin and Mark Gondree.
Communication-Efficient Private Protocols for Longest Common Subsequence. [Full Version PDF]
RSA Conference, Cryptographer's Track, CT-RSA 2009 .
with Enav Weinreb.
Efficient Secure Linear Algebra In Presence of Covert or Computationally Unbounded Adversaries. [Proceedings PDF][Talk PPT][Talk Video]
Advances in Cryptology, CRYPTO 2008 .
with Vipul Goyal and Adam Smith.
Secure Two-party and Multi-party Computation against Covert Adversaries. [Proceedings PDF][Talk PPT \PDF]
Advances in Cryptology, EUROCRYPT 2008 .
with Mark Gondree and Matthew Franklin.
Multiparty Indirect Indexing and Applications. [ Full Version PDF]
Advances in Cryptology, ASIACRYPT 2007 .
with Nenad Dedic.
Constant-Round Private Database Queries . [PDF][Talk PPT]
International Colloquium on Automata, Languages and Programming, ICALP 2007 .
with Eike Kiltz and Enav Weinreb and Matthew Franklin.
Secure Linear Algebra Using Linearly Recurrent Sequences. [PDF]
Theory of Cryptography Conference, TCC 2007 .
with Matthew Franklin and Mark Gondree.
Improved Efficiency for Private Stable Matching. [Full Version][Talk PPT]
RSA Conference, Cryptographer's Track, CT-RSA 2007 .
with Matthew Franklin.
Efficiency Tradeoffs for Malicious Two-Party Computation. [PDF \ PS][TalkPDF]
Public Key Cryptography Conference PKC 2006 .
with Matthew Franklin.
Efficient Polynomial Operations in the Shared-Coefficients Setting. [PDF \ PS][Talk PDF]
Public Key Cryptography Conference, PKC 2006 .
with Gergei Bana and Till Stegers.
Computational Soundness of Formal Indistinguishability and Static Equivalence. [Full Version PDF]
11th Annual Asian Computing Conference, ASIAN 2006 .