Daniele Friolo

Orcid: 0000-0003-0836-1735

According to our database1, Daniele Friolo authored at least 22 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-key and Multi-input Predicate Encryption (for Conjunctions) from Learning with Errors.
J. Cryptol., September, 2024

Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions.
IACR Cryptol. ePrint Arch., 2024

Compact Proofs of Partial Knowledge for Overlapping CNF Formulae.
IACR Cryptol. ePrint Arch., 2024

Private Electronic Payments with Self-Custody and Zero-Knowledge Verified Reissuance.
CoRR, 2024

MARTSIA: Safeguarding Data Confidentiality in Blockchain-Driven Process Execution.
CoRR, 2024

Data Redaction in Smart-Contract-Enabled Permissioned Blockchains.
Proceedings of the Sixth Distributed Ledger Technology Workshop (DLT 2024), 2024

2023
Registered (Inner-Product) Functional Encryption.
IACR Cryptol. ePrint Arch., 2023

Enabling Data Confidentiality with Public Blockchains.
CoRR, 2023

MARTSIA: Enabling Data Confidentiality for Blockchain-Based Process Execution.
Proceedings of the Enterprise Design, Operations, and Computing, 2023

2022
Cryptographic and Financial Fairness.
IEEE Trans. Inf. Forensics Secur., 2022

On the Complete Non-Malleability of the Fujisaki-Okamoto Transform.
IACR Cryptol. ePrint Arch., 2022

Multi-key and Multi-input Predicate Encryption from Learning with Errors.
IACR Cryptol. ePrint Arch., 2022

Efficient Proofs of Knowledge for Threshold Relations.
IACR Cryptol. ePrint Arch., 2022

2021
New perspectives in multi-party computation: low round complexity from new assumptions, financial fairness and public verifiability.
PhD thesis, 2021

Shielded Computations in Smart Contracts Overcoming Forks.
Proceedings of the Financial Cryptography and Data Security, 2021

Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems.
IACR Cryptol. ePrint Arch., 2020

Vision: What If They All Die? Crypto Requirements For Key People.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains.
IACR Cryptol. ePrint Arch., 2019

A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Affordable Security or Big Guy vs Small Guy - Does the Depth of Your Pockets Impact Your Protocols?
Proceedings of the Security Protocols XXVII, 2019

2018
Secure Multi-Party Computation from Strongly Uniform Key Agreement.
IACR Cryptol. ePrint Arch., 2018


  Loading...