Dario Fiore

From MaRDI portal
Person:500979


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fully-succinct multi-key homomorphic signatures from standard assumptions
 
2024-12-13Paper
Witness encryption for succinct functional commitments and applications
 
2024-11-12Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees
 
2024-11-12Paper
Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces
 
2024-09-13Paper
Chainable functional commitments for unbounded-depth circuits
 
2024-08-02Paper
From polynomial IOP and commitments to non-malleable zkSNARKs
 
2024-08-02Paper
Adaptively Secure Single Secret Leader Election from DDH
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Extendable threshold ring signatures with enhanced anonymity
Lecture Notes in Computer Science
2023-11-24Paper
Efficient and universally composable single secret leader election from pairings
Lecture Notes in Computer Science
2023-11-24Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular
Designs, Codes and Cryptography
2023-11-07Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups
Theory of Cryptography
2023-08-14Paper
Verifiable Computation and Succinct Arguments for NP
Asymmetric Cryptography
2023-08-04Paper
Ring signatures with user-controlled linkability
Computer Security – ESORICS 2022
2023-07-28Paper
Inner product functional commitments with constant-size public parameters and openings
Lecture Notes in Computer Science
2023-07-25Paper
\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions
Lecture Notes in Computer Science
2023-05-12Paper
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage
 
2023-03-21Paper
Progressive and efficient verification for digital signatures
 
2022-11-09Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data
 
2022-08-25Paper
Subversion-resilient enhanced privacy ID
 
2022-07-06Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular
 
2022-06-17Paper
Flexible and efficient verifiable computation on encrypted data
 
2021-12-21Paper
Boosting verifiable computation on encrypted data
 
2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)
 
2021-12-01Paper
Unilaterally-authenticated key exchange
Financial Cryptography and Data Security
2021-03-17Paper
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption
 
2021-02-23Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications
 
2020-05-11Paper
Automated analysis of cryptographic assumptions in generic group models
Journal of Cryptology
2019-06-20Paper
Matrioska: a compiler for multi-key homomorphic signatures
 
2018-10-17Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings
 
2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
Designs, Codes and Cryptography
2018-09-06Paper
On the security notions for homomorphic signatures
 
2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits
Journal of Cryptology
2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption
 
2017-11-03Paper
Zero-Knowledge Sets With Short Proofs
IEEE Transactions on Information Theory
2017-07-27Paper
Multi-key Homomorphic Authenticators
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
On the (in)security of SNARKs in the presence of oracles
Theory of Cryptography
2016-12-21Paper
Nearly optimal verifiable data streaming
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
Lecture Notes in Computer Science
2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications
Theoretical Computer Science
2015-10-08Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
Lecture Notes in Computer Science
2015-08-27Paper
Privacy-preserving accountable computation
Lecture Notes in Computer Science
2014-10-16Paper
Interactive encryption and message authentication
Lecture Notes in Computer Science
2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions
Journal of Cryptology
2014-09-25Paper
Homomorphic signatures with efficient verification for polynomial functions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Automated analysis of cryptographic assumptions in generic group models
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Generalizing homomorphic MACs for arithmetic circuits
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Practical homomorphic MACs for arithmetic circuits
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Vector commitments and their applications
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Algebraic (Trapdoor) one-way functions and their applications
Theory of Cryptography
2013-03-18Paper
Efficient network coding signatures in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
From selective to full security: semi-generic transformations in the standard model
Public Key Cryptography – PKC 2012
2012-07-20Paper
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
Theory of Cryptography
2012-06-15Paper
Adaptive pseudo-free groups and applications
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Constructing certificateless encryption and ID-based encryption from ID-based key agreement
Lecture Notes in Computer Science
2010-11-26Paper
Making the Diffie-Hellman Protocol Identity-Based
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
Verifiable Random Functions from Identity-Based Key Encapsulation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Zero-Knowledge Sets with Short Proofs
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper


Research outcomes over time


This page was built for person: Dario Fiore