Dario Fiore

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fully-succinct multi-key homomorphic signatures from standard assumptions2024-12-13Paper
Witness encryption for succinct functional commitments and applications2024-11-12Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees2024-11-12Paper
Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces2024-09-13Paper
Chainable functional commitments for unbounded-depth circuits2024-08-02Paper
From polynomial IOP and commitments to non-malleable zkSNARKs2024-08-02Paper
Adaptively Secure Single Secret Leader Election from DDH
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Extendable threshold ring signatures with enhanced anonymity
Lecture Notes in Computer Science
2023-11-24Paper
Efficient and universally composable single secret leader election from pairings
Lecture Notes in Computer Science
2023-11-24Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular
Designs, Codes and Cryptography
2023-11-07Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups
Theory of Cryptography
2023-08-14Paper
Verifiable Computation and Succinct Arguments for NP
Asymmetric Cryptography
2023-08-04Paper
Ring signatures with user-controlled linkability
Computer Security – ESORICS 2022
2023-07-28Paper
Inner product functional commitments with constant-size public parameters and openings
Lecture Notes in Computer Science
2023-07-25Paper
\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
Lecture Notes in Computer Science
2023-05-12Paper
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage2023-03-21Paper
Progressive and efficient verification for digital signatures2022-11-09Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data2022-08-25Paper
Subversion-resilient enhanced privacy ID2022-07-06Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular2022-06-17Paper
Flexible and efficient verifiable computation on encrypted data2021-12-21Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)2021-12-01Paper
Unilaterally-authenticated key exchange
Financial Cryptography and Data Security
2021-03-17Paper
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption2021-02-23Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
Automated analysis of cryptographic assumptions in generic group models
Journal of Cryptology
2019-06-20Paper
Matrioska: a compiler for multi-key homomorphic signatures2018-10-17Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
Designs, Codes and Cryptography
2018-09-06Paper
On the security notions for homomorphic signatures2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits
Journal of Cryptology
2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption2017-11-03Paper
Zero-Knowledge Sets With Short Proofs
IEEE Transactions on Information Theory
2017-07-27Paper
Multi-key Homomorphic Authenticators
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
On the (in)security of SNARKs in the presence of oracles
Theory of Cryptography
2016-12-21Paper
Nearly optimal verifiable data streaming
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
Lecture Notes in Computer Science
2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications
Theoretical Computer Science
2015-10-08Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Lecture Notes in Computer Science
2015-08-27Paper
Privacy-preserving accountable computation
Lecture Notes in Computer Science
2014-10-16Paper
Interactive encryption and message authentication
Lecture Notes in Computer Science
2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions
Journal of Cryptology
2014-09-25Paper
Homomorphic signatures with efficient verification for polynomial functions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Automated analysis of cryptographic assumptions in generic group models
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Generalizing homomorphic MACs for arithmetic circuits
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Practical homomorphic MACs for arithmetic circuits
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Vector commitments and their applications
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Algebraic (Trapdoor) one-way functions and their applications
Theory of Cryptography
2013-03-18Paper
Efficient network coding signatures in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
From selective to full security: semi-generic transformations in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
Theory of Cryptography
2012-06-15Paper
Adaptive pseudo-free groups and applications
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Lecture Notes in Computer Science
2010-11-26Paper
Making the Diffie-Hellman Protocol Identity-Based
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Verifiable Random Functions from Identity-Based Key Encapsulation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Zero-Knowledge Sets with Short Proofs
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper


Research outcomes over time


This page was built for person: Dario Fiore