Giulio Malavolta

From MaRDI portal
Person:1703917



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Polynomial commitments from lattices: post-quantum security, fast verification and transparent setup2025-01-10Paper
Exponential quantum one-wayness and EFI pairs2025-01-10Paper
Time-lock puzzles from lattices2024-12-13Paper
Robust quantum public-key encryption with applications to quantum key distribution2024-12-13Paper
Software with certified deletion2024-11-13Paper
Time-lock puzzles with efficient batch solving2024-11-12Paper
Registered (inner-product) functional encryption2024-09-13Paper
Distributed broadcast encryption from bilinear groups2024-09-13Paper
Two-round concurrent 2PC from sub-exponential LWE2024-08-30Paper
Weakening assumptions for publicly-verifiable deletion2024-08-15Paper
Public-key encryption with quantum keys2024-08-15Paper
Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors
Journal of Cryptology
2024-07-10Paper
Weak zero-knowledge via the Goldreich-Levin theorem2024-06-26Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices2024-06-24Paper
stoRNA: stateless transparent proofs of storage-time2024-06-19Paper
scientific article; zbMATH DE number 7829234 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829236 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829247 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
Interaction-preserving compilers for secure computation2024-04-09Paper
On concurrent multi-party quantum computation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Lattice-based timed cryptography
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Lattice-based succinct arguments from vanishing polynomials (extended abstract)
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Algebraic restriction codes and their applications
Algorithmica
2023-12-13Paper
Efficient laconic cryptography from learning with errors
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Multi-key and multi-input predicate encryption from learning with errors
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Transparent batchable time-lock puzzles and applications to Byzantine consensus
Lecture Notes in Computer Science
2023-11-24Paper
Laconic function evaluation for Turing machines
Lecture Notes in Computer Science
2023-11-16Paper
Candidate trapdoor claw-free functions from group actions with applications to quantum protocols
Theory of Cryptography
2023-08-14Paper
Quantum rewinding for many-round protocols
Theory of Cryptography
2023-08-14Paper
Steganography-free zero-knowledge
Theory of Cryptography
2023-08-14Paper
A note on the post-quantum security of (ring) signatures
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Subset predicate encryption and its applications
Cryptology and Network Security
2023-08-02Paper
Candidate iO from homomorphic encryption schemes
Journal of Cryptology
2023-07-26Paper
Succinct classical verification of quantum computation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Succinct classical verification of quantum computation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Lattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
How to build a trapdoor function from an encryption scheme
Lecture Notes in Computer Science
2023-05-12Paper
The round complexity of quantum zero-knowledge2023-03-31Paper
Rate-1 quantum fully homomorphic encryption2023-03-31Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
Multi-client oblivious RAM with poly-logarithmic communication2023-03-21Paper
A combinatorial approach to quantum random functions2023-03-21Paper
Tight verifiable delay functions2022-12-16Paper
Arithmetic garbling from bilinear maps2022-08-25Paper
Everlasting UC commitments from fully malicious PUFs
Journal of Cryptology
2022-07-15Paper
Maliciously secure multi-client ORAM2022-07-01Paper
Compact ring signatures from learning with errors2022-03-31Paper
A geometric approach to homomorphic secret sharing2021-12-21Paper
Post-quantum multi-party computation
(available as arXiv preprint)
2021-12-08Paper
Unbounded multi-party computation from learning with errors2021-12-08Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
Multi-key fully-homomorphic encryption in the plain model2021-12-01Paper
Minting mechanism for proof of stake blockchains2021-02-23Paper
Subvector commitments with application to succinct arguments2020-05-20Paper
Homomorphic time-lock puzzles and applications2020-05-20Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Trapdoor hash functions and their applications2020-03-09Paper
Incremental proofs of sequential work2020-02-06Paper
Efficient invisible and unlinkable sanitizable signatures2020-01-28Paper
Homomorphic secret sharing for low degree polynomials2019-01-23Paper
Efficient ring signatures in the standard model2018-03-08Paper
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
Public-Key Cryptography – PKC 2016
2016-04-13Paper


Research outcomes over time


This page was built for person: Giulio Malavolta