Elena Pagnin

Orcid: 0000-0002-7804-6696

According to our database1, Elena Pagnin authored at least 37 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Progressive and efficient verification for digital signatures: extensions and experimental results.
J. Cryptogr. Eng., September, 2024

Consistency-or-Die: Consistency for Key Transparency.
IACR Cryptol. ePrint Arch., 2024

Multi Designated Verifier Ring Signatures.
IACR Commun. Cryptol., 2024

Metadata Privacy Beyond Tunneling for Instant Messaging.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Updatable Privacy-Preserving Blueprints.
IACR Cryptol. ePrint Arch., 2023

PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

CaSCaDE: (Time-Based) Cryptography from Space Communications DElay.
IACR Cryptol. ePrint Arch., 2023

2022
To Signal or Not to Signal? Layering Traffic Analysis Resistance on Secure Instant Messaging.
CoRR, 2022

Bonsai: A Generalized Look at Dual Deduplication.
CoRR, 2022

Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication.
CoRR, 2022

CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Outsourcing MPC Precomputation for Location Privacy.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

Bifrost: A Secure, Scalable and Efficient File Sharing System Based on Dual Deduplication.
Proceedings of the 11th IEEE International Conference on Cloud Networking, 2022

Progressive and Efficient Verification for Digital Signatures.
Proceedings of the Applied Cryptography and Network Security, 2022

Secure Cloud Storage with Joint Deduplication and Erasure Protection.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
IACR Cryptol. ePrint Arch., 2021

On the Efficiency and Flexibility of Signature Verification.
IACR Cryptol. ePrint Arch., 2021

LOVE a pairing.
IACR Cryptol. ePrint Arch., 2021

Count Me In! Extendability for Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2021

Yggdrasil: Privacy-Aware Dual Deduplication in Multi Client Settings.
Proceedings of the ICC 2021, 2021

2020
Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party.
IACR Cryptol. ePrint Arch., 2020

Secure Generalized Deduplication via Multi-Key Revealing Encryption.
IACR Cryptol. ePrint Arch., 2020

2019
TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing.
Proc. Priv. Enhancing Technol., 2019

Multi-key homomorphic authenticators.
IET Inf. Secur., 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019

The Simplest Multi-key Linearly Homomorphic Signature Scheme.
IACR Cryptol. ePrint Arch., 2019

2018
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close.
IEEE Trans. Mob. Comput., 2018

Matrioska: A Compiler for Multi-Key Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2018

HB+DB: Distance bounding meets human based authentication.
Future Gener. Comput. Syst., 2018

\mathsf HIKE : Walking the Privacy Trail.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Privacy-Preserving Biometric Authentication: Challenges and Directions.
Secur. Commun. Networks, 2017

Anonymous Single-Round Server-Aided Verification.
IACR Cryptol. ePrint Arch., 2017

Multi-Hop Distance Estimation: How Far are You?
IACR Cryptol. ePrint Arch., 2017

Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2015
Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Commun. Lett., 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
On the Leakage of Information in Biometric Authentication.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014


  Loading...