Rosario Gennaro

From MaRDI portal
Person:290377

Available identifiers

zbMath Open gennaro.rosarioMaRDI QIDQ290377

List of research outcomes





PublicationDate of PublicationType
\textsf{Testudo}: linear time prover SNARKs with constant size proofs and square root size universal setup2024-10-16Paper
Witness-authenticated key exchange, revisited: extensions to groups, improved models, simpler constructions2024-07-17Paper
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin2021-03-17Paper
On the cryptographic deniability of the Signal protocol2021-02-23Paper
Publicly evaluatable perceptual hashing2021-02-23Paper
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security2020-03-02Paper
Fine-grained secure computation2018-12-06Paper
Homomorphic secret sharing from Paillier encryption2018-11-07Paper
Efficient rational proofs for space bounded computations2017-10-27Paper
Achieving independence efficiently and securely2017-09-29Paper
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security2016-10-04Paper
Automata evaluation and text search protocols with simulation-based security2016-06-01Paper
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography2016-03-02Paper
Sequentially Composable Rational Proofs2015-12-11Paper
Robust and Efficient Sharing of RSA Functions2015-11-11Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
The round complexity of verifiable secret sharing and secure multicast2015-02-27Paper
Robust Threshold DSS Signatures2014-08-20Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption2014-01-17Paper
Fully Homomorphic Message Authenticators2013-12-10Paper
Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields2013-09-17Paper
Quadratic Span Programs and Succinct NIZKs without PCPs2013-05-31Paper
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions2013-03-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
Computational Extractors and Pseudorandomness2012-06-15Paper
Verifiable Delegation of Computation over Large Datasets2011-08-12Paper
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement2010-11-26Paper
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers2010-08-24Paper
Lower bounds on the efficiency of encryption and digital signature schemes2010-08-16Paper
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead2010-07-06Paper
Secure Network Coding over the Integers2010-05-28Paper
Text Search Protocols with Simulation Based Security2010-05-28Paper
Making the Diffie-Hellman Protocol Identity-Based2010-03-16Paper
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack2010-03-01Paper
Secure multiplication of shared secrets in the exponent2009-12-18Paper
More on Key Wrapping2009-12-09Paper
New approaches for deniable authentication2009-11-13Paper
Theory of Cryptography2009-05-14Paper
Foundations of Security Analysis and Design II2009-05-14Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM2008-05-06Paper
Tag-KEM/DEM: A new framework for hybrid encryption2008-04-16Paper
Threshold RSA for Dynamic and Ad-Hoc Groups2008-04-15Paper
Faster and Shorter Password-Authenticated Key Exchange2008-03-05Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Independent Zero-Knowledge Sets2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures2007-09-04Paper
Secure distributed key generation for discrete-log based cryptosystems2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring2007-02-26Paper
Provably secure threshold password-authenticated key exchange2006-10-05Paper
https://portal.mardi4nfdi.de/entity/Q33749092006-03-01Paper
An improved pseudo-random generator based on the discrete logarithm problem2006-02-08Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions2005-10-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q47372322004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348972003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348962003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185502003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44091172003-06-30Paper
Paillier's trapdoor function hides up to \(O(n)\) bits2003-03-25Paper
https://portal.mardi4nfdi.de/entity/Q47977882003-03-09Paper
Robust threshold DSS signatures2003-01-14Paper
How to sign digital streams2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45368192002-08-06Paper
Securing threshold cryptosystems against chosen ciphertext attack2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27788522002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27572412001-11-25Paper
New efficient and secure protocols for verifiable signature sharing and other applications2001-06-10Paper
RSA-based undeniable signatures2000-12-21Paper
Secure distributed storage and retrieval2000-08-21Paper
https://portal.mardi4nfdi.de/entity/Q49418502000-07-19Paper
https://portal.mardi4nfdi.de/entity/Q42493242000-03-09Paper
https://portal.mardi4nfdi.de/entity/Q42507692000-03-07Paper
Robust and efficient sharing of RSA functions.2000-01-01Paper
Securing threshold cryptosystems against chosen ciphertext attack1999-09-09Paper
Secure Hash-and-Sign Signatures Without the Random Oracle1999-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38387731998-08-13Paper
https://portal.mardi4nfdi.de/entity/Q43645471998-05-12Paper
https://portal.mardi4nfdi.de/entity/Q43645511998-03-17Paper

Research outcomes over time

This page was built for person: Rosario Gennaro