IOVINO, Vincenzo
IOVINO, Vincenzo
Dipartimento di Ingegneria dell'Informazione ed Elettrica e Matematica applicata/DIEM
Controlled homomorphic encryption: Definition and construction
2017 Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan
Deniable functional encryption
2016 De Caro, A.; Iovino, V.; O'Neill, A.
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
2010 DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe
Hidden-vector encryption with groups of prime order
2008 Iovino, V.; Persiano, G.
jPBC: Java pairing based cryptography
2011 DE CARO, Angelo; Iovino, Vincenzo
Mergeable functional encryption
2017 Iovino, V.; Zebrowski, K.
Non-interactive zero knowledge proofs in the random oracle model
2019 Iovino, V.; Visconti, I.
On the Achievability of Simulation-Based Security for Functional Encryption
2013 Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
2021 Iovino, V.; Vaudenay, S.; Vuagnoux, M.
On the power of public-key function-private functional encryption
2016 Iovino, V.; Tang, Q.; Zebrowski, K.
On the power of rewinding simulators in functional encryption
2017 De Caro, A.; Iovino, V.
On the Relation Between SIM and IND-RoR Security Models for PAKEs
2017 Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan
On the relation between SIM and IND-RoR security models for PAKEs with forward secrecy
2019 Becerra, J.; Iovino, V.; Ostrev, D.; Skrobot, M.
Power of public-key function-private functional encryption
2018 Iovino, V.; Tang, Q.; Zebrowski, K.
Predicate Encryption with Partial Public Keys
2010 Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations
2023 Avitabile, G.; Botta, V.; Iovino, V.; Visconti, I.
Private-Key Hidden Vector Encryption with Key Confidentiality
2009 Blundo, Carlo; Iovino, V.; Persiano, Giuseppe
Receiver-and sender-deniable functional encryption
2018 De Caro, A.; Iovino, V.; O'Neill, A.
Secure and Policy-Private Resource Sharing in an Online Social Network
2011 Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta
Selene: Voting with transparent verifiability and coercion-mitigation
2016 Ryan, P. Y. A.; Ronne, P. B.; Iovino, V.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Controlled homomorphic encryption: Definition and construction | 1-gen-2017 | Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan | |
Deniable functional encryption | 1-gen-2016 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts | 1-gen-2010 | DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe | |
Hidden-vector encryption with groups of prime order | 1-gen-2008 | Iovino, V.; Persiano, G. | |
jPBC: Java pairing based cryptography | 1-gen-2011 | DE CARO, Angelo; Iovino, Vincenzo | |
Mergeable functional encryption | 1-gen-2017 | Iovino, V.; Zebrowski, K. | |
Non-interactive zero knowledge proofs in the random oracle model | 1-gen-2019 | Iovino, V.; Visconti, I. | |
On the Achievability of Simulation-Based Security for Functional Encryption | 1-gen-2013 | Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe | |
On the Effectiveness of Time Travel to Inject COVID-19 Alerts | 1-gen-2021 | Iovino, V.; Vaudenay, S.; Vuagnoux, M. | |
On the power of public-key function-private functional encryption | 1-gen-2016 | Iovino, V.; Tang, Q.; Zebrowski, K. | |
On the power of rewinding simulators in functional encryption | 1-gen-2017 | De Caro, A.; Iovino, V. | |
On the Relation Between SIM and IND-RoR Security Models for PAKEs | 1-gen-2017 | Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan | |
On the relation between SIM and IND-RoR security models for PAKEs with forward secrecy | 1-gen-2019 | Becerra, J.; Iovino, V.; Ostrev, D.; Skrobot, M. | |
Power of public-key function-private functional encryption | 1-gen-2018 | Iovino, V.; Tang, Q.; Zebrowski, K. | |
Predicate Encryption with Partial Public Keys | 1-gen-2010 | Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe | |
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations | 1-gen-2023 | Avitabile, G.; Botta, V.; Iovino, V.; Visconti, I. | |
Private-Key Hidden Vector Encryption with Key Confidentiality | 1-gen-2009 | Blundo, Carlo; Iovino, V.; Persiano, Giuseppe | |
Receiver-and sender-deniable functional encryption | 1-gen-2018 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Secure and Policy-Private Resource Sharing in an Online Social Network | 1-gen-2011 | Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta | |
Selene: Voting with transparent verifiability and coercion-mitigation | 1-gen-2016 | Ryan, P. Y. A.; Ronne, P. B.; Iovino, V. |