2023
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations.
IEEE Internet Comput., 2023
The Referendum Problem in Anonymous Voting for Decentralized Autonomous Organizations.
IACR Cryptol. ePrint Arch., 2023
Multi-input Non-interactive Functional Encryption: Constructions and Applications.
Proceedings of the Codes, Cryptology and Information Security, 2023
2022
Towards Data Redaction in Bitcoin.
IEEE Trans. Netw. Serv. Manag., December, 2022
COVID-19 and cybersecurity.
IET Inf. Secur., 2022
2020
"The simplest protocol for oblivious transfer" revisited.
Inf. Process. Lett., 2020
Verifiable Inner Product Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020
On the Effectiveness of Time Travel to Inject COVID-19 Alerts.
IACR Cryptol. ePrint Arch., 2020
Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System.
IACR Cryptol. ePrint Arch., 2020
Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
2019
Non-Interactive Zero Knowledge Proofs in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2019
Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation.
IACR Cryptol. ePrint Arch., 2019
2018
Power of public-key function-private functional encryption.
IET Inf. Secur., 2018
Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018
2017
IACR Cryptol. ePrint Arch., 2017
On the Relation Between SIM and IND-RoR Security Models for PAKEs.
IACR Cryptol. ePrint Arch., 2017
On the power of rewinding simulators in functional encryption.
Des. Codes Cryptogr., 2017
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
On the Relation Between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017
2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016
Updatable Functional Encryption.
IACR Cryptol. ePrint Arch., 2016
2015
Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptol. ePrint Arch., 2015
Mergeable Functional Encryption.
IACR Cryptol. ePrint Arch., 2015
On the Power of Public-key Functional Encryption with Function Privacy.
IACR Cryptol. ePrint Arch., 2015
On the Possibility of Non-Interactive E-Voting in the Public-key Setting.
IACR Cryptol. ePrint Arch., 2015
Deniable Functional Encryption.
IACR Cryptol. ePrint Arch., 2015
2014
Simulation-Based Secure Functional Encryption in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2014
Controlled Homomorphic Encryption: Definition and Construction.
IACR Cryptol. ePrint Arch., 2014
2013
On the Achievability of Simulation-Based Security for Functional Encryption.
IACR Cryptol. ePrint Arch., 2013
2012
Fully Secure Hidden Vector Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2011
Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
IACR Cryptol. ePrint Arch., 2011
Secure and Policy-Private Resource Sharing in an Online Social Network.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
jPBC: Java pairing based cryptography.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptol. ePrint Arch., 2010
Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.
IACR Cryptol. ePrint Arch., 2010
Predicate Encryption with Partial Public Keys.
IACR Cryptol. ePrint Arch., 2010
2009
Private-Key Hidden Vector Encryption with Key Privacy.
Proceedings of the Theoretical Computer Science, 11th Italian Conference, 2009
Private-Key Hidden Vector Encryption with Key Confidentiality.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Hidden-Vector Encryption with Groups of Prime Order.
Proceedings of the Pairing-Based Cryptography, 2008