Rosario Gennaro

From MaRDI portal
(Redirected from Person:290377)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
\textsf{Testudo}: linear time prover SNARKs with constant size proofs and square root size universal setup2024-10-16Paper
Witness-authenticated key exchange, revisited: extensions to groups, improved models, simpler constructions2024-07-17Paper
On the impossibility of algebraic vector commitments in pairing-free groups
Theory of Cryptography
2023-08-14Paper
Escrow protocols for cryptocurrencies: how to buy physical goods using Bitcoin
Financial Cryptography and Data Security
2021-03-17Paper
On the cryptographic deniability of the Signal protocol2021-02-23Paper
Publicly evaluatable perceptual hashing2021-02-23Paper
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security2020-03-02Paper
Fine-grained secure computation2018-12-06Paper
Homomorphic secret sharing from Paillier encryption2018-11-07Paper
Efficient rational proofs for space bounded computations2017-10-27Paper
Achieving independence efficiently and securely
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95
2017-09-29Paper
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security
Applied Cryptography and Network Security
2016-10-04Paper
Automata evaluation and text search protocols with simulation-based security
Journal of Cryptology
2016-06-01Paper
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98
2016-03-02Paper
Sequentially composable rational proofs
Lecture Notes in Computer Science
2015-12-11Paper
Robust and efficient sharing of RSA functions
Advances in Cryptology — CRYPTO ’96
2015-11-11Paper
Algebraic (trapdoor) one-way functions: constructions and applications
Theoretical Computer Science
2015-10-08Paper
The round complexity of verifiable secret sharing and secure multicast
Proceedings of the thirty-third annual ACM symposium on Theory of computing
2015-02-27Paper
Robust threshold DSS signatures
Advances in Cryptology — EUROCRYPT ’96
2014-08-20Paper
Generalizing homomorphic MACs for arithmetic circuits
Public-Key Cryptography – PKC 2014
2014-03-25Paper
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
Cryptography and Coding
2014-01-17Paper
Fully homomorphic message authenticators
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Hard-core predicates for a Diffie-Hellman problem over finite fields
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Quadratic span programs and succinct NIZKs without PCPs
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Algebraic (Trapdoor) one-way functions and their applications
Theory of Cryptography
2013-03-18Paper
Computational extractors and pseudorandomness
Theory of Cryptography
2012-06-15Paper
Verifiable delegation of computation over large datasets
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Lecture Notes in Computer Science
2010-11-26Paper
Non-interactive verifiable computing: outsourcing computation to untrusted workers
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Lower bounds on the efficiency of encryption and digital signature schemes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
2010-08-16Paper
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
Applied Cryptography and Network Security
2010-07-06Paper
Secure network coding over the integers
Public Key Cryptography – PKC 2010
2010-05-28Paper
Text search protocols with simulation based security
Public Key Cryptography – PKC 2010
2010-05-28Paper
Making the Diffie-Hellman Protocol Identity-Based
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
Journal of Cryptology
2010-03-01Paper
Secure multiplication of shared secrets in the exponent
Information Processing Letters
2009-12-18Paper
More on key wrapping
Selected Areas in Cryptography
2009-12-09Paper
New approaches for deniable authentication
Journal of Cryptology
2009-11-13Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Foundations of Security Analysis and Design II
Lecture Notes in Computer Science
2009-05-14Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
Lecture Notes in Computer Science
2008-05-06Paper
Tag-KEM/DEM: A new framework for hybrid encryption
Journal of Cryptology
2008-04-16Paper
Threshold RSA for Dynamic and Ad-Hoc Groups
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Faster and Shorter Password-Authenticated Key Exchange
Theory of Cryptography
2008-03-05Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Independent Zero-Knowledge Sets
Automata, Languages and Programming
2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Secure distributed key generation for discrete-log based cryptosystems
Journal of Cryptology
2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
2007-02-26Paper
Provably secure threshold password-authenticated key exchange
Journal of Computer and System Sciences
2006-10-05Paper
Computing inverses over a shared secret modulus2006-03-01Paper
An improved pseudo-random generator based on the discrete logarithm problem
Journal of Cryptology
2006-02-08Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Bounds on the Efficiency of Generic Cryptographic Constructions
SIAM Journal on Computing
2005-10-28Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
scientific article; zbMATH DE number 2086695 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2009978 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 2009977 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1962164 (Why is no real title available?)2003-08-10Paper
scientific article; zbMATH DE number 1942420 (Why is no real title available?)2003-06-30Paper
Paillier's trapdoor function hides up to \(O(n)\) bits
Journal of Cryptology
2003-03-25Paper
scientific article; zbMATH DE number 1878326 (Why is no real title available?)2003-03-09Paper
Robust threshold DSS signatures
Information and Computation
2003-01-14Paper
How to sign digital streams
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1759796 (Why is no real title available?)2002-08-06Paper
Securing threshold cryptosystems against chosen ciphertext attack
Journal of Cryptology
2002-06-27Paper
scientific article; zbMATH DE number 1722681 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1676641 (Why is no real title available?)2001-11-25Paper
New efficient and secure protocols for verifiable signature sharing and other applications
Journal of Computer and System Sciences
2001-06-10Paper
RSA-based undeniable signatures
Journal of Cryptology
2000-12-21Paper
Secure distributed storage and retrieval
Theoretical Computer Science
2000-08-21Paper
scientific article; zbMATH DE number 1418290 (Why is no real title available?)2000-07-19Paper
scientific article; zbMATH DE number 1302841 (Why is no real title available?)2000-03-09Paper
scientific article; zbMATH DE number 1304079 (Why is no real title available?)2000-03-07Paper
Robust and efficient sharing of RSA functions.
Journal of Cryptology
2000-01-01Paper
Securing threshold cryptosystems against chosen ciphertext attack
Lecture Notes in Computer Science
1999-09-09Paper
Secure Hash-and-Sign Signatures Without the Random Oracle
Advances in Cryptology — EUROCRYPT ’99
1999-01-01Paper
scientific article; zbMATH DE number 1189071 (Why is no real title available?)1998-08-13Paper
scientific article; zbMATH DE number 1088231 (Why is no real title available?)1998-05-12Paper
scientific article; zbMATH DE number 1088234 (Why is no real title available?)1998-03-17Paper


Research outcomes over time


This page was built for person: Rosario Gennaro