Dario Catalano

From MaRDI portal
Person:500978


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Limits of black-box anamorphic encryption
 
2024-12-04Paper
Anamorphic encryption: new constructions and homomorphic realizations
 
2024-11-12Paper
Chainable functional commitments for unbounded-depth circuits
 
2024-08-02Paper
Adaptively Secure Single Secret Leader Election from DDH
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Efficient and universally composable single secret leader election from pairings
Lecture Notes in Computer Science
2023-11-24Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups
Theory of Cryptography
2023-08-14Paper
Inner-product functional encryption with fine-grained access control
 
2023-03-29Paper
Double-authentication-preventing signatures in the standard model
 
2022-12-16Paper
Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security
Theoretical Computer Science
2022-11-17Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data
 
2022-08-25Paper
Bandwidth-efficient threshold EC-DSA
 
2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)
 
2021-12-01Paper
Two-party ECDSA from hash proof systems and efficient instantiations
 
2020-03-09Paper
Efficient function-hiding functional encryption: from inner-products to orthogonality
 
2020-01-28Paper
Verifiable pattern matching on outsourced texts
Journal of Discrete Algorithms
2019-01-04Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings
 
2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
Designs, Codes and Cryptography
2018-09-06Paper
On the security notions for homomorphic signatures
 
2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits
Journal of Cryptology
2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption
 
2017-11-03Paper
Zero-Knowledge Sets With Short Proofs
IEEE Transactions on Information Theory
2017-07-27Paper
Verifiable pattern matching on outsourced texts
Lecture Notes in Computer Science
2016-10-21Paper
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
Lecture Notes in Computer Science
2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications
Theoretical Computer Science
2015-10-08Paper
Authenticating computation on groups: new homomorphic primitives and applications
Lecture Notes in Computer Science
2015-01-06Paper
Homomorphic signatures and message authentication codes
Lecture Notes in Computer Science
2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions
Journal of Cryptology
2014-09-25Paper
Homomorphic signatures with efficient verification for polynomial functions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Generalizing homomorphic MACs for arithmetic circuits
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Practical homomorphic MACs for arithmetic circuits
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Vector commitments and their applications
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Algebraic (Trapdoor) one-way functions and their applications
Theory of Cryptography
2013-03-18Paper
Efficient network coding signatures in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Adaptive pseudo-free groups and applications
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Wildcarded identity-based encryption
Journal of Cryptology
2011-04-01Paper
Coercion-resistant electronic elections
Towards Trustworthy Elections
2010-06-17Paper
A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications
Lecture Notes in Computer Science
2010-01-05Paper
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Hybrid commitments and their applications to zero-knowledge proof systems
Theoretical Computer Science
2009-06-22Paper
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
Journal of Cryptology
2009-06-08Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Verifiable Random Functions from Identity-Based Key Encapsulation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Zero-Knowledge Sets with Short Proofs
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Identity-Based Encryption Gone Wild
Automata, Languages and Programming
2007-09-11Paper
Improved On-Line/Off-Line Threshold Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication
Journal of Cryptology
2007-05-24Paper
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
2007-02-26Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Efficient distributed computation modulo a shared secret
 
2006-09-25Paper
Computing inverses over a shared secret modulus
 
2006-03-01Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
Lecture Notes in Computer Science
2003-07-16Paper
Paillier's trapdoor function hides up to \(O(n)\) bits
Journal of Cryptology
2003-03-25Paper
scientific article; zbMATH DE number 1722681 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1629859 (Why is no real title available?)
 
2001-11-04Paper
New efficient and secure protocols for verifiable signature sharing and other applications
Journal of Computer and System Sciences
2001-06-10Paper
scientific article; zbMATH DE number 1302841 (Why is no real title available?)
 
2000-03-09Paper


Research outcomes over time


This page was built for person: Dario Catalano