Dario Catalano

From MaRDI portal
Person:500978

Available identifiers

zbMath Open catalano.darioMaRDI QIDQ500978

List of research outcomes

PublicationDate of PublicationType
Adaptively Secure Single Secret Leader Election from DDH2024-03-26Paper
Efficient and universally composable single secret leader election from pairings2023-11-24Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Inner-product functional encryption with fine-grained access control2023-03-29Paper
Double-authentication-preventing signatures in the standard model2022-12-16Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security2022-11-17Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data2022-08-25Paper
Bandwidth-efficient threshold EC-DSA2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)2021-12-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations2020-03-09Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality2020-01-28Paper
Verifiable pattern matching on outsourced texts2019-01-04Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions2018-09-06Paper
On the security notions for homomorphic signatures2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption2017-11-03Paper
Zero-Knowledge Sets With Short Proofs2017-07-27Paper
Verifiable Pattern Matching on Outsourced Texts2016-10-21Paper
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
Authenticating Computation on Groups: New Homomorphic Primitives and Applications2015-01-06Paper
Homomorphic Signatures and Message Authentication Codes2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions2014-09-25Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
Practical Homomorphic MACs for Arithmetic Circuits2013-05-31Paper
Vector Commitments and Their Applications2013-04-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
Efficient Network Coding Signatures in the Standard Model2012-07-20Paper
Adaptive Pseudo-free Groups and Applications2011-05-27Paper
Wildcarded identity-based encryption2011-04-01Paper
Coercion-Resistant Electronic Elections2010-06-17Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness2009-07-07Paper
Hybrid commitments and their applications to zero-knowledge proof systems2009-06-22Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions2009-06-08Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Verifiable Random Functions from Identity-Based Key Encapsulation2009-05-12Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework2008-04-24Paper
Zero-Knowledge Sets with Short Proofs2008-04-15Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions2008-03-17Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper
Identity-Based Encryption Gone Wild2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring2007-02-26Paper
Theory of Cryptography2007-02-12Paper
https://portal.mardi4nfdi.de/entity/Q54890582006-09-25Paper
https://portal.mardi4nfdi.de/entity/Q33749092006-03-01Paper
Automata, Languages and Programming2006-01-10Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Contemporary cryptology.2005-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm2003-07-16Paper
Paillier's trapdoor function hides up to \(O(n)\) bits2003-03-25Paper
https://portal.mardi4nfdi.de/entity/Q27788522002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27289052001-11-04Paper
New efficient and secure protocols for verifiable signature sharing and other applications2001-06-10Paper
https://portal.mardi4nfdi.de/entity/Q42493242000-03-09Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Dario Catalano