Rosario Gennaro

Orcid: 0000-0002-3297-3750

Affiliations:
  • City College of New York, New York, NY, USA
  • IBM Research (former)


According to our database1, Rosario Gennaro authored at least 123 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them.
IACR Cryptol. ePrint Arch., 2024

How to Make Rational Arguments Practical and Extractable.
IACR Commun. Cryptol., 2024

2023
Guest editorial: Special issue on Mathematics of Zero-Knowledge.
Des. Codes Cryptogr., November, 2023

LURK: Lambda, the Ultimate Recursive Knowledge (Experience Report).
Proc. ACM Program. Lang., August, 2023

Testudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.
IACR Cryptol. ePrint Arch., 2023

LURK: Lambda, the Ultimate Recursive Knowledge.
IACR Cryptol. ePrint Arch., 2023

sfTestudo: Linear Time Prover SNARKs with Constant Size Proofs and Square Root Size Universal Setup.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

Witness-Authenticated Key Exchange, Revisited: Extensions to Groups, Improved Models, Simpler Constructions.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups.
IACR Cryptol. ePrint Arch., 2022

Witness-Authenticated Key Exchange Revisited: Improved Models, Simpler Constructions, Extensions to Groups.
IACR Cryptol. ePrint Arch., 2022

2021
On the Cryptographic Deniability of the Signal Protocol.
IACR Cryptol. ePrint Arch., 2021

UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts.
IACR Cryptol. ePrint Arch., 2021

2020
One Round Threshold ECDSA with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2020

Publicly Evaluatable Perceptual Hashing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Fast Multiparty Threshold ECDSA with Fast Trustless Setup.
IACR Cryptol. ePrint Arch., 2019

2018
Lattice-Based zk-SNARKs from Square Span Programs.
IACR Cryptol. ePrint Arch., 2018

Fine-Grained Secure Computation.
IACR Cryptol. ePrint Arch., 2018

2017
A certificateless approach to onion routing.
Int. J. Inf. Sec., 2017

Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services.
IACR Cryptol. ePrint Arch., 2017

A Lattice-Based Universal Thresholdizer for Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2017

Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Homomorphic Secret Sharing from Paillier Encryption.
Proceedings of the Provable Security, 2017

Verifiable Outsourced Computation: A Survey.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Using Level-1 Homomorphic Encryption to Improve Threshold DSA Signatures for Bitcoin Wallet Security.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Efficient Rational Proofs for Space Bounded Computations.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Automata Evaluation and Text Search Protocols with Simulation-Based Security.
J. Cryptol., 2016

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security.
IACR Cryptol. ePrint Arch., 2016

2015
Algebraic (trapdoor) one-way functions: Constructions and applications.
Theor. Comput. Sci., 2015

Generalizing Homomorphic MACs for Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2015

Sequentially Composable Rational Proofs.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Highly scalable verifiable encrypted search.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Verifiable Computation over Encrypted Data in the Presence of Verification Queries.
IACR Cryptol. ePrint Arch., 2014

Efficiently Verifiable Computation on Encrypted Data.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Fully non-interactive onion routing with forward secrecy.
Int. J. Inf. Sec., 2013

Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
Int. J. Inf. Sec., 2013

Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields.
IACR Cryptol. ePrint Arch., 2013

Algebraic (Trapdoor) One-Way Functions and Their Applications.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Relations between the security models for certificateless encryption and ID-based key agreement.
Int. J. Inf. Sec., 2012

Fully Homomorphic Message Authenticators.
IACR Cryptol. ePrint Arch., 2012

Quadratic Span Programs and Succinct NIZKs without PCPs.
IACR Cryptol. ePrint Arch., 2012

Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations.
IACR Cryptol. ePrint Arch., 2012

Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications.
IACR Cryptol. ePrint Arch., 2012

The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Computational Extractors and Pseudorandomness.
IACR Cryptol. ePrint Arch., 2011

Verifiable Delegation of Computation over Large Datasets.
IACR Cryptol. ePrint Arch., 2011

2010
Identity-Based Key Exchange Protocols without Pairings.
Trans. Comput. Sci., 2010

A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
J. Cryptol., 2010

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
IACR Cryptol. ePrint Arch., 2010

Text Search Protocols with Simulation Based Security.
Proceedings of the Public Key Cryptography, 2010

2009
New Approaches for Deniable Authentication.
J. Cryptol., 2009

Secure Network Coding Over the Integers.
IACR Cryptol. ePrint Arch., 2009

More on Key Wrapping.
IACR Cryptol. ePrint Arch., 2009

Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
IACR Cryptol. ePrint Arch., 2009

Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement.
IACR Cryptol. ePrint Arch., 2009

Making the Diffie-Hellman Protocol Identity-Based.
IACR Cryptol. ePrint Arch., 2009

Certificateless onion routing.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
J. Cryptol., 2008

Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs.
IACR Cryptol. ePrint Arch., 2008

Threshold RSA for Dynamic and Ad-Hoc Groups.
IACR Cryptol. ePrint Arch., 2008

Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.
Proceedings of the Public Key Cryptography, 2008

2007
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring.
Theor. Comput. Sci., 2007

Robust and Efficient Sharing of RSA Functions.
J. Cryptol., 2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.
J. Cryptol., 2007

Faster and Shorter Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2007

Improved On-Line/Off-Line Threshold Signatures.
Proceedings of the Public Key Cryptography, 2007

2006
A framework for password-based authenticated key exchange<sup>1</sup>.
ACM Trans. Inf. Syst. Secur., 2006

Provably secure threshold password-authenticated key exchange.
J. Comput. Syst. Sci., 2006

Randomness in Cryptography.
IEEE Secur. Priv., 2006

Deniable Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2006

Independent Zero-Knowledge Sets.
IACR Cryptol. ePrint Arch., 2006

2005
Bounds on the Efficiency of Generic Cryptographic Constructions.
SIAM J. Comput., 2005

An Improved Pseudo-Random Generator Based on the Discrete Logarithm Problem.
J. Cryptol., 2005

Secure multiplication of shared secrets in the exponent.
Inf. Process. Lett., 2005

Secure off-the-record messaging.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Proceedings of the Advances in Cryptology, 2005

2004
A Note on An Encryption Scheme of Kurosawa and Desmedt.
IACR Cryptol. ePrint Arch., 2004

Secure Hashed Diffie-Hellman over Non-DDH Groups.
IACR Cryptol. ePrint Arch., 2004

Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.
Proceedings of the Advances in Cryptology, 2004

Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.
Proceedings of the Advances in Cryptology, 2004

Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.
Proceedings of the Advances in Cryptology, 2004

2003
A Framework for Password-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2003

Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols.
IACR Cryptol. ePrint Arch., 2003

Lower bounds on the efficiency of encryption and digital signature schemes.
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003

Secure Applications of Pedersen's Distributed Key Generation Protocol.
Proceedings of the Topics in Cryptology, 2003

2002
Securing Threshold Cryptosystems against Chosen Ciphertext Attack.
J. Cryptol., 2002

Paillier's Trapdoor Function Hides up to <i>O</i>(<i>n</i>) Bits.
J. Cryptol., 2002

Cryptographic Algorithms for Multimedia Traffic.
Proceedings of the Foundations of Security Analysis and Design II, 2002

Cryptanalysis of a Pseudorandom Generator Based on Braid Groups.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

On 2-Round Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2002

2001
How to Sign Digital Streams.
Inf. Comput., 2001

Robust Threshold DSS Signatures.
Inf. Comput., 2001

The round complexity of verifiable secret sharing and secure multicast.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

The Bit Security of Paillier's Encryption Scheme and Its Applications.
Proceedings of the Advances in Cryptology, 2001

Pseudo-random Number Generation on the IBM 4758 Secure Crypto Coprocessor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

Paillier's cryptosystem revisited.
Proceedings of the CCS 2001, 2001

2000
A Protocol to Achieve Independence in Constant Rounds.
IEEE Trans. Parallel Distributed Syst., 2000

Secure distributed storage and retrieval.
Theor. Comput. Sci., 2000

RSA-Based Undeniable Signatures.
J. Cryptol., 2000

New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications.
J. Comput. Syst. Sci., 2000

Lower Bounds on the Efficiency of Generic Cryptographic Constructions
Electron. Colloquium Comput. Complex., 2000

Color opponency watermarking scheme for digital images.
Proceedings of the Security and Watermarking of Multimedia Contents II, 2000

Computing Inverses over a Shared Secret Modulus.
Proceedings of the Advances in Cryptology, 2000

An Improved Pseudo-random Generator Based on Discrete Log.
Proceedings of the Advances in Cryptology, 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Secure Hash-and-Sign Signatures without the Random Oracle.
IACR Cryptol. ePrint Arch., 1999

Robust Watermarking for Images Based on Color Manipulation.
Proceedings of the Information Hiding, Third International Workshop, 1999

Adaptive Security for Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1999

1998
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
IACR Cryptol. ePrint Arch., 1998

Simplified VSS and Fast-Track Multiparty Computations with Applications to Threshold Cryptography.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
A secure and optimally efficient multi-authority election scheme.
Eur. Trans. Telecommun., 1997

Two-phase cryptographic key recovery system.
Comput. Secur., 1997

1996
Theory and practice of verifiable secret sharing.
PhD thesis, 1996

Incoercible Multiparty Computation.
IACR Cryptol. ePrint Arch., 1996

Incoercible Multiparty Computation (extended abstract).
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

Probabilistic Verification of Elementary Geometry Statements.
Proceedings of the Automated Deduction in Geometry, 1996

1995
Achieving Independence Efficiently and Securely.
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Verifiable Secret Sharing as Secure Computation.
Proceedings of the Advances in Cryptology, 1995

On Learning from Noisy and Incomplete Examples.
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995


  Loading...