Atefeh Atty Mashatan

Atefeh Atty Mashatan
Ryerson University · Ted Rogers School of Information Technology Management

PhD, MMath, BMath, CISSP

About

66
Publications
3,632
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
550
Citations
Citations since 2016
43 Research Items
437 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200

Publications

Publications (66)
Article
The application of blockchain technology in supply chain management has become a popular area of discussion in research and practice. This paper develops a computational, data-driven synthesis of the scholarly literature versus news media on BT-enabled supply chain management (BT-SCM) to uncover major trends, understand how academic research is ali...
Article
We present a device-independent analysis of controlled quantum teleportation where the receiver is not trusted. We show that the notion of genuine tripartite nonlocality allows us to certify control power in such a scenario. By considering a specific adversarial attack strategy on a device characterized by depolarizing noise, we find that control p...
Article
Full-text available
This study examines the factors influencing blockchain’s adoption intention as a whole, relying on an organisational perspective and the Technology-Organisation-Environment Framework (TOE). To organise and investigate the factors and to study blockchain technology adoption intention, this research employs a mixed-methodology. After an extended lite...
Chapter
Blockchain technology has a reputation for providing a higher level of assurance and security than other information systems. However, many design decisions, implementation realities, limitations, and trade-offs can create underlying vulnerabilities in blockchain-based solutions that are exploitable by malicious attackers. This chapter discusses so...
Article
Full-text available
The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse entities, including smart small devices for capturing sensitive information, which may be attainable targets for malicious parties. Thus security and privacy are of utmost impo...
Article
Full-text available
The heterogeneous and decentralized nature of renewable energy sources is too much to handle for traditional and centralized IT grid infrastructure. Blockchain technology can address many of the associated challenges. This paper provides an overview of the state-of-the-art technology layers of grid system infrastructure, a proposed future state usi...
Article
Full-text available
The development of increasingly sophisticated quantum computers poses a long-term threat to current cryptographic infrastructure. This has spurred research into both quantum-resistant algorithms and how to safely transition real-world implementations and protocols to quantum-resistant replacements. This transition is likely to be a gradual process...
Article
Full-text available
In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation, and immutability, into security experiments. In our model, we consider a quantum-capable adversary w...
Article
Full-text available
Deng et al. (J Inf Secur Appl 47:120–124, 2019) recently proposed a quantum multiparty collaborative computation protocol that claims that the private information of trustful participants is secure against the distrustful ones. They also analyzed the security of their model against a malicious user and claimed that it is secure. However, our work s...
Article
Full-text available
The ever-increasing acceptance of cryptocurrencies has fueled applications beyond investment purposes. Crypto-payment is one such application that can bring radical changes to financial transactions in many industries, particularly e-commerce and online retail. However, characteristics of the technology such as transaction disintermediation, lack o...
Article
Full-text available
The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led to a rise in the use of their civilian and commercial applications. The access of these drones to controlled airspace can be efficiently coordinated through particular layered network architecture, often referred to as the Internet-of-Drones (IoD). The nature of...
Article
Full-text available
The global supply chain is a network of interconnected processes that create, use, and exchange records, but which were not designed to interact with one another. As such, the key to unlocking the full potential of supply chain management (SCM) technologies is achieving interoperability across participating records systems and networks. We review e...
Article
Full-text available
Quantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a po...
Article
There is a new technology on the horizon that will forever change the information security and privacy industry landscape. Quantum computing, together with quantum communication, will have many beneficial applications but will also be capable of breaking many of today's most popular cryptographic techniques that help ensure data protection?in parti...
Article
Sealed-bid auction is one of the major protocols used in the electronic commerce industry. Recently, many schemes have been proposed to implement sealed-bid auction protocols based on quantum computing, while other schemes have adopted the blockchain. However, each of the previous proposals has focused on a few sealed-bid auction features while sim...
Article
Full-text available
Consider the following broadcasting process run on a connected graph G=(V,E). Suppose that k≥2 agents start on vertices selected from V uniformly and independently at random. One of the agents has a message that she wants to communicate to the other agents. All agents perform independent random walks on G, with the message being passed when an agen...
Article
In this paper, we consider the problem of increasing efficiency of a transportation system through optimizing the behavior of commuters. The assumption is that the time spent in the traffic can be represented by a monetary value and hence introduction of monetary compensations can lead to a more efficient organization of the transportation system....
Article
Despite gaining consumer momentum and interest of Virtual Reality (VR) in the consumer marketplace, the literature has lagged in exploring the continuance usage behaviour and factors associated with the post-adoption. To build on this, the current research seeks to identify factors that support the continuance usage of current VR users. To examine...
Article
This paper discusses the problem of double-ending fraud in real estate transactions – a type of transactional fraud wherein agents handling real estate transactions unfairly benefit (e.g., by simultaneously representing both the buy and sell side of a real estate transaction in a manner that unfairly boosts the commission they receive, or colluding...
Article
Recent technological advances in wearable technologies, such as mixed-reality devices, have enabled consumers to interact with artificial three-dimensional visual environments. This presents an incredible opportunity for service retailers to present alternative ways of interacting with their services. This study empirically investigates the potenti...
Article
A major threat posed by quantum computers is that they will be able to crack current standardized cryptography. A scalable quantum computer is still challenging to build from an engineering perspective, but there is an imminent threat to digital security and privacy where encrypted information, such as personally identifiable information, will rema...
Article
Blockchain technology presents significant potential along with risk. The blockchain technology transformation framework informs decision makers on how blockchain fits in their processes, what data will be in the transactions, and who the participants will be, allowing users to lower risks and increase their chances for a successful blockchain solu...
Article
Full-text available
Blockchain technology is facing critical issues of scalability, efficiency and sustainability. These problems are necessary to solve if blockchain is to become a technology that can be used responsibly. Useful quantum computers could potentially be developed by the time that blockchain will be widely implemented for mission-critical work at financi...
Preprint
Quantum key agreement enables remote users to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement protocol, two or more malicious participants can collude together to steal the private inputs of honest participants or to generate the final key alone. In this paper, we focus on a...
Preprint
Full-text available
Consider the following broadcasting process run on a connected graph $G=(V,E)$. Suppose that $k \ge 2$ agents start on vertices selected from $V$ uniformly and independently at random. One of the agents has a message that she wants to communicate to the other agents. All agents perform independent random walks on $G$, with the message being passed...
Article
Full-text available
The invention and implementation of smart connected cars will change the way how the transportation networks in cities around the world operate. This technological shift will not happen instantaneously—for many years, both human-driven and smart connected vehicles will coexist. In this paper, using a multiagent simulation framework, we model a comp...
Article
Purpose Understanding a technology’s patent landscape, including patent strategies, helps organizations position themselves regarding their innovation and provides insight about a technology’s future direction. This study aims to provide an overview of the blockchain technology patenting trends and outlines an exploratory framework of patenting str...
Article
Medical data has become an essential element for industrial healthcare. The growth in medical data is accompanied by the need to process it in a secure manner. As the infrastructure of this industry consists of connected devices and software applications that communicate with other IT systems, the industrial healthcare market will be greatly impact...
Preprint
Blockchain technology is facing critical issues of scalability, efficiency and sustainability. These problems are necessary to solve if blockchain is to become a technology that can be used responsibly. Useful quantum computers could potentially be developed by the time that blockchain will be widely implemented for mission-critical work at financi...
Poster
Full-text available
We present a methodology for verifying WebAssembly (WASM) web code using quantum annealers. Executing a simulation of a WASM function on a quantum annealer enables fast edge-case detection which can be used to verify the correctness of the function. The method benefits from a speedup due to quantum tunneling in the annealer. This suggests an effici...
Article
Full-text available
We propose a feasible and efficient dynamic multiparty quantum private comparison protocol that is fully secure against participant attacks. In the proposed scheme, two almost-dishonest third parties generate two random keys and send them to all participants. Every participant independently encrypts their private information with the encryption key...
Article
This paper provides exploratory research by determining the impact of quantum computing threat on modern routing and switching infrastructure components of IT network infrastructure in a large-size financial organization. We determine whether common routing and switching IT network infrastructure, including its hardware and software components, hav...
Article
Full-text available
The advent of next-generation networks such as fifth-generation cellular wireless (5G) has transformed every aspect of our lives and promised improvement for various real-life applications. Recently, Liu and Wang [Int. J. Theor. Phys. 55, 5307–5317, 2016] proposed a dynamic quantum private comparison protocol that utilizes the property of single ph...
Article
Iterated attacks are comprised of iterating adversaries who can make d plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher C and the perfect cipher C ∗ based on all bits. Vaudenay showed that a 2d-decorrelated cipher resists to iterated attacks of order d when iterations have almost no common...
Article
A dynamic universal accumulator is an accumulator that allows one to efficiently compute both membership and nonmembership witnesses in a dynamic way. It was first defined and instantiated by Li et al., based on the Strong RSA problem, building on the dynamic accumulator of Camenisch and Lysyanskaya. We revisit their construction and show that it d...
Conference Paper
Decorrelation Theory deals with general adversaries who are mounting iterated attacks, i.e., attacks in which an adversary is allowed to make d queries in each iteration with the aim of distinguishing a random cipher C from the ideal random cipher C *. A bound for a non-adaptive iterated distinguisher of order d, who is making plaintext (resp. ciph...
Article
Iterated attacks are comprised of iterating adversaries who can make d plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher C and the ideal random cipher C * based on all bits. In EUROCRYPT ’99, Vaudenay showed that a 2d-decorrelated cipher resists to iterated attacks of order d when iteration...
Conference Paper
We introduce the notion of forgery-resilience for digital signature schemes, a new paradigm exhibiting desirable legislative properties. It evolves around the idea that, for any message, there can only be a unique valid signature, and exponentially many acceptable signatures, all but one of them being spurious. This primitive enables a judge to ver...
Conference Paper
In order to alleviate the burden of short keys, encrypting a multiple times has been proposed. In the multiple encryption mode, there may be encryptions under the same or different keys. There have been several attacks against this encryption mode. When triple encryption is based on two keys, for instance, Merkle and Hellman proposed a subtle meet-...
Conference Paper
In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. These signatures were originally proposed to provide information-theoretic-based security against forgeries. In contrast to classical signature schemes, in which signers are protected through a computational conjecture, fail-stop signature schemes prot...
Conference Paper
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the random oracle model or are based on non-standard assumptions. Incorporating random coins, we propose a new MRP using a pseudorandom function F and prove its security based o...
Article
We investigate unconditional security for message authentication protocols that are designed using two-channel cryptography. (Two-channel cryptography employs a broadband, insecure wireless channel and an authenticated, narrow-band manual channel at the same time.) We study both noninteractive message authentication protocols (NIMAPs) and interacti...
Article
We look at message recognition protocols (MRPs) and prove that there is a one-to-one correspondence between stateless non-interactive MRPs and digital signature schemes. Next, we examine the Jane Doe protocol and note its inability to recover in case of a certain adversarial disruption. We propose a variant of this protocol which is equipped with a...
Conference Paper
We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, which was proposed by Lucks et al., more closely and note its inability to recover in case of a certain adversarial disruption. Our paper saves this well-studied protocol from its unre...
Article
We propose an Interactive Message Authentication Protocol (IMAP) using two channels; an insecure broadband channel and an authenticated narrow-band channel. We consider the problem in the context of ad hoc networks, where it is assumed that there is neither a secret key shared among the two parties, nor a public-key infrastructure in place. The sec...
Article
Full-text available
We propose QTRU, a probabilistic and multi-dimensional public key cryptosystem based on the NTRU public key cryptosystem using quaternion algebra. QTRU encrypts four data vectors in each encryption session and the only other major difierence between NTRU and QTRU is that the underlying algebraic structure has been changed to a non-commutative algeb...
Article
We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, which was proposed by Lucks et al., more closely and note its inability to recover in case of a certain adversarial disruption. Our paper saves this well-studied protocol from its unre...
Conference Paper
We propose a message recognition protocol which is suitable for ad hoc pervasive networks without the use of hash chains. Hence, we no longer require the sensor motes to save values of a hash chain in their memories. This relaxes the memory requirements. Moreover, we do not need to x the total number of times the protocol can be executed which impl...
Article
We examine the problem of message and entity recognition in the context of ad hoc networks. We review the denitions and the security model described in the literature and examine previous recognition protocols described in (1), (2), (3), (7), and (8). We prove that there is a one to one correspondence between non-interactive message recognition pro...
Article
The problem of non-interactive message authentication using an insecure broadband channel and an authenticated narrow-band channel is considered. This problem has been considered in the context of ad hoc networks, where it is assumed that there is neither a secret key shared among the two parties nor a public-key infrastructure in place. A formal f...
Article
We consider the problem of non-interactive message authentica- tion using two channels: an insecure broadband channel and an authenticated narrow-band channel. This problem has been considered in the context of ad hoc networks, where it is assumed that there is neither a secret key shared among the two parties, nor a public-key infrastructure in pl...
Article
We study the probability of connectedness for structures of size n when all components must have size at least m: In the border between almost certain connectedness and almost certain disconnectedness, we encounter a generalized Buchstab function of n=m: 1. Results We consider a class of decomposable combinatorial objects A and require that each ob...

Network

Cited By