• "Main Building of University of Tartu"
  • "Our Group and Research Areas"

My Research, Publications and Presentations

During my PhD studies my focus was on non-interactive zero-knowledge proofs, as one of the most prominent solutions for providing strong privacy and anonymity in applications such as verifiable compuations, privacy-preserving cryptocurrencies and smart contracts. The followings are some of my publications during my PhD studies at University of Tartu.

List of Recent Publications
No. Year Details Source
30 2020 Karim Baghery. Reducing trust and improving security in zk-SNARKs and commitments. PhD Thesis, University of Tartu, 2020. PDF
29 2020 Karim Baghery, and Mahdi Sedaghat. Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model. Cryptology ePrint Archive, Report 2020/474, 2020. Was selected as the best lightning talk in the 3rd ZKProof workshop, 2020. PDF Slides
28 2020 Karim Baghery. Subversion-Resistant Commitment Schemes: Definitions and Constructions. In Kostantinos Markantonakis, and Marinella Petrocchi, editors, Security and Trust Management – ESORICS 2020 International Workshops, STM 2020, Guildford, UK, September 17 – 18, 2020, Proceedings, volume ??? of Lecture Notes in Computer Science, pages ??–??. Springer, 2020. PDF
27 2020 Karim Baghery, Alonso González, Zaira Pindado, and Carla Rŕfols. Signatures of Knowledge for Boolean Circuits under Standard Assumptions. In Abderrahmane Nitaj and Amr Youssef, editors, AFRICACRYPT 2020, volume 12174 of Lecture Notes in Computer Science, pages 24–44, Cairo, Egypt, July 20–22, 2020. Springer, Heidelberg. PDF Slides
26 2019 Karim Baghery. Subversion-Resistant Simulation (Knowledge) Sound NIZKs. In Martin Albrecht, editors, 17th IMA Conference on Cryptography and Coding Theory - IMACC 2019, volume 11929 of Lecture Notes in Computer Science, pages 42--63, Oxford, December 16--18, 2019; Springer, Heidelberg. PDF Slides
25 2019 Shahla Atapoor and Karim Baghery. Simulation Extractability in Groth's zk-SNARK. In Cristina Perez-Sola, Guillermo Navarro-Arribas, Alex Biryukov, and Joaquin Garcia-Alfaro, editors, Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings, volume 11737 of Lecture Notes in Computer Science, pages 336–354. Springer, 2019. PDF
24 2019 Karim Baghery. On the Efficiency of Privacy-Preserving Smart Contract Systems. In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, AFRICACRYPT 2019 , volume 11627 of Lecture Notes in Computer Science, pages 118--136, Rabat, Morocco, July 9--11, 2019. Springer, Heidelberg. PDF Video Slides
23 2019 Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac. UC-Secure CRS Generation for SNARKs. In Johannes Buchmann, Abderrahmane Nitaj and Tajjeeddine Rachidi, editors, AFRICACRYPT 2019 , volume 11627 of Lecture Notes in Computer Science, pages 99--117, Rabat, Morocco, July 9--11, 2019. Springer, Heidelberg. PDF
22 2019 Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa, Janno Siim and Michal Zajac. DL-Extractable UC-Commitment Schemes. In Robert Deng and Moti Yung, editors, ACNS 2019 , volume 11464 of Lecture Notes in Computer Science, pages 385--405, BogotĂ , Colombia, June 5--7, 2019. Springer, Heidelberg. PDF
21 2018 Karim Baghery, Behzad Abdolmaleki, Shahram Khazaei, Mohammad Reza Aref; Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols. Journal of Wireless Networks , Vol. 25, No. 3, pp. 1235–52, Springer US. PDF
20 2017 Behzad Abdolmaleki, Karim Baghery, Helger Lipmaa and Michal Zajac. A Subversion-Resistant SNARK. In Thomas Peyrin and Tsuyoshi Takagi, editors, ASIACRYPT 2017 , volume 10626 of Lecture Notes in Computer Science, pages 3--33, Hong Kong, China, December 3--7, 2017. Springer, Heidelberg. (Ranked in top 3 papers, and invited to Journal of Cryptology.) PDF
19 2017 Karim Baghery, Behzad Abdolmaleki. An AKARI-based Secure Communication Scheme for EPC Tags. Advances in Wireless and Optical Communications, RTUWO 2017 , pages 208--213, Riga, Latvia, November 2–3, 2017. IEEE. PDF
18 2017 Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref; Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT. Journal of Wireless Personal Communications , volum 95, number 4, pp. 5057--5080, 2017, Springer US. PDF
17 2016 Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Mohammad Reza Aref; Analysis of Xiao et al.’s Authentication Protocol Conforming to EPC C1 G2 Standard. 2016 8th International Symposium on Telecommunications (IST), IEEE. PDF
16 2016 Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Seyed Mohammad Alavi, Mohammad Reza Aref; Securing Key Exchange and Key Agreement Security Schemes for RFID Passive Tags. 24th Iranian Conference on Electrical Engineering (ICEE), pp. 1475-1480, IEEE. PDF
15 2015 Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref; Enhancing Privacy of Recent Authentication Schemes for Low-Cost RFID Systems. The ISC International Journal of Information Security, vol. 7, no. 2, pp. 135-149, Iranian Society of Cryptology. PDF
14 2015 Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki, Mohammad Reza Aref; Traceability Analysis of Recent RFID Authentication Protocols. Wireless Personal Communications, vol. 83, no. 3, pp. 1663-1682, Springer. PDF
13 2015 Behzad Abdolmaleki, Karim Baghery, Bahareh Akhbari, Mohammad Reza Aref; Cryptanalysis of two EPC-based RFID security schemes. 12th International Iranian Society of Cryptology Conference Information Security and Cryptology (ISCISC), pp. 116-121, IEEE. PDF
12 2015 Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref; Untraceable RFID Authentication Protocols for EPC Compliant Tags. 23rd Iranian Conference on Electrical Engineering (ICEE), pp. 426-631, IEEE. PDF
11 2014 Karim Baghery, Behzad Abdolmaleki, Mohammad Javad Emadi; Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags. AUT Journal of Electrical Engineering, vol. 46, no. 1, pp. 27-36. PDF
10 2014 Karim Baghery, Behzad Abdolmaleki, Bahareh Akhbari, Mohammad Reza Aref; Privacy Analysis and Improvements of two Recent RFID Authentication Protocols. 11th International Iranian Society of Cryptology Conference Information Security and Cryptology (ISCISC), pp. 137-142, IEEE. PDF

Full list of my publications can be found in my Google Scholar account.

Some of Recent Presentations/Seminars/Talks
No. Year Details Slides
16 2019 Reducing Trust in zk-SNARKs and Efficient zk-SNARKs for UC-secure Applications. Universitat Pompeu Fabra, October 2019. Slides
15 2019 On the Efficiency of Privacy-Preserving Smart Contract Systems. Joint Estonian-Latvian Theory Days 2019, October 2019. Slides Video
14 2019 Reducing Trust and Improving Security in zk-SNARKs. Research group COSIC, KU Leuven University, September 2019. Slides Video
13 2019 Zk-SNARKs in Privacy-Preserving Applications. Department of Mathematical Sciences, Sharif University of Technology, August 2019. Slides
12 2019 On the Efficiency of Privacy-Preserving Smart Contract Systems. 11th International Conference on Cryptology, AFRICACRYPT 2019, July 2019. Slides
11 2019 DL-Extractable UC-Commitment Schemes. 17th International Conference on Applied Cryptography and Network Security, ACNS 2019 , June 2019. Slides
10 2018 A Subversion-Resistant zk-SNARK. ISSL Lab., Department of Electrical Engineering, Sharif University of Technology, August 2018. Slides
9 2018 Introduction to ZK proofs and SNARKs. Blochchain Lab., Department of Electrical Engineering, Sharif University of Technology, July 2018. Slides
8 2018 The Bitcoin Lightning Network. Iran Telcommunication Reseach Center, ITRC, July 2018. Slides
7 2017 An AKARI-based Secure Communication Scheme for EPC Tags. Advances in Wireless and Optical Communications, RTUWO 2017, November 2017. Slides
6 2016 Analysis of Xiao et al.’s authentication protocol conforming to EPC C1 G2 standard. 8th International Symposium on Telecommunications, IST 2016, September 2016. Slides
5 2016 Securing key exchange and key agreement security schemes for RFID passive tags. 24th Iranian Conference on Electrical Engineering, ICEE 2016, September 2016. Slides
4 2015 Untraceable RFID authentication protocols for EPC compliant tags. 12th ISC Conference on Information Security and Cryptology, ISCISC 2015, May 2015. Slides
3 2014 Privacy analysis and improvements of two recent RFID authentication protocols. 11th International ISC Conference on Information Security and Cryptology, ISCISC 2014, September 2014. Slides
2 2014 Attacks and improvements on two new-found RFID authentication protocols. 7th International Symposium on Telecommunications, IST 2014, September 2014. Slides
1 2014 Enhancing achievable sum-rate by making strong and weak interference in an ad-hoc network. 7th International Symposium on Telecommunications, IST 2014, September 2014. Slides