Giulio Malavolta

From MaRDI portal
Person:1703917

Available identifiers

zbMath Open malavolta.giulioMaRDI QIDQ1703917

List of research outcomes





PublicationDate of PublicationType
Polynomial commitments from lattices: post-quantum security, fast verification and transparent setup2025-01-10Paper
Exponential quantum one-wayness and EFI pairs2025-01-10Paper
Time-lock puzzles from lattices2024-12-13Paper
Robust quantum public-key encryption with applications to quantum key distribution2024-12-13Paper
Software with certified deletion2024-11-13Paper
Time-lock puzzles with efficient batch solving2024-11-12Paper
Registered (inner-product) functional encryption2024-09-13Paper
Distributed broadcast encryption from bilinear groups2024-09-13Paper
Two-round concurrent 2PC from sub-exponential LWE2024-08-30Paper
Weakening assumptions for publicly-verifiable deletion2024-08-15Paper
Public-key encryption with quantum keys2024-08-15Paper
Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors2024-07-10Paper
Weak zero-knowledge via the Goldreich-Levin theorem2024-06-26Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices2024-06-24Paper
stoRNA: stateless transparent proofs of storage-time2024-06-19Paper
https://portal.mardi4nfdi.de/entity/Q61262222024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61262252024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61262392024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61262902024-04-09Paper
On concurrent multi-party quantum computation2024-02-06Paper
Lattice-based timed cryptography2024-02-06Paper
Lattice-based succinct arguments from vanishing polynomials (extended abstract)2024-02-02Paper
Algebraic restriction codes and their applications2023-12-13Paper
Efficient laconic cryptography from learning with errors2023-12-12Paper
Multi-key and multi-input predicate encryption from learning with errors2023-12-12Paper
Transparent batchable time-lock puzzles and applications to Byzantine consensus2023-11-24Paper
Laconic function evaluation for Turing machines2023-11-16Paper
Candidate trapdoor claw-free functions from group actions with applications to quantum protocols2023-08-14Paper
Quantum rewinding for many-round protocols2023-08-14Paper
Steganography-free zero-knowledge2023-08-14Paper
A note on the post-quantum security of (ring) signatures2023-08-10Paper
Subset predicate encryption and its applications2023-08-02Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
Succinct classical verification of quantum computation2023-06-28Paper
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)2023-06-28Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
The round complexity of quantum zero-knowledge2023-03-31Paper
Rate-1 quantum fully homomorphic encryption2023-03-31Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
Multi-client oblivious RAM with poly-logarithmic communication2023-03-21Paper
A combinatorial approach to quantum random functions2023-03-21Paper
Tight verifiable delay functions2022-12-16Paper
Arithmetic garbling from bilinear maps2022-08-25Paper
Everlasting UC commitments from fully malicious PUFs2022-07-15Paper
Maliciously Secure Multi-Client ORAM2022-07-01Paper
Compact ring signatures from learning with errors2022-03-31Paper
A geometric approach to homomorphic secret sharing2021-12-21Paper
Post-quantum multi-party computation2021-12-08Paper
Unbounded multi-party computation from learning with errors2021-12-08Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
Multi-key fully-homomorphic encryption in the plain model2021-12-01Paper
Minting mechanism for proof of stake blockchains2021-02-23Paper
Subvector commitments with application to succinct arguments2020-05-20Paper
Homomorphic time-lock puzzles and applications2020-05-20Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Trapdoor hash functions and their applications2020-03-09Paper
Incremental proofs of sequential work2020-02-06Paper
Efficient invisible and unlinkable sanitizable signatures2020-01-28Paper
Homomorphic secret sharing for low degree polynomials2019-01-23Paper
Efficient ring signatures in the standard model2018-03-08Paper
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys2016-04-13Paper

Research outcomes over time

This page was built for person: Giulio Malavolta