Sfoglia per Autore
Hidden-vector encryption with groups of prime order
2008-01-01 Iovino, V.; Persiano, G.
Private-Key Hidden Vector Encryption with Key Confidentiality
2009-01-01 Blundo, Carlo; Iovino, V.; Persiano, Giuseppe
Predicate Encryption with Partial Public Keys
2010-01-01 Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
2010-01-01 DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe
jPBC: Java pairing based cryptography
2011-01-01 DE CARO, Angelo; Iovino, Vincenzo
Secure and Policy-Private Resource Sharing in an Online Social Network
2011-01-01 Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta
On the Achievability of Simulation-Based Security for Functional Encryption
2013-01-01 Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe
Simulation-based secure functional encryption in the random oracle model
2015-01-01 Iovino, V.; Zebroski, K.
On the power of public-key function-private functional encryption
2016-01-01 Iovino, V.; Tang, Q.; Zebrowski, K.
Deniable functional encryption
2016-01-01 De Caro, A.; Iovino, V.; O'Neill, A.
Selene: Voting with transparent verifiability and coercion-mitigation
2016-01-01 Ryan, P. Y. A.; Ronne, P. B.; Iovino, V.
Using selene to verify your vote in JCJ
2017-01-01 Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A.
On the Relation Between SIM and IND-RoR Security Models for PAKEs
2017-01-01 Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan
Controlled homomorphic encryption: Definition and construction
2017-01-01 Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan
Mergeable functional encryption
2017-01-01 Iovino, V.; Zebrowski, K.
Updatable functional encryption
2017-01-01 Arriaga, A.; Iovino, V.; Tang, Q.
On the power of rewinding simulators in functional encryption
2017-01-01 De Caro, A.; Iovino, V.
Tightly-secure PAK(E)
2018-01-01 Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M.
Receiver-and sender-deniable functional encryption
2018-01-01 De Caro, A.; Iovino, V.; O'Neill, A.
Power of public-key function-private functional encryption
2018-01-01 Iovino, V.; Tang, Q.; Zebrowski, K.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Hidden-vector encryption with groups of prime order | 1-gen-2008 | Iovino, V.; Persiano, G. | |
Private-Key Hidden Vector Encryption with Key Confidentiality | 1-gen-2009 | Blundo, Carlo; Iovino, V.; Persiano, Giuseppe | |
Predicate Encryption with Partial Public Keys | 1-gen-2010 | Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe | |
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts | 1-gen-2010 | DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe | |
jPBC: Java pairing based cryptography | 1-gen-2011 | DE CARO, Angelo; Iovino, Vincenzo | |
Secure and Policy-Private Resource Sharing in an Online Social Network | 1-gen-2011 | Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta | |
On the Achievability of Simulation-Based Security for Functional Encryption | 1-gen-2013 | Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe | |
Simulation-based secure functional encryption in the random oracle model | 1-gen-2015 | Iovino, V.; Zebroski, K. | |
On the power of public-key function-private functional encryption | 1-gen-2016 | Iovino, V.; Tang, Q.; Zebrowski, K. | |
Deniable functional encryption | 1-gen-2016 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Selene: Voting with transparent verifiability and coercion-mitigation | 1-gen-2016 | Ryan, P. Y. A.; Ronne, P. B.; Iovino, V. | |
Using selene to verify your vote in JCJ | 1-gen-2017 | Iovino, V.; Rial, A.; Ronne, P. B.; Ryan, P. Y. A. | |
On the Relation Between SIM and IND-RoR Security Models for PAKEs | 1-gen-2017 | Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan | |
Controlled homomorphic encryption: Definition and construction | 1-gen-2017 | Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan | |
Mergeable functional encryption | 1-gen-2017 | Iovino, V.; Zebrowski, K. | |
Updatable functional encryption | 1-gen-2017 | Arriaga, A.; Iovino, V.; Tang, Q. | |
On the power of rewinding simulators in functional encryption | 1-gen-2017 | De Caro, A.; Iovino, V. | |
Tightly-secure PAK(E) | 1-gen-2018 | Becerra, J.; Iovino, V.; Ostrev, D.; Sala, P.; Skrobot, M. | |
Receiver-and sender-deniable functional encryption | 1-gen-2018 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Power of public-key function-private functional encryption | 1-gen-2018 | Iovino, V.; Tang, Q.; Zebrowski, K. |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile