Majid Nateghizad

Learn More
Nowadays cloud computing is widely used by users and organization to get benefit of many services in cloud. Huge datasets in cloud persuade users to outsource their information and documents to the untrusted Cloud Service Provider (CSP). On the other hand, there are some privacy and security problems in cloud storage considering as main drawbacks of(More)
Cloud computing offers a wide range of services such as user demand network, operating systems, hardware, software and resources. These encouraging facilities and hassle free management of computing resources have attracted many users to outsource their data to untrusted servers. Cloud server may leak documents to unauthorized parties. Therefore, all(More)
Secure equality testing of two private values is one of the fundamental building blocks of many cryptographic protocols designed for Signal Processing in the Encrypted Domain (SPED). Existing protocols introduce significant amount of computation and computational overhead, which makes it essential to search for new and novel, efficient equality tests for(More)
  • 1