²ÝÁñÊÓƵ

Dr Mehmet Sabir Kiraz

Job: Senior Lecturer in Cyber Security, Programme Leader of Cyber Security and Digital Forensics

School/department: School of Computer Science and Informatics

Address: ²ÝÁñÊÓƵ, The Gateway, Leicester, LE1 9BH

T: +44 (0)116 257 7518

E: mehmet.kiraz@dmu.ac.uk

W:

 

Personal profile

Mehmet Sabir Kiraz is a Senior Lecturer since  November 2018 and also the Programme Leader of Cyber Security and Digital Forensics BSc at Cyber Security Center, ²ÝÁñÊÓƵ, UK.

He received his bachelor’s from Mathematics Department at Middle East Technical University in 2000. He worked at IT departments of Pamukbank and Yapi Kredi Bank as software engineer between June 2000 and September 2002. In October 2002, he started his M.Sc. studies at International Max Planck Research Institute for Computer Science, Germany and completed in November 2003.

He received his PhD. from Computer Science department at Eindhoven Technical University, the Netherlands in March 2008. His Ph.D. thesis title was “Secure and Fair Two-Party Computation”. He then worked at PHILIPS, Eindhoven and TOMTOM, Amsterdam as a test coordinator between 2008 and 2010.

He worked at TUBITAK BILGEM Informatics and Information Security Research Center as a chief researcher between January 2010 and November 2018. He founded and also was the director of Blockchain Research Lab at TUBITAK BILGEM between May 2017 and November 2018. He worked at Middle East Technical University and Istanbul Sehir University as a Visiting Lecturer between 2010 and 2018.

He has been promoted to Associate Professor (Cryptography-Algebra and Number Theory) by Inter- University Council of Turkey in March 2017. 

Research group affiliations

Cyber Technology Institute (CTI)

Publications and outputs

The full list of publications are in 

(with Mishri SalehAlMarshoud and Ali H.Al-Bayatti) Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures, Vehicular Communications, Volume 36, 2022, ISSN 2214-2096, https://doi.org/10.1016/j.vehcom.2022.100490.

(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures, The Computer Journal, Volume 64, Issue 4, April 2021, Pages 564–574, https://doi.org/10.1093/comjnl/bxaa081.

(with Biçer, Osman, and Bingöl, Muhammed Ali) Highly Efficient and Reusable Private Function Evaluation with Linear Complexity, IEEE Transactions on Dependable and Secure Computing PP(99):1-1, DOI:10.1109/TDSC.2020.3009496, 2020.

(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain, Computers & Security, Volume 85, August 2019, Pages 333-352, https://doi.org/10.1016/j.cose.2019.05.013.

(with Biçer, Osman, and Bingöl, Muhammed Ali, and Levi, Albert) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates, The Computer Journal, Volume 62, Issue 4, April 2019, Pages 598–613, https://doi.org/10.1093/comjnl/bxy136.

(with Uzunkol, Osmanbey) Still Wrong Use of Pairings in Cryptography. Applied Mathematics and Computation, Volume 333, 15 September 2018, Pages 467-479.

(with Kardaş, Süleyman) Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing, http://eprint.iacr.org/2016/696.pdf, 2017.

(with Kardaş, Süleyman and Bingöl, Muhammed Ali and Birinci, Fatih) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, International Journal “Security and Communication Networks, October 2016, https://doi.org/10.1002/sec.1678.

A Comprehensive Meta-Analysis of Cryptographic Security Mechanisms for Cloud Computing. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-016-0385-0, 2016.

Research interests/expertise


  • Cryptography
  • Cryptographic Protocols
  • Privacy
  • Authentication and Key Management
  • Secure Multiparty Computation (MPC)
  • Homomorphic Encryption
  • Zero Knowledge Proofs (e.g., ZKSNARKs, ZKSTARKs, Bulletproofs)
  • Threshold Cryptography
  • Electronic voting
  • Cloud Security
  • Blockchain and Cryptocurrencies

Areas of teaching

Cryptography, Foundations of Cyber Security, Cyber Security Management, C/C++ Programming, Multi-Service Networks

Qualifications

Program Leader of UG Cyber Security and Digital Forensics

²ÝÁñÊÓƵ taught

BSc Introduction to Cryptography

 BSc Cyber Security Management

BSc C/C++ Programming

BSc Multi-Service Networks

BSc Introduction to Blockchain

BSc Computer Programming (Scala)

MSc Cryptographic Protocols

MSc Foundations of Cyber Security

Membership of external committees

Fellowship of the Higher Education Academy (FHEA)

Professional licences and certificates

 

Administrative responsibilities