Giulio Malavolta
Giulio Malavolta
Verified email at berkeley.edu - Homepage
TitleCited byYear
Concurrency and privacy with payment-channel networks
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei, S Ravi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
722017
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
522015
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
G Malavolta, P Moreno-Sanchez, A Kate, M Maffei
NDSS, 2017
43*2017
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
372016
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
G Malavolta, P Moreno-Sanchez, C Schneidewind, A Kate, M Maffei
NDSS, 2019
26*2019
Efficient ring signatures in the standard model
G Malavolta, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2017
132017
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Annual International Cryptology Conference, 3-32, 2019
82019
Incremental proofs of sequential work
N Döttling, RWF Lai, G Malavolta
Annual International Conference on the Theory and Applications of …, 2019
62019
Maliciously secure multi-client oram
M Maffei, G Malavolta, M Reinert, D Schröder
International Conference on Applied Cryptography and Network Security, 645-664, 2017
62017
Subvector commitments with application to succinct arguments
RWF Lai, G Malavolta
Annual International Cryptology Conference, 530-560, 2019
5*2019
Switch commitments: A safety switch for confidential transactions
T Ruffing, G Malavolta
International Conference on Financial Cryptography and Data Security, 170-181, 2017
52017
Homomorphic secret sharing for low degree polynomials
RWF Lai, G Malavolta, D Schröder
International Conference on the Theory and Application of Cryptology and …, 2018
42018
Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography
RWF Lai, G Malavolta, V Ronge
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
32019
Efficient invisible and unlinkable sanitizable signatures
X Bultel, P Lafourcade, RWF Lai, G Malavolta, D Schröder, ...
IACR International Workshop on Public Key Cryptography, 159-189, 2019
32019
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography Conference, 407-437, 2019
22019
Homomorphic time-lock puzzles and applications
G Malavolta, SAK Thyagarajan
Annual International Cryptology Conference, 620-649, 2019
22019
Minting Mechanisms for Blockchain-or-Moving from Cryptoassets to Cryptocurrencies.
D Deuber, N Döttling, B Magri, G Malavolta, SAK Thyagarajan
IACR Cryptology ePrint Archive 2018, 1110, 2018
12018
Functional credentials
D Deuber, M Maffei, G Malavolta, M Rabkin, D Schröder, M Simkin
Proceedings on Privacy Enhancing Technologies 2018 (2), 64-84, 2018
12018
Subset predicate encryption and its applications
J Katz, M Maffei, G Malavolta, D Schröder
International Conference on Cryptology and Network Security, 115-134, 2017
12017
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem
N Döttling, S Garg, M Hajiabadi, K Liu, G Malavolta
International Conference on the Theory and Application of Cryptology and …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20