Følg
Dario Fiore
Dario Fiore
Associate Research Professor, IMDEA Software Institute
Verificeret mail på imdea.org - Startside
Titel
Citeret af
Citeret af
År
Vector Commitments and their Applications
D Catalano, D Fiore
Public Key Cryptography--PKC 2013 7778, 55-72, 0
362*
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3412020
Publicly verifiable delegation of large polynomials and matrix computations, with applications
D Fiore, R Gennaro
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3062012
Privacy-preserving fingercode authentication
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, ...
Proceedings of the 12th ACM workshop on Multimedia and security, 231-240, 2010
2802010
Efficiently verifiable computation on encrypted data
D Fiore, R Gennaro, V Pastro
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
2502014
Verifiable delegation of computation on outsourced data
M Backes, D Fiore, RM Reischuk
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2492013
Legosnark: Modular design and composition of succinct zero-knowledge proofs
M Campanelli, D Fiore, A Querol
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1572019
Practical homomorphic MACs for arithmetic circuits
D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2013
1522013
A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, ...
2010 Fourth IEEE International Conference on Biometrics: Theory …, 2010
1442010
ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data
M Backes, M Barbosa, D Fiore, RM Reischuk
https://eprint.iacr.org/2014/617/, 0
138*
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings
M Abdalla, D Catalano, D Fiore, R Gay, B Ursu
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1292018
Practical functional encryption for quadratic functions with applications to predicate encryption
CEZ Baltico, D Catalano, D Fiore, R Gay
Annual International Cryptology Conference, 67-98, 2017
1282017
Homomorphic signatures with efficient verification for polynomial functions
D Catalano, D Fiore, B Warinschi
Annual Cryptology Conference, 371-389, 2014
1252014
Efficient network coding signatures in the standard model
D Catalano, D Fiore, B Warinschi
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1132012
Using linearly-homomorphic encryption to evaluate degree-2 functions on encrypted data
D Catalano, D Fiore
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1032015
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
902016
Making the Diffie-Hellman protocol identity-based
D Fiore, R Gennaro
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
842010
Zero-knowledge sets with short proofs
D Catalano, D Fiore, M Messina
Advances in Cryptology–EUROCRYPT 2008, 433-450, 2008
722008
Adaptive pseudo-free groups and applications
D Catalano, D Fiore, B Warinschi
Annual International Conference on the Theory and Applications of …, 2011
682011
Verifiable random functions from identity-based key encapsulation
M Abdalla, D Catalano, D Fiore
Annual International Conference on the Theory and Applications of …, 2009
672009
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20