Dario Fiore

From MaRDI portal
Person:500979

Available identifiers

zbMath Open fiore.darioMaRDI QIDQ500979

List of research outcomes





PublicationDate of PublicationType
Fully-succinct multi-key homomorphic signatures from standard assumptions2024-12-13Paper
Witness encryption for succinct functional commitments and applications2024-11-12Paper
Lookup arguments: improvements, extensions and applications to zero-knowledge decision trees2024-11-12Paper
Cuckoo commitments: registration-based encryption and key-value map commitments for large spaces2024-09-13Paper
Chainable functional commitments for unbounded-depth circuits2024-08-02Paper
From polynomial IOP and commitments to non-malleable zkSNARKs2024-08-02Paper
Adaptively Secure Single Secret Leader Election from DDH2024-03-26Paper
Extendable threshold ring signatures with enhanced anonymity2023-11-24Paper
Efficient and universally composable single secret leader election from pairings2023-11-24Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular2023-11-07Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Verifiable Computation and Succinct Arguments for NP2023-08-04Paper
Ring signatures with user-controlled linkability2023-07-28Paper
Inner product functional commitments with constant-size public parameters and openings2023-07-25Paper
\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions2023-05-12Paper
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage2023-03-21Paper
Progressive and efficient verification for digital signatures2022-11-09Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data2022-08-25Paper
Subversion-resilient enhanced privacy ID2022-07-06Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular2022-06-17Paper
Flexible and efficient verifiable computation on encrypted data2021-12-21Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)2021-12-01Paper
Unilaterally-Authenticated Key Exchange2021-03-17Paper
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption2021-02-23Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
Automated analysis of cryptographic assumptions in generic group models2019-06-20Paper
Matrioska: a compiler for multi-key homomorphic signatures2018-10-17Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions2018-09-06Paper
On the security notions for homomorphic signatures2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption2017-11-03Paper
Zero-Knowledge Sets With Short Proofs2017-07-27Paper
Multi-key Homomorphic Authenticators2017-01-06Paper
On the (In)Security of SNARKs in the Presence of Oracles2016-12-21Paper
Nearly Optimal Verifiable Data Streaming2016-04-13Paper
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds2015-08-27Paper
Privacy-Preserving Accountable Computation2014-10-16Paper
Interactive Encryption and Message Authentication2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions2014-09-25Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Automated Analysis of Cryptographic Assumptions in Generic Group Models2014-08-07Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
Practical Homomorphic MACs for Arithmetic Circuits2013-05-31Paper
Vector Commitments and Their Applications2013-04-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
Efficient network coding signatures in the standard model2012-07-20Paper
From selective to full security: semi-generic transformations in the standard model2012-07-20Paper
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations2012-06-15Paper
Adaptive pseudo-free groups and applications2011-05-27Paper
Constructing certificateless encryption and ID-based encryption from ID-based key agreement2010-11-26Paper
Making the Diffie-Hellman Protocol Identity-Based2010-03-16Paper
Verifiable Random Functions from Identity-Based Key Encapsulation2009-05-12Paper
Zero-Knowledge Sets with Short Proofs2008-04-15Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper

Research outcomes over time

This page was built for person: Dario Fiore