IOVINO, Vincenzo
IOVINO, Vincenzo
Dipartimento di Ingegneria dell'Informazione ed Elettrica e Matematica applicata/DIEM
Controlled homomorphic encryption: Definition and construction
2017-01-01 Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan
Deniable functional encryption
2016-01-01 De Caro, A.; Iovino, V.; O'Neill, A.
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts
2010-01-01 DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe
Hidden-vector encryption with groups of prime order
2008-01-01 Iovino, V.; Persiano, G.
jPBC: Java pairing based cryptography
2011-01-01 DE CARO, Angelo; Iovino, Vincenzo
Mergeable functional encryption
2017-01-01 Iovino, V.; Zebrowski, K.
Non-interactive zero knowledge proofs in the random oracle model
2019-01-01 Iovino, V.; Visconti, I.
On the Achievability of Simulation-Based Security for Functional Encryption
2013-01-01 Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe
On the Effectiveness of Time Travel to Inject COVID-19 Alerts
2021-01-01 Iovino, V.; Vaudenay, S.; Vuagnoux, M.
On the power of public-key function-private functional encryption
2016-01-01 Iovino, V.; Tang, Q.; Zebrowski, K.
On the power of rewinding simulators in functional encryption
2017-01-01 De Caro, A.; Iovino, V.
On the Relation Between SIM and IND-RoR Security Models for PAKEs
2017-01-01 Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan
On the relation between SIM and IND-RoR security models for PAKEs with forward secrecy
2019-01-01 Becerra, J.; Iovino, V.; Ostrev, D.; Skrobot, M.
Power of public-key function-private functional encryption
2018-01-01 Iovino, V.; Tang, Q.; Zebrowski, K.
Predicate Encryption with Partial Public Keys
2010-01-01 Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations
2023-01-01 Avitabile, G.; Botta, V.; Iovino, V.; Visconti, I.
Private-Key Hidden Vector Encryption with Key Confidentiality
2009-01-01 Blundo, Carlo; Iovino, V.; Persiano, Giuseppe
Receiver-and sender-deniable functional encryption
2018-01-01 De Caro, A.; Iovino, V.; O'Neill, A.
Secure and Policy-Private Resource Sharing in an Online Social Network
2011-01-01 Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta
Selene: Voting with transparent verifiability and coercion-mitigation
2016-01-01 Ryan, P. Y. A.; Ronne, P. B.; Iovino, V.
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Controlled homomorphic encryption: Definition and construction | 1-gen-2017 | Desmedt, Yvo; Iovino, Vincenzo; Persiano, Giuseppe; Visconti, Ivan | |
Deniable functional encryption | 1-gen-2016 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Fully secure anonymous HIBE and secret-key anonymous IBE with short ciphertexts | 1-gen-2010 | DE CARO, Angelo; Iovino, Vincenzo; Persiano, Giuseppe | |
Hidden-vector encryption with groups of prime order | 1-gen-2008 | Iovino, V.; Persiano, G. | |
jPBC: Java pairing based cryptography | 1-gen-2011 | DE CARO, Angelo; Iovino, Vincenzo | |
Mergeable functional encryption | 1-gen-2017 | Iovino, V.; Zebrowski, K. | |
Non-interactive zero knowledge proofs in the random oracle model | 1-gen-2019 | Iovino, V.; Visconti, I. | |
On the Achievability of Simulation-Based Security for Functional Encryption | 1-gen-2013 | Angelo De, Caro; Iovino, Vincenzo; Abhishek, Jain; Adam, O'Neill; Omer, Paneth; Persiano, Giuseppe | |
On the Effectiveness of Time Travel to Inject COVID-19 Alerts | 1-gen-2021 | Iovino, V.; Vaudenay, S.; Vuagnoux, M. | |
On the power of public-key function-private functional encryption | 1-gen-2016 | Iovino, V.; Tang, Q.; Zebrowski, K. | |
On the power of rewinding simulators in functional encryption | 1-gen-2017 | De Caro, A.; Iovino, V. | |
On the Relation Between SIM and IND-RoR Security Models for PAKEs | 1-gen-2017 | Becerra, José; Iovino, Vincenzo; Ostrev, Dimiter; Škrobot, Marjan | |
On the relation between SIM and IND-RoR security models for PAKEs with forward secrecy | 1-gen-2019 | Becerra, J.; Iovino, V.; Ostrev, D.; Skrobot, M. | |
Power of public-key function-private functional encryption | 1-gen-2018 | Iovino, V.; Tang, Q.; Zebrowski, K. | |
Predicate Encryption with Partial Public Keys | 1-gen-2010 | Blundo, Carlo; Iovino, Vincenzo; Persiano, Giuseppe | |
Privacy and Integrity Threats in Contact Tracing Systems and Their Mitigations | 1-gen-2023 | Avitabile, G.; Botta, V.; Iovino, V.; Visconti, I. | |
Private-Key Hidden Vector Encryption with Key Confidentiality | 1-gen-2009 | Blundo, Carlo; Iovino, V.; Persiano, Giuseppe | |
Receiver-and sender-deniable functional encryption | 1-gen-2018 | De Caro, A.; Iovino, V.; O'Neill, A. | |
Secure and Policy-Private Resource Sharing in an Online Social Network | 1-gen-2011 | Stefano, Braghin; Iovino, Vincenzo; Persiano, Giuseppe; Alberto, Trombetta | |
Selene: Voting with transparent verifiability and coercion-mitigation | 1-gen-2016 | Ryan, P. Y. A.; Ronne, P. B.; Iovino, V. |