Dario Catalano

From MaRDI portal
Person:500978

Available identifiers

zbMath Open catalano.darioMaRDI QIDQ500978

List of research outcomes





PublicationDate of PublicationType
Limits of black-box anamorphic encryption2024-12-04Paper
Anamorphic encryption: new constructions and homomorphic realizations2024-11-12Paper
Chainable functional commitments for unbounded-depth circuits2024-08-02Paper
Adaptively Secure Single Secret Leader Election from DDH2024-03-26Paper
Efficient and universally composable single secret leader election from pairings2023-11-24Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Inner-product functional encryption with fine-grained access control2023-03-29Paper
Double-authentication-preventing signatures in the standard model2022-12-16Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security2022-11-17Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data2022-08-25Paper
Bandwidth-efficient threshold EC-DSA2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)2021-12-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations2020-03-09Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality2020-01-28Paper
Verifiable pattern matching on outsourced texts2019-01-04Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions2018-09-06Paper
On the security notions for homomorphic signatures2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption2017-11-03Paper
Zero-Knowledge Sets With Short Proofs2017-07-27Paper
Verifiable Pattern Matching on Outsourced Texts2016-10-21Paper
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
Authenticating Computation on Groups: New Homomorphic Primitives and Applications2015-01-06Paper
Homomorphic Signatures and Message Authentication Codes2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions2014-09-25Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
Practical Homomorphic MACs for Arithmetic Circuits2013-05-31Paper
Vector Commitments and Their Applications2013-04-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
Efficient Network Coding Signatures in the Standard Model2012-07-20Paper
Adaptive Pseudo-free Groups and Applications2011-05-27Paper
Wildcarded identity-based encryption2011-04-01Paper
Coercion-resistant electronic elections2010-06-17Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness2009-07-07Paper
Hybrid commitments and their applications to zero-knowledge proof systems2009-06-22Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions2009-06-08Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Verifiable Random Functions from Identity-Based Key Encapsulation2009-05-12Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework2008-04-24Paper
Zero-Knowledge Sets with Short Proofs2008-04-15Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions2008-03-17Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper
Identity-Based Encryption Gone Wild2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring2007-02-26Paper
Theory of Cryptography2007-02-12Paper
https://portal.mardi4nfdi.de/entity/Q54890582006-09-25Paper
Computing inverses over a shared secret modulus2006-03-01Paper
Automata, Languages and Programming2006-01-10Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Contemporary cryptology.2005-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm2003-07-16Paper
Paillier's trapdoor function hides up to \(O(n)\) bits2003-03-25Paper
https://portal.mardi4nfdi.de/entity/Q27788522002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27289052001-11-04Paper
New efficient and secure protocols for verifiable signature sharing and other applications2001-06-10Paper
https://portal.mardi4nfdi.de/entity/Q42493242000-03-09Paper

Research outcomes over time

This page was built for person: Dario Catalano