Vector Commitments and their Applications D Catalano, D Fiore Public Key Cryptography--PKC 2013 7778, 55-72, 0 | 378* | |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 333 | 2020 |
Publicly verifiable delegation of large polynomials and matrix computations, with applications D Fiore, R Gennaro Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 304 | 2012 |
Privacy-preserving fingercode authentication M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ... Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010 | 283 | 2010 |
Efficiently verifiable computation on encrypted data D Fiore, R Gennaro, V Pastro Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 256 | 2014 |
Verifiable delegation of computation on outsourced data M Backes, D Fiore, RM Reischuk Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 249 | 2013 |
Legosnark: Modular design and composition of succinct zero-knowledge proofs M Campanelli, D Fiore, A Querol Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 172 | 2019 |
Practical homomorphic MACs for arithmetic circuits D Catalano, D Fiore Annual International Conference on the Theory and Applications of …, 2013 | 155 | 2013 |
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ... 2010 fourth IEEE international conference on biometrics: theory …, 2010 | 145 | 2010 |
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings M Abdalla, D Catalano, D Fiore, R Gay, B Ursu Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 143 | 2018 |
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data M Backes, M Barbosa, D Fiore, RM Reischuk https://eprint.iacr.org/2014/617/, 0 | 142* | |
Practical functional encryption for quadratic functions with applications to predicate encryption CEZ Baltico, D Catalano, D Fiore, R Gay Annual International Cryptology Conference, 67-98, 2017 | 139 | 2017 |
Homomorphic signatures with efficient verification for polynomial functions D Catalano, D Fiore, B Warinschi Annual Cryptology Conference, 371-389, 2014 | 129 | 2014 |
Efficient network coding signatures in the standard model D Catalano, D Fiore, B Warinschi Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 116 | 2012 |
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data D Catalano, D Fiore Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 103 | 2015 |
Hash first, argue later: Adaptive verifiable computations on outsourced data D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 94 | 2016 |
Making the Diffie-Hellman protocol identity-based D Fiore, R Gennaro Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 88 | 2010 |
Zero-knowledge sets with short proofs D Catalano, D Fiore, M Messina Advances in Cryptology–EUROCRYPT 2008, 433-450, 2008 | 76 | 2008 |
Adaptive pseudo-free groups and applications D Catalano, D Fiore, B Warinschi Annual International Conference on the Theory and Applications of …, 2011 | 70 | 2011 |
Verifiable random functions from identity-based key encapsulation M Abdalla, D Catalano, D Fiore Annual International Conference on the Theory and Applications of …, 2009 | 67 | 2009 |