Æß²ÊÖ±²¥

Dr Mehmet Sabir Kiraz

Job: Senior Lecturer in Cyber Security, Programme Leader of UG Cyber Security

School/department: School of Computer Science and Informatics

Address: Æß²ÊÖ±²¥, The Gateway, Leicester, LE1 9BH

T: +44 (0)116 257 7518

E: mehmet.kiraz@dmu.ac.uk

W:

 

Personal profile

Mehmet Sabir Kiraz is a Senior Lecturer since  November 2018 and also the Programme Leader of Cyber Security BSc at Cyber Security Center, Æß²ÊÖ±²¥, UK.

He received his bachelor’s from Mathematics Department at Middle East Technical University in 2000. He worked at IT departments of Pamukbank and Yapi Kredi Bank as software engineer between June 2000 and September 2002. In October 2002, he started his M.Sc. studies at International Max Planck Research Institute for Computer Science, Germany and completed in November 2003.

He received his PhD. from Computer Science department at Eindhoven Technical University, the Netherlands in March 2008. His Ph.D. thesis title was “Secure and Fair Two-Party Computation”. He then worked at PHILIPS, Eindhoven and TOMTOM, Amsterdam as a test coordinator between 2008 and 2010.

He worked at TUBITAK BILGEM Informatics and Information Security Research Center as a chief researcher between January 2010 and November 2018. He founded and also was the director of Blockchain Research Lab at TUBITAK BILGEM between May 2017 and November 2018. He worked at Middle East Technical University and Istanbul Sehir University as a Visiting Lecturer between 2010 and 2018.

He has been promoted to Associate Professor (Cryptography-Algebra and Number Theory) by Inter- University Council of Turkey in March 2017. 

Research group affiliations

  • Cyber Technology Institute (CTI)
  • Full Membership: Research and Innovation Institute of Digital Research Communications and Responsible Innovation 

Publications and outputs

The full list of publications are in 

(with M. Alown and M. A. Bingol) "Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems", in IEEE Access, doi: 10.1109/ACCESS.2025.3531349, Jan 2025.


(with Fahim Nasir and Abdulghani Ali Ahmed and Iryna Yevseyeva and Mubarak Saif) Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data. Computers, Materials & Continua 2024, 81(1), 1703-1728. https://doi.org/10.32604/cmc.2024.055192. Oct 2024.


(with Adarbah, H.Y. and Kardas, S. and Al-Bayatti and A.H. and Al-Bayatti H.M.Y. A) New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs. Future Internet 2024, 16, 328. https://doi.org/10.3390/fi16090328. Aug 2024.


(with Mustafa Ibrahim Alnajjar and Ali Al-Bayatti and Suleyman Kardas) Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption. Volume 2024, article number 62. https://doi.org/10.1186/s13638-024-02390-4. Aug 2024.


(with E. Larraia and O. Vaughan) "How to Redact the Bitcoin Backbone Protocol," 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland, 2024, pp. 485-493, doi: 10.1109/ICBC59979.2024.10634365. May 2024.


(with Mishri SalehAlMarshoud and Ali H.Al-Bayatti) Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. ACM Comput. Surv. 56, 10, Article 260, 39 pages. https://doi.org/10.1145/3656166. Oct 2024.


(with Larraia, E. and Vaughan, O) NFT Trades in Bitcoin with Off-Chain Receipts. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2023. Lecture Notes in Computer Science, vol 13907. Springer, Cham. https://doi.org/10.1007/978-3-031-41181-6_6. Oct 2023.

(with Mishri SalehAlMarshoud and Ali H.Al-Bayatti) Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures, Vehicular Communications, Volume 36, 2022, ISSN 2214-2096, https://doi.org/10.1016/j.vehcom.2022.100490.

(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures, The Computer Journal, Volume 64, Issue 4, April 2021, Pages 564–574, https://doi.org/10.1093/comjnl/bxaa081.

(with Biçer, Osman, and Bingöl, Muhammed Ali) Highly Efficient and Reusable Private Function Evaluation with Linear Complexity, IEEE Transactions on Dependable and Secure Computing PP(99):1-1, DOI:10.1109/TDSC.2020.3009496, 2020.

(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain, Computers & Security, Volume 85, August 2019, Pages 333-352, https://doi.org/10.1016/j.cose.2019.05.013.

(with Biçer, Osman, and Bingöl, Muhammed Ali, and Levi, Albert) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates, The Computer Journal, Volume 62, Issue 4, April 2019, Pages 598–613, https://doi.org/10.1093/comjnl/bxy136.

(with Uzunkol, Osmanbey) Still Wrong Use of Pairings in Cryptography. Applied Mathematics and Computation, Volume 333, 15 September 2018, Pages 467-479.

(with Kardaş, Süleyman) Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing, http://eprint.iacr.org/2016/696.pdf, 2017.

(with Kardaş, Süleyman and Bingöl, Muhammed Ali and Birinci, Fatih) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, International Journal “Security and Communication Networks, October 2016, https://doi.org/10.1002/sec.1678.

A Comprehensive Meta-Analysis of Cryptographic Security Mechanisms for Cloud Computing. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-016-0385-0, 2016.

Research interests/expertise


  • Cryptography
  • Cryptographic Protocols
  • Privacy
  • Authentication and Key Management
  • Secure Multiparty Computation (MPC)
  • Homomorphic Encryption
  • Zero Knowledge Proofs (e.g., ZKSNARKs, ZKSTARKs, Bulletproofs)
  • Threshold Cryptography
  • Electronic voting
  • Cloud Security
  • Blockchain and Cryptocurrencies

Areas of teaching

Cryptography, Foundations of Cyber Security, Cyber Security Management, C/C++ Programming, Multi-Service Networks

Qualifications

Program Leader of UG Cyber Security and Digital Forensics

Æß²ÊÖ±²¥ taught

BSc Industrial Cryptography

BSc Introduction to Cryptography

 BSc Cyber Security Management

BSc C/C++ Programming

BSc Multi-Service Networks

BSc Introduction to Blockchain

BSc Computer Programming (Scala)

MSc Cryptographic Protocols

MSc Foundations of Cyber Security

Membership of external committees

  • Nov 2024: Senior Fellowship of the Higher Education Academy (SFHEA)
  • Dec 2022: Fellowship of the Higher Education Academy (FHEA)

Membership of professional associations and societies

Professional licences and certificates

 

Current research students

  • Mosbah Alown (PhD Candidate, 1st Supervisor)
  • Ahmad Aladwan  (PhD Candidate, 1st Supervisor)
  • Mustafa Alnajjar (PhD Candidate, 1st Supervisor)
  • Anil Kumar (PhD Candidate, 2nd Supervisor)

Administrative responsibilities

Aug 2021-  Still: Programme Leader of Cyber Security BSc

Dec 2023 - Still: Programme Leader Representative (PLR) for CSI

Aug 2021-  Aug 2024: Programme Leader of Digital Forensics BSc