Homepage - Abhishek Parakh

I am an Associate Professor in the College of Information Science & Technology at the University of Nebraska at Omaha. My research interests are broadly in the areas classical cryptography and network security, sensor networks and distributed systems security and Peer-to-Peer networks. I am also interested in secure multiparty computations, post-quantum cryptography, IoT and Blockchains.

In recent years, I've also worked in quantum cryptography and quantum algorithms. I am also interested in quantum cryptography education through virtual environments. I have two funded projects in this area at present and am looking for Graduate Assistants to work on the projects. I also have REU funds and am looking for one undergraduate student who is interested in game development.

Office: PKI 177D

Email: aparakh @ unomaha.edu

Mailing address: 6001 Dodge St., PKI 177D, Omaha, NE 68116

Education

  • Ph.D., Computer Science, Oklahoma State University, Stillwater, OK, USA - 2011
      • Dissertation Title: New information dispersal techniques for trustworthy computing
      • Advisor: Subhash Kak
  • M.S., Electrical Engineering, Louisiana State University, Baton Rouge, LA, USA - 2008
  • B.S., Electronics and Communications Engineering, National Institute of Technology - Jalandhar (formerly REC-Jalandhar), India - 2005

Academic Positions

  • Associate Professor, University of Nebraska at Omaha, Aug 2017 - present
  • Assistant Professor, University of Nebraska at Omaha, Aug 2011 - July 2017

Funding

  • PI: NSA NCCP, $184,085, Quantum Cryptography Laboratories, 2017-2019
  • PI: NSF SaTC-EDU, $306,037.00, QuaSim: A Virtual Interactive Quantum Cryptography Educator – A Project-based Gamified Educational Paradigm, 2016-2020
  • Co-PI: NSF SfS, $2,170,960, Scholarship for Service, 2018-2023
  • Co-PI: NSF SfS, $1,808,585, Scholarship for Service, 2012-2018

Teaching

  • Distributed Systems and Network Security (Grad)
  • Applied Cryptography (Grad)
  • Quantum Computing and Cryptography (Ugrad/Grad)
  • Cryptography (Ugrad)
  • Introduction to Information Security (Ugrad)
  • Linux Security Administration (Ugrad)

Publications

Conferences

1. Dilanga, A., Bommanapally, V., Vadlla, S., Subramaniam, M., Chundi, P. and Parakh, A., Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game, To appear in proceedings of Games and Learning Alliance conference (GALA 2018), December 2018.

2. Parakh, A., and Subramaniam, M., Bootstrapped QKD: improving key rate and multiphoton resistance, SPIE Security + Defence: Quantum Technologies and Quantum Information Science, Berlin, September 10-13, 2018.

3. Parakh, A., Using fewer qubits to correct errors in three-state QKD protocol, SPIE Security + Defence: Quantum Technologies and Quantum Information Science, Berlin, September 10-13, 2018.

4. Parakh, A., Providing variable levels of security in quantum cryptography, SPIE Conference 10771: Quantum Communications and Quantum Imaging XVI, San Diego, August 20-22, 2018,

5. Bommanapally, V., Subramaniam, M., Chundi, P. and Parakh, A. (2018), Navigation Hints in Serious Games, Immersive Learning Research Network (iLRN 2018), June 25-29, Missoula, Montana.

6. Vadla, S., Parakh, A., Chundi, P. and Subramaniam, M. (2018) Colloquium for Information Systems Security Education (CISSE 2018), June 11-13, New Orleans, Louisiana.

7. Ostler, E., Parakh, A. and Subramaniam, M. (2018). QuaSim: The development of a virtual simulator for teaching topics in quantum cryptography, Society for Information Technology & Teacher Education International Conference, March 2018, Washington, D.C.

8. Noles, S. and Parakh, A., Position-Based Quantum Cryptography for Multi-located Prover and Single Verifier (poster), 7th International Conference on Quantum Cryptography (QCrypt 2017), Cambridge, UK September 18-22, 2017.

9. Poster and presentation on QuaSim: 3D virtual educator at CISSE 2017, Las Vegas.

10. McDermott, S., Vadla, S., Bommanapally, V., Parakh, A., Subramaniam, M. and Ostler, E. (2017) Teaching quantum cryptography using a virtual 3D educator: QuaSim, Proceedings of National Cyber Summit (NCS'17), Huntsville, AL, June 6-8, 2017.

11. Parakh, A., Subramaniam, M. and Ostler, E. (2017) QuaSim: A virtual quantum cryptography educator, Proceedings of 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE 2017, pages 600-605.

12. Joel vanBrandwijk, J. and Parakh, A. (2016) Simulating security of quantum protocols under channel error conditions, Proceedings of 6th International Workshop on Privacy, Security and Trust in Mobile and Wireless Systems, Hawaii, Aug 4, 2016.

13. Hefley, M. and Parakh, A. (2016) Cryptography website for education, Poster in The Colloquium of Information Systems Security Education (CISSE), Best Poster Award, Philadelphia.

14. Parakh, A. (2016) A new metric for understanding social networks, International Conference on CyberCrime and Computer Forensics, ICCCF 2016, Vancouver, 12-14 June, 2016.

15. Parakh, A. and Joel vanBrandwijk, J. (2016) Correcting rotational errors in three stage QKD, 23rd IEEE International Conference on Telecommunication (ICT 2016), Thessaloniki, Greece, May 16-18, 2016.

16. Parakh, A. and Joel vanBrandwijk, J. (2016) Rotational error correction in three stage QKD, Poster at IEEE Communication Theory Workshop (CTW 2016), Nafplio, Greece, May 15-18, 2016.

17. Leonora, G. and Parakh, A. (2016) Linear cryptanalysis of quasigroup block cipher. 11th Cyber and Information Security Research Conference, Oak Ridge, Tennessee, April 5-4, 2016.

18. Leonora, G. and Parakh, A. (2016) On linear cryptanalytic attack on quasigroup block cipher. Undergraduate Research Expo, University of Texas, Dallas, Feb, 2016.

19. Parakh, A. (2015) A new protocol for quantum public-key cryptography, IEEE International Conference on Advanced Networks and Telecommunications Systems, Dec 15-18, 2015.

20. Parakh, A. (2015) Quantifying the security of a QKD protocol, IEEE International Conference on Advanced Networks and Telecommunications Systems, Kolkata, Dec 15-18, 2015.

21. Parakh, A. (2015) Cheating resistant implicit security, In proceedings of 14th IEEE International Symposium on Network Computing and Applications (NCA 2015), Sept 28-30, 2015.

22. Mahoney, W. and Parakh, A. (2015) Towards a new quasigroup block cipher for a single-chip FPGA implementation. In Proceedings of 24th IEEE International Conference on Computer Communication and Networks (IEEE ICCCN 2015), pages 1-6, August 3-6, 2015, Las Vegas, NV.

23. Parakh, A. (2015) Quantum teleportation for key-less cryptography. Quantum information and computation XIII, 950005, SPIE 9500, DSS 2015.

24. Sayonnha, M. and Parakh, A. (2015) Implementing Diffie-Hellman key exchange using quantum EPR pairs. Quantum information and computation XIII, 950006, SPIE 9500, DSS 2015.

25. Subramaniam, P. and Parakh, A. (2014) Limits on detecting eavesdropper in QKD protocols. IEEE ANTS 2014, New Delhi, India.

26. Subramaniam, P. and Parakh, A. (2014) A quantum Diffie-Hellman protocol using commuting transformations. IEEE ANTS 2014, New Delhi, India.

27. Nelson, D. and Parakh, A. (2014) Quantum Cryptography: Opportunities and Challenges. 6th Central Area Networking and Security Workshop, Oct 25-26, 2014, Lawrence, KS.

28. Subramaniam, P. and Parakh, A. (2014). A quantum Diffie-Hellman protocol, In proceedings of the 11th IEEE Conference on Mobile Ad and Sensor Systems, (IEEE MASS 2014).

29. Mahoney, W., Parakh, A. and Battey, M. (2014) Hardware implementation of quasigroup encryption for SCADA networks, In Proceedings of the 13th International Symposium on Network Computing and Applications (IEEE NCA 14), pages 301-305, Aug 21-23, Cambridge, MA.

30. Parakh, A. and Verma, P. (2014) Improving the efficiency of entanglement based quantum key exchange, Proceedings of 23rd IEEE International Conference on Computer Communication and Networks (IEEE ICCCN 2014), pages 1-6, August 4-7, 2014, Shanghai, China.

31. Battey, M. and Parakh, A. (2014) Cryptanalysis of the quasigroup block cipher, Proceedings of the 52nd Annual ACM Southeast Conference, Kennesaw, GA.

32. Parakh, A. (2013). A quantum oblivious transfer protocol, Proceedings SPIE 8832, The Nature of Light: What are Photons? V, 883204 (October 1, 2013), San Diego, CA.

33. Parakh, A. and Mahoney, W. (2013). Privacy preserving computations using implicit security, Proceedings of 22nd International Conference on Computer Communication Networks (ICCCN’13), pages 1-6, Nassau, Bahamas.

34. Bonham-Carter, O., Parakh, A. and Bastola, D. (2013). sEncrypt: An encryption algorithm inspired from biological processes, Proceedings of 7th International Conference on Network and Systems, Madrid, Spain, June 3-4, 2013.

35. Battey, M., Parakh, A. and Mahoney, W. (2013). A new quasigroup based random number generator, Proceedings of the 2013 International Conference on Security and Management (SAM’13), Las Vegas, NV.

36. Parakh, A. (2012). Communication efficient oblivious transfer using elliptic curves, IEEE 14th International Symposium on High-Assurance Systems Engineering (IEEE HASE), pages 173-174, Oct 25-27, 2012.

37. Battey, M. and Parakh, A. (2012). Efficient quasigroup block cipher for sensor networks, 21st IEEE International Conference on Computer Communication Networks (IEEE ICCCN), pages 1-5, July 30-Aug 2, 2012.

38. Parakh, A. and Kak, S. (2011). Matrix based key agreement algorithms for sensor networks, 5th IEEE International Conference on Advanced Networks and Telecommunication Systems (IEEE ANTS), pages 1-3, Dec 18-21, 2011.

39. Godavarty, V. and Parakh, A. (2011). Using quasi-groups for encryption, Poster presentation at 2011 Nebraska Research and Innovation Conference, Nebraska EPSCoR, Omaha, NE.

40. Parakh, A. and Kak, S. (2010). Efficient key management in sensor networks, Globecom Workshop, pages 1539-1544.

41. Parakh, A. and Kak, S. (2010). A tree based recursive information hiding scheme, IEEE International Conference on Communications (IEEE ICC), pages 1-5.

42. Parakh, A. and Kak, S. (2009). A secure data storage scheme for sensor networks, Security and Privacy in Mobile Information and Communication Systems, Lecture Notes of the Institute of Computer Science, Social Informatics and Telecommunications Engineering, volume 17, pages 14-22.

43. Parakh, A. and Kak, S. (2009). Recursive secret sharing for distributed storage and information hiding, 3rd International Conference on Advanced Networks and Telecommunication Systems (IEEE ANTS), pages 1-3.

44. Parakh, A. and Kak, S. (2009). (Invited paper) A key distribution scheme for sensor networks using structured graphs, International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, pages 10-13.

45. Parakh, A. and Kak, S. (2009). Space efficient secret sharing, 4th Annual Computer Science Research Conference at the University of Oklahoma, April.

46. Parakh, A. and Kak, S. (2008). Internet voting protocol based on implicit data security, 17th IEEE International Conference on Computer, Communications and Networks (IEEE ICCCN), pages 1-4.

47. Parakh, A. (2006). A d-sequence based recursive random number generator, 8th International Symposium on System and Information Security, pages 1-5.

Journals

1. Ghersi, D., Parakh, A., and Mezei, M. (2017) Comparison of a quantum random number generator with pseudorandom number generators for their use in molecular Monte Carlo simulations. Journal of Computational Chemistry, volume 38, issue 31, pages 2713-2720.

2. Parakh, A. and Zhiwei Wang. (2017) Editorial for Special Issue on Challenges and Solutions in Mobile Systems Security, Computer and Electrical Engineering, volume 59, pages 201-203, Elsevier.

3. Parakh, A., Verma, P. and Subramaniam, M. (2016) Improving efficiency of quantum key distribution with probabilistic measurement, International Journal of Security and Networks, volume 11, no. 1/2, pages 37-47.

4. Subramaniam, P. and Parakh, A. (2016) A quantum Diffie-Hellman protocol, International Journal of Security and Networks, volume 11, no. 4, pages 213-223.

5. Parakh, A. and Kewei, S. (2016) Editorial for the Special Issue on Privacy, Security and Trust for Mobile and Wireless Systems, Inderscience, January 2016.

6. Parakh, A. and Kak, S. (2015) A new key agreement technique for sensor networks, Infocommunications Journal, volume VII, number 1, pages 15-21 March 2015.

7. Battey, M., Parakh, A. and Mahoney, W. (2015) Cryptanalysis and improvements of the quasigroup block cipher, Journal of Information Assurance and Security, volume 10, issue 1, pages 36-44.

8. Parakh, A. (2013) A probabilistic quantum key transfer protocol, Security and Communication Networks, volume 6, issue 11, pages 1389-1395, Wiley.

9. Battey, M. and Parakh, A. (2013) An efficient quasigroup block cipher, Wireless Personal Communications, volume 73, issue 1, pages 63-76, Springer.

10. Parakh, A. and Kak, S. (2012) A new small world lattice, Advanced Computing, Networking and Security, Lecture Notes in Computer Science (LNCS), volume 7135, pages 1-8, Springer.

11. Parakh, A. and Kak, S. (2011) Space efficient secret sharing for implicit data security, Information Sciences, volume 181, issue 2, pages 334-341.

12. Parakh, A. and Kak, S. (2010) Internet voting protocol based on improved implicit security, Cryptologia, volume 34, issue 3, pages 258-268.

13. Parakh, A. and Kak, S. (2010) Challenges facing electronic voting, Seminar: the Monthly Symposium, No. 609, May.

14. Parakh, A. and Kak, S. (2009) Online data storage using implicit security, Information Science, volume 179, issue 19, pages 3323-3331.

15. Parakh, A. (2008) Oblivious transfer based on key exchange, Cryptologia, volume 32, issue 1, pages 37-44.

16. Parakh, A. and Kak, S. (2007) How to improve security in electronic voting? ACM Ubiquity, volume 8, issue 6, February.

17. Parakh, A. (2007) Oblivious transfer using elliptic curves, Cryptologia, volume 31, issue 2, pages 125-132.

18. Parakh, A. (2007) Aryabhata’s root extraction methods, Indian Journal of History of Science, volume 42, issue 2, pages 149-161.