Dario Fiore

From MaRDI portal
Person:500979

Available identifiers

zbMath Open fiore.darioMaRDI QIDQ500979

List of research outcomes

PublicationDate of PublicationType
Adaptively Secure Single Secret Leader Election from DDH2024-03-26Paper
Extendable threshold ring signatures with enhanced anonymity2023-11-24Paper
Efficient and universally composable single secret leader election from pairings2023-11-24Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular2023-11-07Paper
Additive-homomorphic functional commitments and applications to homomorphic signatures2023-08-21Paper
On the impossibility of algebraic vector commitments in pairing-free groups2023-08-14Paper
Verifiable Computation and Succinct Arguments for NP2023-08-04Paper
Ring signatures with user-controlled linkability2023-07-28Paper
Inner product functional commitments with constant-size public parameters and openings2023-07-25Paper
\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensions2023-05-12Paper
Incrementally aggregatable vector commitments and applications to verifiable decentralized storage2023-03-21Paper
Progressive and efficient verification for digital signatures2022-11-09Paper
Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data2022-08-25Paper
Subversion-resilient enhanced privacy ID2022-07-06Paper
Zero-knowledge proofs for set membership: efficient, succinct, modular2022-06-17Paper
Flexible and efficient verifiable computation on encrypted data2021-12-21Paper
Boosting verifiable computation on encrypted data2021-12-01Paper
Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)2021-12-01Paper
Unilaterally-Authenticated Key Exchange2021-03-17Paper
Improving the efficiency of re-randomizable and replayable CCA secure public key encryption2021-02-23Paper
Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications2020-05-11Paper
Automated analysis of cryptographic assumptions in generic group models2019-06-20Paper
Matrioska: a compiler for multi-key homomorphic signatures2018-10-17Paper
Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings2018-09-12Paper
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions2018-09-06Paper
On the security notions for homomorphic signatures2018-08-10Paper
Practical homomorphic message authenticators for arithmetic circuits2018-04-26Paper
Practical functional encryption for quadratic functions with applications to predicate encryption2017-11-03Paper
Zero-Knowledge Sets With Short Proofs2017-07-27Paper
Multi-key Homomorphic Authenticators2017-01-06Paper
On the (In)Security of SNARKs in the Presence of Oracles2016-12-21Paper
Nearly Optimal Verifiable Data Streaming2016-04-13Paper
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys2015-12-10Paper
Algebraic (trapdoor) one-way functions: constructions and applications2015-10-08Paper
Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds2015-08-27Paper
Privacy-Preserving Accountable Computation2014-10-16Paper
Interactive Encryption and Message Authentication2014-10-14Paper
Verifiable random functions: relations to identity-based key encapsulation and new constructions2014-09-25Paper
Automated Analysis of Cryptographic Assumptions in Generic Group Models2014-08-07Paper
Homomorphic Signatures with Efficient Verification for Polynomial Functions2014-08-07Paper
Generalizing Homomorphic MACs for Arithmetic Circuits2014-03-25Paper
Practical Homomorphic MACs for Arithmetic Circuits2013-05-31Paper
Vector Commitments and Their Applications2013-04-19Paper
Algebraic (Trapdoor) One-Way Functions and Their Applications2013-03-18Paper
From Selective to Full Security: Semi-generic Transformations in the Standard Model2012-07-20Paper
Efficient Network Coding Signatures in the Standard Model2012-07-20Paper
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations2012-06-15Paper
Adaptive Pseudo-free Groups and Applications2011-05-27Paper
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement2010-11-26Paper
Making the Diffie-Hellman Protocol Identity-Based2010-03-16Paper
Verifiable Random Functions from Identity-Based Key Encapsulation2009-05-12Paper
Zero-Knowledge Sets with Short Proofs2008-04-15Paper
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results2008-03-05Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Dario Fiore