Aggelos Kiayias

From MaRDI portal
Person:357116

Available identifiers

zbMath Open kiayias.aggelosMaRDI QIDQ357116

List of research outcomes

PublicationDate of PublicationType
Permissionless clock synchronization with public setup2023-08-14Paper
Decentralizing information technology: the advent of resource based systems2023-07-28Paper
Watermarkable public key encryption with efficient extraction under standard assumptions2023-07-25Paper
Ofelimos: combinatorial optimization via proof-of-useful-work. A provably secure blockchain protocol2023-06-28Paper
Crowd verifiable zero-knowledge and end-to-end verifiable multiparty computation2023-03-29Paper
Account management in proof of stake ledgers2022-12-16Paper
Making Any Identity-Based Encryption Accountable, Efficiently2022-08-19Paper
SoK: communication across distributed ledgers2022-06-22Paper
Efficient state management in distributed ledgers2022-06-22Paper
Fast isomorphic state channels2022-06-22Paper
Multi-instance publicly verifiable time-lock puzzle and its applications2022-06-22Paper
Mining for privacy: how to bootstrap a snarky blockchain2022-06-17Paper
Composition with knowledge assumptions2022-05-18Paper
Resource-restricted cryptography: revisiting MPC bounds in the proof-of-work era2022-03-23Paper
Dynamic ad hoc clock synchronization2021-12-08Paper
Blockchains from non-idealized hash functions2021-12-01Paper
Ledger combiners for fast settlement2021-12-01Paper
Timed signatures and zero-knowledge proofs -- timestamping in the blockchain era2021-02-23Paper
Proof-of-burn2021-02-08Paper
The Combinatorics of the Longest-Chain Rule: Linear Consistency for Proof-of-Stake Blockchains2021-02-02Paper
Smart Contract Derivatives2021-02-02Paper
One-shot signatures and applications to hybrid quantum/classical authentication2021-01-19Paper
SoK: a consensus taxonomy in the blockchain era2020-08-05Paper
Consensus from signatures of work2020-08-05Paper
Non-malleable codes for partial functions with manipulation detection2020-06-30Paper
Compact Storage of Superblocks for NIPoPoW Applications2020-06-29Paper
On trees, chains and fast transactions in the blockchain2020-03-02Paper
The combinatorics of hidden diversity2020-02-20Paper
A universally composable framework for the privacy of email ecosystems2019-01-23Paper
Secure outsourcing of cryptographic circuits manufacturing2018-11-07Paper
Graded signatures2018-10-18Paper
Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications2018-10-18Paper
On the security properties of e-voting bulletin boards2018-10-17Paper
Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain2018-07-09Paper
Bootstrapping the blockchain, with applications to consensus and fast PKI setup2018-05-29Paper
The Bitcoin backbone protocol with chains of variable difficulty2017-11-03Paper
Ouroboros: a provably secure proof-of-stake blockchain protocol2017-11-03Paper
Ceremonies for End-to-End Verifiable Elections2017-06-13Paper
Resource-based corruptions and the combinatorics of hidden diversity2017-05-16Paper
Indistinguishable Proofs of Work or Knowledge2017-01-06Paper
Fair and Robust Multi-party Computation Using a Global Transaction Ledger2016-07-15Paper
Communication Optimal Tardos-Based Asymmetric Fingerprinting2016-03-02Paper
The Bitcoin Backbone Protocol: Analysis and Applications2015-09-30Paper
End-to-End Verifiable Elections in the Standard Model2015-09-30Paper
Scalable public-key tracing and revoking2015-09-04Paper
Distributing the setup in universally composable multi-party computation2015-09-03Paper
A Little Honesty Goes a Long Way2015-07-06Paper
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model2015-01-06Paper
Efficient Proofs of Secure Erasure2014-10-14Paper
A one-time stegosystem and applications to efficient covert communication2014-04-01Paper
Solving the at-most-once problem with nearly optimal effectiveness2014-01-10Paper
Tamper Resilient Circuits: The Adversary at the Gates2013-12-10Paper
Encryption for digital content2013-07-29Paper
Scalable public-key tracing and revoking2013-06-07Paper
The Strong At-Most-Once Problem2013-03-13Paper
BiTR: Built-in Tamper Resilience2011-12-02Paper
On the Effects of Pirate Evolution on the Design of Digital Content Distribution Systems2011-06-08Paper
https://portal.mardi4nfdi.de/entity/Q30011252011-05-31Paper
Breaking and Repairing Asymmetric Public-Key Traitor Tracing2011-03-18Paper
Improving the Round Complexity of Traitor Tracing Schemes2010-07-06Paper
The Vector-Ballot Approach for Online Voting Procedures2010-06-17Paper
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate2010-05-28Paper
Computer Aided Verification2010-03-31Paper
At-Most-Once Semantics in Asynchronous Shared Memory2009-11-19Paper
Secure Function Collection with Sublinear Storage2009-07-14Paper
On the Portability of Generalized Schnorr Proofs2009-05-12Paper
Zero-Knowledge Proofs with Witness Elimination2009-03-24Paper
Pirate Evolution: How to Make the Most of Your Traitor Keys2009-03-10Paper
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes2009-02-24Paper
Concurrent Blind Signatures Without Random Oracles2008-11-27Paper
Privacy Preserving Data Mining within Anonymous Credential Systems2008-11-20Paper
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination2008-09-09Paper
Group Encryption2008-05-15Paper
Group Signatures with Efficient Concurrent Join2008-05-06Paper
Equivocal Blind Signatures and Adaptive UC-Security2008-03-05Paper
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice2007-09-20Paper
Decoding interleaved Reed-Solomon codes over noisy channels2007-07-16Paper
Applied Cryptography and Network Security2007-05-02Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Automata, Languages and Programming2006-01-10Paper
Financial Cryptography and Data Security2005-12-22Paper
Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice2005-08-12Paper
Financial Cryptography2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q47371602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372632004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47389362004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439332004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44491672004-02-08Paper
https://portal.mardi4nfdi.de/entity/Q44349032003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44150642003-07-28Paper
https://portal.mardi4nfdi.de/entity/Q47837202002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q45350742002-06-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Aggelos Kiayias