Dario Fiore
Orcid: 0000-0001-7274-6600Affiliations:
- IMDEA Software Institute, Madrid, Spain
- Max Planck Institute for Software Systems, Saarbrücken, Germany (former)
- New York University, Department of Computer Science, NY, USA
- École Normale Supérieure, Paris, France
- University of Catania, Italy (PhD 2010)
According to our database1,
Dario Fiore
authored at least 96 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Des. Codes Cryptogr., November, 2023
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Lookup Arguments: Improvements, Extensions and Applications to Zero-Knowledge Decision Trees.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
2022
Efficient Zero-Knowledge Proofs on Signed Data with Applications to Verifiable Computation on Data Streams.
IACR Cryptol. ePrint Arch., 2022
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings.
IACR Cryptol. ePrint Arch., 2022
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Theor. Comput. Sci., 2021
Controlled Functional Encryption Revisited: Multi-Authority Extensions and Efficient Schemes for Quadratic Functions.
Proc. Priv. Enhancing Technol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Mon$\mathbb {Z}_{2^{k}}$a: Fast Maliciously Secure Two Party Computation on $\mathbb {Z}_{2^{k}}$.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
J. Cryptol., 2019
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2019
Monℤ<sub>2<sup>k</sup></sub>a: Fast Maliciously Secure Two Party Computation on ℤ<sub>2<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
J. Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions.
Des. Codes Cryptogr., 2018
2017
Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data.
IACR Cryptol. ePrint Arch., 2017
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption.
IACR Cryptol. ePrint Arch., 2017
Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings.
IACR Cryptol. ePrint Arch., 2017
2016
Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds.
IET Inf. Secur., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Programmable Hash Functions go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions.
J. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
Int. J. Inf. Sec., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Relations between the security models for certificateless encryption and ID-based key agreement.
Int. J. Inf. Sec., 2012
Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations.
IACR Cryptol. ePrint Arch., 2012
Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
2011
IACR Cryptol. ePrint Arch., 2011
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases.
IACR Cryptol. ePrint Arch., 2011
2010
Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Multimedia and Security Workshop, 2010
A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates.
Proceedings of the Fourth IEEE International Conference on Biometrics: Theory Applications and Systems, 2010
2009
Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the Public Key Cryptography, 2008
Proceedings of the Advances in Cryptology, 2008