Ivan Visconti

From MaRDI portal
Person:776001


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Compact proofs of partial knowledge for overlapping CNF formulae
Journal of Cryptology
2024-12-27Paper
Black-box (and fast) non-malleable zero knowledge
 
2024-12-13Paper
Zero‐Knowledge Proofs
Asymmetric Cryptography
2023-08-04Paper
Efficient proofs of knowledge for threshold relations
Computer Security – ESORICS 2022
2023-07-28Paper
Efficient NIZK arguments with straight-line simulation and extraction
Cryptology and Network Security
2023-07-28Paper
Doubly adaptive zero-knowledge proofs
Theoretical Computer Science
2023-07-21Paper
Black-box constructions of bounded-concurrent secure computation
 
2022-12-16Paper
Shielded computations in smart contracts overcoming forks
 
2022-06-17Paper
Publicly verifiable zero knowledge from (collapsing) blockchains
 
2021-12-21Paper
How to extract useful randomness from unreliable sources
 
2021-12-01Paper
Continuously non-malleable codes in the split-state model from minimal assumptions
 
2020-06-30Paper
UC-secure multiparty computation from one-way functions using stateless tokens
 
2020-05-05Paper
Universally composable secure computation with corrupted tokens
 
2020-03-09Paper
Publicly verifiable proofs from blockchains
 
2020-01-28Paper
Non-interactive zero knowledge \textit{proofs} in the random oracle model
 
2019-10-14Paper
Non-interactive secure computation from one-way functions
 
2019-01-23Paper
Round-optimal secure two-party computation from trapdoor permutations
 
2018-01-19Paper
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds
 
2018-01-19Paper
Resettably-sound resettable zero knowledge in constant rounds
 
2018-01-19Paper
Four-round concurrent non-malleable commitments from one-way functions
 
2017-11-15Paper
Delayed-input cryptographic protocols
 
2017-08-04Paper
Unconditional UC-secure computation with (stronger-malicious) PUFs
Lecture Notes in Computer Science
2017-06-13Paper
Concurrent non-malleable commitments (and more) in 3 rounds
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Online/offline OR composition of sigma protocols
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
A transform for NIZK almost as efficient and general as the Fiat-Shamir transform without programmable random oracles
Theory of Cryptography
2016-04-08Paper
Improved OR-composition of sigma-protocols
Theory of Cryptography
2016-04-08Paper
Impossibility of black-box simulation against leakage attacks
Lecture Notes in Computer Science
2015-12-10Paper
Executable proofs, input-size hiding secure computation and a new ideal world
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Black-box non-black-box zero knowledge
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
On selective-opening attacks against encryption schemes
Lecture Notes in Computer Science
2014-10-14Paper
On Input Indistinguishable Proof Systems
Automata, Languages, and Programming
2014-07-01Paper
4-round resettably-sound zero knowledge
Theory of Cryptography
2014-02-18Paper
Statistical concurrent non-malleable zero knowledge
Theory of Cryptography
2014-02-18Paper
Constant-round concurrent zero knowledge in the bounded player model
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Nearly simultaneously resettable black-box zero knowledge
Automata, Languages, and Programming
2013-08-12Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
On constant-round concurrent non-malleable proof systems
Information Processing Letters
2013-04-04Paper
Concurrent zero knowledge in the bounded player model
Theory of Cryptography
2013-03-18Paper
Revisiting lower and upper bounds for selective decommitments
Theory of Cryptography
2013-03-18Paper
Secure database commitments and universal arguments of quasi knowledge
Lecture Notes in Computer Science
2012-09-25Paper
Impossibility results for static input secure computation
Lecture Notes in Computer Science
2012-09-25Paper
On round-optimal zero knowledge in the bare public-key model
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Simultaneously resettable arguments of knowledge
Theory of Cryptography
2012-06-15Paper
Resettable statistical zero knowledge
Theory of Cryptography
2012-06-15Paper
Secure set intersection with untrusted hardware tokens
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Constant-round concurrent non-malleable statistically binding commitments and decommitments
Public Key Cryptography – PKC 2010
2010-05-28Paper
Efficiency preserving transformations for concurrent non-malleable zero knowledge
Theory of Cryptography
2010-02-24Paper
Anonymous group communication in mobile networks (extended abstract)
Lecture Notes in Computer Science
2010-02-23Paper
Collusion-Free Multiparty Computation in the Mediated Model
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Co-sound Zero-Knowledge with Public Keys
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Hybrid commitments and their applications to zero-knowledge proof systems
Theoretical Computer Science
2009-06-22Paper
Simulation-Based Concurrent Non-malleable Commitments and Decommitments
Theory of Cryptography
2009-03-03Paper
Collusion-Free Protocols in the Mediated Model
Lecture Notes in Computer Science
2009-02-10Paper
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model
Automata, Languages and Programming
2008-08-19Paper
Impossibility and Feasibility Results for Zero Knowledge with Public Keys
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Completely Non-malleable Encryption Revisited
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Efficient Zero Knowledge on the Internet
Automata, Languages and Programming
2007-09-11Paper
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model
Lecture Notes in Computer Science
2007-09-05Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Improved Setup Assumptions for 3-Round Resettable Zero Knowledge
 
2005-08-12Paper
scientific article; zbMATH DE number 2043307 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1952902 (Why is no real title available?)
 
2003-07-24Paper


Research outcomes over time


This page was built for person: Ivan Visconti