Claudio Orlandi

From MaRDI portal
Person:826289

Available identifiers

zbMath Open orlandi.claudioMaRDI QIDQ826289

List of research outcomes





PublicationDate of PublicationType
An improved threshold homomorphic cryptosystem based on class groups2025-01-10Paper
Fiat-Shamir bulletproofs are non-malleable (in the Random Oracle Model)2024-12-27Paper
MPC with low bottleneck-complexity: information-theoretic security and more2024-11-22Paper
Secure multiparty computation from threshold encryption based on class groups2024-02-02Paper
Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions2024-02-02Paper
Witness-succinct universally-composable SNARKs2023-12-08Paper
Structure-preserving compilers from new notions of obfuscations2023-11-16Paper
https://portal.mardi4nfdi.de/entity/Q60593642023-11-02Paper
Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgers2023-07-25Paper
On access control encryption without sanitization2023-07-25Paper
An algebraic framework for silent preprocessing with trustless setup and active security2023-07-07Paper
Black-box transformations from passive to covert security with public verifiability2022-11-09Paper
Fiat-Shamir bulletproofs are non-malleable (in the algebraic group model)2022-08-30Paper
On the Bottleneck Complexity of MPC with Correlated Randomness2022-07-08Paper
ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines2022-07-08Paper
Stronger notions and a more efficient construction of threshold ring signatures2022-06-15Paper
Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms2022-06-15Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2022-04-21Paper
Stronger security and constructions of multi-designated verifier signatures2022-03-23Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2021-12-21Paper
Balancing privacy and accountability in blockchain identity management2021-12-20Paper
The rise of Paillier: homomorphic secret sharing and public-key silent OT2021-12-08Paper
Security of hedged Fiat-Shamir signatures under fault attacks2021-12-01Paper
High-performance multi-party computation for binary circuits based on oblivious transfer2021-08-10Paper
Quisquis: a new design for anonymous cryptocurrencies2020-05-20Paper
Proofs of replicated storage without timing assumptions2020-05-20Paper
Sharing information with competitors2020-02-04Paper
Combining private set intersection with secure two-party computation2018-10-17Paper
Yet another compiler for active security or: efficient MPC over arbitrary rings2018-09-26Paper
Revealing encryption for partial ordering2018-04-20Paper
Access Control Encryption for Equality, Comparison, and More2017-06-13Paper
Access Control Encryption: Enforcing Information Flow with Cryptography2016-12-22Paper
Cross and Clean: Amortized Garbled Circuits with Constant Overhead2016-12-21Paper
Non-Interactive Verifiable Secret Sharing for Monotone Circuits2016-06-22Paper
How to bootstrap anonymous communication2016-04-15Paper
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge2015-09-30Paper
The Simplest Protocol for Oblivious Transfer2015-09-17Paper
Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)2014-10-14Paper
Publicly Auditable Secure Multi-Party Computation2014-10-14Paper
Statistical Concurrent Non-malleable Zero Knowledge2014-02-18Paper
Hiding the Input-Size in Secure Two-Party Computation2013-12-10Paper
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions2013-05-31Paper
Calling Out Cheaters: Covert Security with Public Verifiability2013-03-19Paper
On the Power of Correlated Randomness in Secure Computation2013-03-18Paper
A New Approach to Practical Active-Secure Two-Party Computation2012-09-25Paper
Lower and Upper Bounds for Deniable Public-Key Encryption2011-12-02Paper
Semi-homomorphic Encryption and Multiparty Computation2011-05-27Paper
On Invertible Sampling and Adaptive Security2010-12-07Paper
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost2010-08-24Paper
On the Necessary and Sufficient Assumptions for UC Computation2010-02-24Paper
LEGO for Two-Party Secure Computation2009-03-03Paper

Research outcomes over time

This page was built for person: Claudio Orlandi