Angelo De Caro

Orcid: 0009-0009-8284-5632

According to our database1, Angelo De Caro authored at least 34 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Efficient Aggregate Anonymous Credentials for Decentralized Identity.
IACR Cryptol. ePrint Arch., 2025

2024
Secure and Privacy-preserving CBDC Offline Payments using a Secure Element.
IACR Cryptol. ePrint Arch., 2024

2023
A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies.
IACR Cryptol. ePrint Arch., 2023

Short Privacy-Preserving Proofs of Liabilities.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Short Paper: Privacy Preserving Decentralized Netting.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

2021
Multi-Issuer Anonymous Credentials Without a Root Authority.
IACR Cryptol. ePrint Arch., 2021

Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Multi-Shard Private Transactions for Permissioned Blockchains.
CoRR, 2020

Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems.
Proceedings of the Financial Cryptography and Data Security, 2020

Privacy-preserving auditable token payments in a permissioned blockchain system.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
Proceedings of the Financial Cryptography and Data Security, 2019

Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019

Endorsement in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Receiver- and sender-deniable functional encryption.
IET Inf. Secur., 2018


Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains.
Proceedings of the Computer Security, 2018

2017
The Transaction Graph for Modeling Blockchain Semantics.
IACR Cryptol. ePrint Arch., 2017

Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

2016
Better Security for Functional Encryption for Inner Product Evaluations.
IACR Cryptol. ePrint Arch., 2016

Deniable Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Simple Functional Encryption Schemes for Inner Products.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

2013
Certified Information Access.
J. Syst. Softw., 2013

On the Power of Rewinding Simulators in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

On the Achievability of Simulation-Based Security for Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption.
IEEE Trans. Inf. Forensics Secur., 2012

Fully Secure Hidden Vector Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Lattice-Based Hierarchical Inner Product Encryption.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

2011
Hidden Vector Encryption Fully Secure Against Unrestricted Queries.
IACR Cryptol. ePrint Arch., 2011

Innovative approaches for security of small artefacts.
Comput. Sci. Rev., 2011

jPBC: Java pairing based cryptography.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

2010
Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae.
IACR Cryptol. ePrint Arch., 2010

Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Untraceable Tags Based on Mild Assumptions.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009


  Loading...