Kirill Morozov

Kirill Morozov

Associate Professor, PhD
Department of Computer Science and Engineering
University of North Texas, USA
Research interests: Cryptography, Cybersecurity

In particular, cryptographic protocols based on coding and correlated randomness, including:

  • Post-quantum (computational) cryptography, including:
    • Code-based public-key encryption and digital signatures.
    • Code-based zero-knowledge protocols.

  • Information-theoretic cryptography, including:
    • Cheater-identifiable / robust / verifiable secret sharing.
    • Physical-layer key agreement in wireless networks.
    • Bit commitment and oblivious transfer from correlated randomness (noisy channels etc.)
Postal Address:
Department of Computer Science and Engineering
University of North Texas, Discovery Park
3940 N. Elm, Room F283
Denton, TX 76207, USA

Tel: +1-940-565-2268

E-mail: [First name] [dot] [Last name] [at] unt.edu

Publications

In books:

  • K. Morozov, Code-Based Zero-Knowledge Protocols and Their Applications, an article in Tsuyoshi Takagi et al. (eds.), Mathematical Modelling for Next-Generation Cryptography, pp. 43-62, Mathematics for Industry, vol. 29, Springer, 2017.
    [Available upon request.]

  • Kirill Morozov, Code-Based Public-Key Encryption, an article in Ryuei Nishi et al. (eds.), A Mathematical Approach to Research Problems of Science and Technology, Mathematics for Industry, vol. 5, pp. 47-55, Springer, 2014.
    [Available upon request.]

Journal papers

  1. Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Computers & Security 69, pp. 65-83 (2017) (Journal version of [4].) [Available upon request.]

  2. Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai, Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions, The Journal of Supercomputing, vol. 73, no. 10, pp. 4275-4301 (2017) (Journal version of [6].) [Available upon request.]

  3. Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Secret Sharing with Cheaters Using Multi-Receiver Authentication. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 100-A, no. 1, pp. 115-125, January, 2017. (Journal version of [9].) [Available upon request.]

  4. Rong Hu, Kirill Morozov, Tsuyoshi Takagi, Zero-Knowledge Protocols for Code-Based Public-Key Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E98-A, no. 10, pp. 2139-2151, October, 2015. (Journal version of [12,13].) [Available upon request.]

  5. Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Cryptanalysis of Some Recent Cheater Identifiable Secret Sharing Schemes, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E98-A, no.8, pp. 1814-1819, August, 2015. [Available upon request.]

  6. Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai, Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE, accepted to International Journal of Network Security, August 2012.
    (Journal version of [16].) [ pdf ]

  7. Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov and Anderson C. A. Nascimento, Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, in IEEE Transactions on Information Theory, Vol. 57, No. 8, pp. 5566-5571, August 2011. [ pdf ]

  8. Ryo Nojima, Hideki Imai, Kazukuni Kobara and Kirill Morozov, Semantic Security for the McEliece Cryptosystem without Random Oracles, Designs, Codes and Cryptography, Vol. 49, No. 1-3, pp. 289-305, December, 2008.
    (Journal version of [20].) [ pdf ]

Peer-reviewed conference papers

  1. Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. Proc. IWSEC 2017, pp. 159-178, Springer (2017) [Available upon request.]

  2. Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka, CCA2 Key-Privacy for Code-Based Encryption in the Standard Model, Proc. of PQCrypto 2017, pp. 35-50, Springer (2017) [Available upon request.]
  3. Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai, On unconditionally binding code-based commitment schemes, Proc. of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM 2017), pp. 101:1-101:5, 2017. [Available upon request.]
  4. Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database, Proc. of 21st Australasian Conference on Information Security and Privacy (ACISP 2016), pp. 181-197, 2016. [Available upon request.]
  5. Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu, Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. Proc. of 9th International Conference on Information Theoretic Security (ICITS 2016), pp. 3-23, 2016. [Available upon request.]
  6. Chenyuntao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai, Cross-group Secret Sharing for Secure Cloud Storage Service, Proc. of International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2016), pp. 63:1-63:8, 2016. [Available upon request.]
  7. Yvo Desmedt and Kirill Morozov, Parity Check Based Redistribution of Secret Shares, Proceedings of IEEE International Symposium on Information Theory (ISIT 2015), pp. 959-963, IEEE, 2015. [Available upon request.]
  8. Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov and Kouichi Sakurai, An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency, To Appear in Proceedings of 4th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), Pune, India, October 18-22, 2014. [ pdf ]
  9. Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication, Proceedings of 9th International Workshop on Security (IWSEC 2014), Lecture Notes in Computer Science, Vol. 8639, pp. 72-87, 2014.. [ pdf ]
  10. Rui Xu, Kirill Morozov, Tsuyoshi Takagi, On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary, Proceedings of 8th International Workshop on Security (IWSEC 2013), Lecture Notes in Computer Science, Vol. 8331, pp. 258-271, 2013. [ pdf ]
  11. Rong Hu, Kirill Morozov, Tsuyoshi Takagi, On Zero-Knowledge Identification Based on q-ary Syndrome Decoding,
    Proceedings of 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), pp. 12-18, IEEE, 2013. [ pdf ]
  12. Rong Hu, Kirill Morozov, Tsuyoshi Takagi, Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited (short paper), Proceedings of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 535-540, ACM, 2013. [ pdf ]
  13. Kirill Morozov, Tsuyoshi Takagi, Zero-Knowledge Protocols for the McEliece Encryption, Proceedings of 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in Computer Science, Vol. 7372, pp. 180-193, 2012. [ Available upon request. This result is superseded by the above short paper at ASIACCS 2013 [pdf] ]
  14. Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai, Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter, in Proceedings of 1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011) - a satellite of 7th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2011), pp. 463-469, IEEE Computer Society, 2011. [Available upon request]

  15. Kirill Morozov, George Savvides, Efficient Computational Oblivious Transfer Using Interactive Hashing (Short Paper), in Proceedings of 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 448-452, ACM, 2011. [ pdf ]

  16. Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai, Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE, in Proceedings of 18th Symposium on Applied algebra, Algebraic algorithms, and Error Correcting Codes (AAECC), Lecture Notes in Computer Science, Vol. 5527, pp. 159-168, Springer-Verlag, 2009. [ pdf ]

  17. Kazukuni Kobara, Kirill Morozov, Raphael Overbeck, Coding-Based Oblivious Transfer, in Mathematical Methods in Computer Science, Lecture Notes in Computer Science, Vol. 5393, pp. 142-156, Springer-Verlag, 2008. [ pdf ]

  18. Frederique Oggier, Kirill Morozov, A Practical Scheme for String Commitment based on the Gaussian Channel, in Proceedings of 2008 IEEE Information Theory Workshop (ITW 2008), pp. 328-332, IEEE, 2008. [ pdf ]

  19. Hideki Imai, Kirill Morozov, Anderson C.A. Nascimento, Efficient Oblivious Transfer Protocols Achieving a Non-Zero Rate from Any Non-Trivial Noisy Correlation, in Proceedings of International Conference on Information Theoretic Security (ICITS) 2007, Lecture Notes in Computer Science, Vol. 4883, pp. 183-194, Springer-Verlag, 2007. [ pdf ]

  20. Ryo Nojima, Hideki Imai, Kazukuni Kobara and Kirill Morozov, Semantic Security for the McEliece Cryptosystem without Random Oracles, in Proceedings of International Workshop on Coding and Cryptography (WCC) 2007, pp. 257-268, INRIA, 2007. [ pdf ]

  21. Hideki Imai, Kazukuni Kobara and Kirill Morozov, On the Possibility of Key Agreement Using Variable Directional Antenna, in Proceedings of 1st Joint Workshop on Information Security, pp. 153-167, Seoul, Korea, 2006. [ pdf ]

  22. Hideki Imai, Kirill Morozov, Anderson C.A. Nascimento, and A. Winter, Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations, in Proceedings of 2006 International Symposium on Information Theory (ISIT), pp. 1432-1436, IEEE, 2006. [ pdf ]

  23. Hideki Imai, Kirill Morozov, and Anderson C.A. Nascimento, On the Oblivious Transfer Capacity of the Erasure Channel, in Proceedings of 2006 International Symposium on Information Theory (ISIT), pp. 1428-1431, IEEE, 2006. [ pdf ]

  24. Claude Crépeau, Kirill Morozov and Stefan Wolf, Efficient Unconditional Oblivious Transfer from Almost any Noisy Channel, in Proceedings of Fourth Conference on Security in Communication Networks (SCN) 2004, Lecture Notes in Computer Science, Vol. 3352, pp. 47-59, Springer-Verlag, 2005. [pdf]

  25. Ivan Damgård, Serge Fehr, Kirill Morozov, and Louis Salvail, Unfair Noisy Channels and Oblivious Transfer, in Proceedings of Theory of Cryptography Conference (TCC) 2004, Lecture Notes in Computer Science, Vol. 2951, pp. 355-373, Springer-Verlag, 2004. [pdf]
    Full version of this paper: [pdf]. Also available as BRICS report RS-03-36, University of Aarhus, November 2003.

  26. Valery Korjik and Kirill Morozov, Generalized Oblivious Transfer Protocols Based on Noisy Channels, in Proceedings of International Workshop Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security (MMM-ACNS) 2001, Lecture Notes in Computer Science, Vol. 2052, pp. 219-229, Springer-Verlag, 2001. [ pdf ]

  27. Valeri Korjik and Kirill Morozov, Non-asymptotic Bit Commitment Protocol Based on Noisy Channels, in Proceedings of 20th Biennial Symposium on Communications, pp. 74-78, Queen's University, Canada, 2000. [ pdf ]

Other Manuscripts

  1. Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, and Kouichi Sakurai, “An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency”, Cryptology ePrint Archive: Report 2014/628.
  2. Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento: A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. Cryptology ePrint Archive: Report 2017/993.

Thesis

Kirill Morozov, On Cryptographic Primitives Based on Noisy Channels, BRICS Dissertation DS-05-1, University of Aarhus, March 2005. [ps| pdf]

Past Teaching in Japan

Tokyo Institute of Technology, School of Computing
Spring 2017: Information Literacy I and II - 1st/2nd Year Undergraduate Course - Syllabi: IL I and IL II

Kyushu University, Graduate School of Mathematics
Fall 2014, Spring 2015: Introduction to Post-Quantum Cryptography - Graduate / 4th Year Undergraduate Course
Spring 2011-2013: Topics in Information-Theoretic Cryptography - Graduate / 4th Year Undergraduate Course

Past Events

Links


Last modification: December 8, 2017