Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Claudio Orlandi - MaRDI portal

Claudio Orlandi

From MaRDI portal
Person:826289

Available identifiers

zbMath Open orlandi.claudioMaRDI QIDQ826289

List of research outcomes

PublicationDate of PublicationType
Secure multiparty computation from threshold encryption based on class groups2024-02-02Paper
Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions2024-02-02Paper
Witness-succinct universally-composable SNARKs2023-12-08Paper
Structure-preserving compilers from new notions of obfuscations2023-11-16Paper
https://portal.mardi4nfdi.de/entity/Q60593642023-11-02Paper
On access control encryption without sanitization2023-07-25Paper
Zero-knowledge for homomorphic key-value commitments with applications to privacy-preserving ledgers2023-07-25Paper
An algebraic framework for silent preprocessing with trustless setup and active security2023-07-07Paper
Black-box transformations from passive to covert security with public verifiability2022-11-09Paper
Fiat-Shamir bulletproofs are non-malleable (in the algebraic group model)2022-08-30Paper
On the Bottleneck Complexity of MPC with Correlated Randomness2022-07-08Paper
ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines2022-07-08Paper
Stronger notions and a more efficient construction of threshold ring signatures2022-06-15Paper
Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms2022-06-15Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2022-04-21Paper
Stronger security and constructions of multi-designated verifier signatures2022-03-23Paper
Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices2021-12-21Paper
Balancing privacy and accountability in blockchain identity management2021-12-20Paper
The rise of Paillier: homomorphic secret sharing and public-key silent OT2021-12-08Paper
Security of hedged Fiat-Shamir signatures under fault attacks2021-12-01Paper
High-performance multi-party computation for binary circuits based on oblivious transfer2021-08-10Paper
Proofs of replicated storage without timing assumptions2020-05-20Paper
Quisquis: a new design for anonymous cryptocurrencies2020-05-20Paper
Sharing information with competitors2020-02-04Paper
Combining private set intersection with secure two-party computation2018-10-17Paper
Yet another compiler for active security or: efficient MPC over arbitrary rings2018-09-26Paper
Revealing encryption for partial ordering2018-04-20Paper
Access Control Encryption for Equality, Comparison, and More2017-06-13Paper
Access Control Encryption: Enforcing Information Flow with Cryptography2016-12-22Paper
Cross and Clean: Amortized Garbled Circuits with Constant Overhead2016-12-21Paper
Non-Interactive Verifiable Secret Sharing for Monotone Circuits2016-06-22Paper
How To Bootstrap Anonymous Communication2016-04-15Paper
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge2015-09-30Paper
The Simplest Protocol for Oblivious Transfer2015-09-17Paper
Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)2014-10-14Paper
Publicly Auditable Secure Multi-Party Computation2014-10-14Paper
Statistical Concurrent Non-malleable Zero Knowledge2014-02-18Paper
Hiding the Input-Size in Secure Two-Party Computation2013-12-10Paper
MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions2013-05-31Paper
Calling Out Cheaters: Covert Security with Public Verifiability2013-03-19Paper
On the Power of Correlated Randomness in Secure Computation2013-03-18Paper
A New Approach to Practical Active-Secure Two-Party Computation2012-09-25Paper
Lower and Upper Bounds for Deniable Public-Key Encryption2011-12-02Paper
Semi-homomorphic Encryption and Multiparty Computation2011-05-27Paper
On Invertible Sampling and Adaptive Security2010-12-07Paper
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost2010-08-24Paper
On the Necessary and Sufficient Assumptions for UC Computation2010-02-24Paper
LEGO for Two-Party Secure Computation2009-03-03Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Claudio Orlandi